-
Notifications
You must be signed in to change notification settings - Fork 295
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(cmd-api-server): fix CVE-2023-36665 protobufjs Prototype Pollution vuln. #2682
Labels
API_Server
bug
Something isn't working
dependencies
Pull requests that update a dependency file
documentation
Improvements or additions to documentation
good-first-issue
Good for newcomers
good-first-issue-200-intermediate
Hacktoberfest
Hacktoberfest participants are welcome to take a stab at issues marked with this label.
P1
Priority 1: Highest
Security
Related to existing or potential security vulnerabilities
Milestone
Comments
petermetz
added a commit
to petermetz/cacti
that referenced
this issue
Sep 11, 2023
…n vuln Upgraded all imports of protobufjs to non-vulnerable versions (v7.2.5) Fixes hyperledger-cacti#2682 Signed-off-by: Peter Somogyvari <[email protected]>
petermetz
added a commit
to petermetz/cacti
that referenced
this issue
Sep 17, 2023
…n vuln Upgraded all imports of protobufjs to non-vulnerable versions (v7.2.5) [skip-ci] Fixes hyperledger-cacti#2682 Signed-off-by: Peter Somogyvari <[email protected]>
petermetz
added a commit
that referenced
this issue
Sep 17, 2023
…n vuln Upgraded all imports of protobufjs to non-vulnerable versions (v7.2.5) [skip-ci] Fixes #2682 Signed-off-by: Peter Somogyvari <[email protected]>
Re-opening because in another recent change the vulnerable versions crept back in. ;/ |
petermetz
added a commit
to petermetz/cacti
that referenced
this issue
Oct 13, 2023
1. Upgraded fabric-network from 2.2.10 to 2.2.18 wherever it was still 2.2.10 2. Upgraded ipfs-http-client project-wide from 51.0.1 to 60.0.1 3. Upgraded @google-cloud/secret-manager from 3.9.0 to 5.0.1 This is the second try at fixing this issue. For some reason the first PR didn't get it done. The most likely reason is that other commits in the meantime added back the vulnerable versions of the packages, but I'm not a 100% sure. [skip ci] Fixes hyperledger-cacti#2682 Signed-off-by: Peter Somogyvari <[email protected]>
petermetz
added a commit
to petermetz/cacti
that referenced
this issue
Oct 18, 2023
1. Upgraded fabric-network from 2.2.10 to 2.2.18 wherever it was still 2.2.10 2. Upgraded ipfs-http-client project-wide from 51.0.1 to 60.0.1 3. Upgraded @google-cloud/secret-manager from 3.9.0 to 5.0.1 This is the second try at fixing this issue. While it was in review other commits already snuck back in more older versions of the vulnerable dependency so before merging this I also add a resolution in the root package.json file to ensure that the vulnerable version is not used at all regardless of it being a dependency of a dependency. [skip ci] Fixes hyperledger-cacti#2682 Signed-off-by: Peter Somogyvari <[email protected]>
petermetz
added a commit
that referenced
this issue
Oct 18, 2023
1. Upgraded fabric-network from 2.2.10 to 2.2.18 wherever it was still 2.2.10 2. Upgraded ipfs-http-client project-wide from 51.0.1 to 60.0.1 3. Upgraded @google-cloud/secret-manager from 3.9.0 to 5.0.1 This is the second try at fixing this issue. While it was in review other commits already snuck back in more older versions of the vulnerable dependency so before merging this I also add a resolution in the root package.json file to ensure that the vulnerable version is not used at all regardless of it being a dependency of a dependency. [skip ci] Fixes #2682 Signed-off-by: Peter Somogyvari <[email protected]>
sandeepnRES
pushed a commit
to sandeepnRES/cacti
that referenced
this issue
Dec 21, 2023
…n vuln Upgraded all imports of protobufjs to non-vulnerable versions (v7.2.5) [skip-ci] Fixes hyperledger-cacti#2682 Signed-off-by: Peter Somogyvari <[email protected]>
sandeepnRES
pushed a commit
to sandeepnRES/cacti
that referenced
this issue
Dec 21, 2023
1. Upgraded fabric-network from 2.2.10 to 2.2.18 wherever it was still 2.2.10 2. Upgraded ipfs-http-client project-wide from 51.0.1 to 60.0.1 3. Upgraded @google-cloud/secret-manager from 3.9.0 to 5.0.1 This is the second try at fixing this issue. While it was in review other commits already snuck back in more older versions of the vulnerable dependency so before merging this I also add a resolution in the root package.json file to ensure that the vulnerable version is not used at all regardless of it being a dependency of a dependency. [skip ci] Fixes hyperledger-cacti#2682 Signed-off-by: Peter Somogyvari <[email protected]>
5 tasks
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
API_Server
bug
Something isn't working
dependencies
Pull requests that update a dependency file
documentation
Improvements or additions to documentation
good-first-issue
Good for newcomers
good-first-issue-200-intermediate
Hacktoberfest
Hacktoberfest participants are welcome to take a stab at issues marked with this label.
P1
Priority 1: Highest
Security
Related to existing or potential security vulnerabilities
Description
CVE ID: CVE-2023-36665
GHSA ID: GHSA-h755-8qp9-cq85
GHSA-h755-8qp9-cq85
https://github.com/hyperledger/cacti/security/dependabot/721
The text was updated successfully, but these errors were encountered: