greenbone / ospd-openvas

ospd-openvas is an OSP server implementation to allow GVM to remotely control an OpenVAS Scanner
GNU Affero General Public License v3.0
68 stars 58 forks source link

Build(deps): Bump the python-packages group across 1 directory with 4 updates #1002

Closed dependabot[bot] closed 2 months ago

dependabot[bot] commented 3 months ago

Bumps the python-packages group with 4 updates in the / directory: redis, lxml, pylint and black.

Updates redis from 5.0.7 to 5.0.8

Release notes

Sourced from redis's releases.

5.0.8

Changes

  • Resolve some docs warnings (#3322)
  • Add missing type hints for retry.py (#3250)

πŸ”₯ Breaking Changes

  • Timeseries insertion filters for close samples (#3228)

πŸš€ New Features

  • Hash field expiration commands (#3218)
  • Support the MAXAGE option for CLIENT KILL (#3187)
  • Support NOVALUES parameter for HSCAN (#3157)
  • Document XREAD of last message (+) (#3187)
  • Support missing/empty values in search (#3231)
  • Timeseries insertion filters for close samples (#3228)

🧰 Maintenance

  • Add extra tests for GEO search (#3244)
  • Test special characters escaping in search (#3276)

πŸ› Bug Fixes

  • Decode search results at field level (#3309)
Commits
  • 6a2a636 Decode search results at field level (#3309)
  • e7ef54a Fix bug: client side caching causes unexpected disconnections (async version)...
  • 0cd0c5d Format connection errors in the same way everywhere (#3305)
  • 6fedfef Prepare for Redis 7.4 RC2 (#3303)
  • ed1680f Add details to the asyncio connection error message (#3211)
  • 511fda0 Add missing type hints for retry.py (#3250)
  • c1a6ff7 Bump rojopolis/spellcheck-github-actions from 0.37.0 to 0.38.0 (#3301)
  • 338cbfd Re-enable Graph tests (#3287)
  • 532bc02 Do not restrict pytest dependencies versions (#3286)
  • b6a0f96 Add CODECOV token to CI (#3285)
  • Additional commits viewable in compare view


Updates lxml from 5.2.2 to 5.3.0

Changelog

Sourced from lxml's changelog.

5.3.0 (2024-08-10)

Features added

  • GH#421: Nested CDATA sections are no longer rejected but split on output to represent ]]> correctly. Patch by Gertjan Klein.

Bugs fixed

  • LP#2060160: Attribute values serialised differently in xmlfile.element() and xmlfile.write().

  • LP#2058177: The ISO-Schematron implementation could fail on unknown prefixes. Patch by David Lakin.

Other changes

  • LP#2067707: The strip_cdata option in HTMLParser() turned out to be useless and is now deprecated.

  • Binary wheels use the library versions libxml2 2.12.9 and libxslt 1.1.42.

  • Windows binary wheels use the library versions libxml2 2.11.8 and libxslt 1.1.39.

  • Built with Cython 3.0.11.

Commits
  • 475f4ab Update release date.
  • e356a1e Build: Add some debug output.
  • 8345680 Build: Retry library downloads on failures.
  • 2fe6c90 CI: Test oldest officially supported library versions again (the slightly new...
  • 00335a1 Build: Improve download regexes.
  • f3da47d Prepare release of lxml 5.3.0.
  • 3119703 Add missing global name to "all" in lxml.etree.
  • 9de6180 Build: Upgrade cibuildwheel version also for the matrix setup.
  • 54e36cb Build: Upgrade libxslt to latest (1.1.42).
  • d4f56ee Build: Slightly increase the oldest libxslt version that we test against to w...
  • Additional commits viewable in compare view


Updates pylint from 3.2.5 to 3.2.6

Commits


Updates black from 24.4.2 to 24.8.0

Release notes

Sourced from black's releases.

24.8.0

Stable style

  • Fix crash when # fmt: off is used before a closing parenthesis or bracket. (#4363)

Packaging

  • Packaging metadata updated: docs are explictly linked, the issue tracker is now also linked. This improves the PyPI listing for Black. (#4345)

Parser

  • Fix regression where Black failed to parse a multiline f-string containing another multiline string (#4339)
  • Fix regression where Black failed to parse an escaped single quote inside an f-string (#4401)
  • Fix bug with Black incorrectly parsing empty lines with a backslash (#4343)
  • Fix bugs with Black's tokenizer not handling \{ inside f-strings very well (#4422)
  • Fix incorrect line numbers in the tokenizer for certain tokens within f-strings (#4423)

Performance

  • Improve performance when a large directory is listed in .gitignore (#4415)

Blackd

  • Fix blackd (and all extras installs) for docker container (#4357)
Changelog

Sourced from black's changelog.

24.8.0

Stable style

  • Fix crash when # fmt: off is used before a closing parenthesis or bracket. (#4363)

Packaging

  • Packaging metadata updated: docs are explictly linked, the issue tracker is now also linked. This improves the PyPI listing for Black. (#4345)

Parser

  • Fix regression where Black failed to parse a multiline f-string containing another multiline string (#4339)
  • Fix regression where Black failed to parse an escaped single quote inside an f-string (#4401)
  • Fix bug with Black incorrectly parsing empty lines with a backslash (#4343)
  • Fix bugs with Black's tokenizer not handling \{ inside f-strings very well (#4422)
  • Fix incorrect line numbers in the tokenizer for certain tokens within f-strings (#4423)

Performance

  • Improve performance when a large directory is listed in .gitignore (#4415)

Blackd

  • Fix blackd (and all extras installs) for docker container (#4357)
Commits
  • b965c2a Prepare release 24.8.0 (#4426)
  • 9ccf279 Document find_project_root ignoring pyproject.toml without [tool.black]...
  • 14b6e61 fix: Enhace black efficiently to skip directories listed in .gitignore (#4415)
  • b1c4dd9 fix: respect braces better in f-string parsing (#4422)
  • 4b4ae43 Fix incorrect linenos on fstring tokens with escaped newlines (#4423)
  • 7fa1faf docs: fix the installation command of extra for blackd (#4413)
  • 8827acc Bump sphinx from 7.3.7 to 7.4.0 in /docs (#4404)
  • b0da11d Bump furo from 2024.5.6 to 2024.7.18 in /docs (#4409)
  • 721dff5 fix: avoid formatting backslash strings inside f-strings (#4401)
  • 7e2afc9 Update actions/checkout to v4 to stop node deprecation warnings (#4379)
  • Additional commits viewable in compare view


Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore major version` will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) - `@dependabot ignore minor version` will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) - `@dependabot ignore ` will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) - `@dependabot unignore ` will remove all of the ignore conditions of the specified dependency - `@dependabot unignore ` will remove the ignore condition of the specified dependency and ignore conditions
Balou9 commented 3 months ago

@dependabot recreate

y0urself commented 2 months ago

@dependabot recreate

github-actions[bot] commented 2 months ago

:mag: Vulnerabilities of harbor-os.greenbone.net/community/ospd-openvas:pr-1002

:package: Image Reference harbor-os.greenbone.net/community/ospd-openvas:pr-1002
digestsha256:4c5008a0b3d71eac7a9f15c53a93707cbe202c1c339da9d9523540826e343ff9
vulnerabilitiescritical: 3 high: 15 medium: 9 low: 50 unspecified: 5
size290 MB
packages333
:package: Base Image greenbone/openvas-scanner:edge
digestsha256:27d8a7db29dade68b1f93fcf0bca410af0bedaf330822414eab3786b026e5a5d
vulnerabilitiescritical: 0 high: 0 medium: 1 low: 34 unspecified: 3
critical: 2 high: 10 medium: 7 low: 0 unspecified: 4stdlib 1.19.8 (golang) pkg:golang/stdlib@1.19.8
critical : CVE--2024--24790
Affected range<1.21.11
Fixed version1.21.11
EPSS Score0.06%
EPSS Percentile28th percentile
Description
The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms.
critical : CVE--2023--24540
Affected range<1.19.9
Fixed version1.19.9
EPSS Score0.26%
EPSS Percentile66th percentile
Description
Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.
high : CVE--2023--29403
Affected range<1.19.10
Fixed version1.19.10
EPSS Score0.07%
EPSS Percentile31st percentile
Description
On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.
high : CVE--2024--24791
Affected range<1.21.12
Fixed version1.21.12
EPSS Score0.04%
EPSS Percentile16th percentile
Description
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
high : CVE--2024--24784
Affected range<1.21.8
Fixed version1.21.8
EPSS Score0.04%
EPSS Percentile11th percentile
Description
The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers.
high : CVE--2023--45288
Affected range<1.21.9
Fixed version1.21.9
EPSS Score0.04%
EPSS Percentile14th percentile
Description
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.
high : CVE--2023--45287
Affected range<1.20.0
Fixed version1.20.0
EPSS Score0.07%
EPSS Percentile31st percentile
Description
Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.
high : CVE--2023--45283
Affected range<1.20.11
Fixed version1.20.11
EPSS Score0.10%
EPSS Percentile42nd percentile
Description
The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \?, resulting in filepath.Clean(\?\c:) returning \?\c: rather than \?\c:\ (among other effects). The previous behavior has been restored.
high : CVE--2023--44487
Affected range<1.20.10
Fixed version1.20.10
EPSS Score81.04%
EPSS Percentile98th percentile
Description
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.
high : CVE--2023--39325
Affected range<1.20.10
Fixed version1.20.10
EPSS Score0.21%
EPSS Percentile60th percentile
Description
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.
high : CVE--2023--29400
Affected range<1.19.9
Fixed version1.19.9
EPSS Score0.14%
EPSS Percentile50th percentile
Description
Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.
high : CVE--2023--24539
Affected range<1.19.9
Fixed version1.19.9
EPSS Score0.14%
EPSS Percentile50th percentile
Description
Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untrusted input.
medium : CVE--2023--29406
Affected range<1.19.11
Fixed version1.19.11
EPSS Score0.12%
EPSS Percentile47th percentile
Description
The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.
medium : CVE--2023--39319
Affected range<1.20.8
Fixed version1.20.8
EPSS Score0.07%
EPSS Percentile31st percentile
Description
The html/template package does not apply the proper rules for handling occurrences of " contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.
medium : CVE--2023--39318
Affected range<1.20.8
Fixed version1.20.8
EPSS Score0.10%
EPSS Percentile41st percentile
Description
The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in Githubissues.
  • Githubissues is a development platform for aggregating issues.