Xabaril / AspNetCore.Diagnostics.HealthChecks

Enterprise HealthChecks for ASP.NET Core Diagnostics Package
Apache License 2.0
3.98k stars 770 forks source link

Bump Npgsql from 8.0.0 to 8.0.3 in /src/HealthChecks.NpgSql #2213

Open dependabot[bot] opened 1 month ago

dependabot[bot] commented 1 month ago

Bumps Npgsql from 8.0.0 to 8.0.3.

Release notes

Sourced from Npgsql's releases.

v8.0.3

This version contains a high-severity security patch for CVE-2024-32655 everyone is advised to upgrade.

A large number of number of bugs have been fixed, here is the full list.

Thanks to @​paul-gerste-sonarsource for reporting the vulnerability.

v8.0.2

8.0.2 contains quite a few fixes, everyone is strongly encouraged to upgrade.

The full list of changes is available here.

v8.0.1

8.0.1 contains some important fixes discovered after releasing 8.0.0. Everyone is encouraged to upgrade.

The full list of changes is available here.

Commits
  • c5aab16 Ignore multirange test pre PG 14
  • d674f28 Fix replication message writing
  • 091655e Merge pull request from GHSA-x9vc-6hfv-hg8c
  • be50041 Fix output parameter population in batch commands (#5644)
  • 5fd00dd Buffer over-read with ArrayNullabilityMode.PerInstance (#5675)
  • 58b9a1b Start loading composite types before ranges (#5651)
  • 4e5fb5a Add [Experimental] to converter-related APIs (#5668)
  • 6927b98 Add ifdef for missing BitConverter.Int32BitsToSingle on ns2.0
  • 1b93828 GetChars fix and infra cleanup (#5618)
  • 07a0702 Require binary format in binary importer (#5648)
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/Xabaril/AspNetCore.Diagnostics.HealthChecks/network/alerts).
prom3theu5 commented 1 month ago

Can this be actioned please, There is a CVE for versions lower than 8.0.3

Vulnerable Library - aspnetcore.healthchecks.npgsql.8.0.1.nupkg

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (aspnetcore.healthchecks.npgsql.8.0.1.nupkg version) Remediation Possible**
CVE-2024-32655 High 8.1 npgsql.8.0.0.nupkg Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2024-32655 ### Vulnerable Library - npgsql.8.0.0.nupkg

Npgsql is the open source .NET data provider for PostgreSQL.

Library home page: https://api.nuget.org/packages/npgsql.8.0.0.nupkg

### Vulnerability Details

Npgsql is the .NET data provider for PostgreSQL. In 8.0.2 and earlier, The `WriteBind()` method in `src/Npgsql/Internal/NpgsqlConnector.FrontendMessages.cs` uses `int` variables to store the message length and the sum of parameter lengths. Both variables overflow when the sum of parameter lengths becomes too large. This causes Npgsql to write a message size that is too small when constructing a Postgres protocol message to send it over the network to the database. When parsing the message, the database will only read a small number of bytes and treat any following bytes as new messages while they belong to the old message. Attackers can abuse this to inject arbitrary Postgres protocol messages into the connection, leading to the execution of arbitrary SQL statements on the application's behalf.

Publish Date: 2024-05-09

URL: CVE-2024-32655

### CVSS 3 Score Details (8.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2024-32655

Release Date: 2024-05-09

Fix Resolution: Npgsql - 4.0.14,4.1.13,5.0.18,6.0.11,7.0.7,8.0.3