jwilder / dockerize

Utility to simplify running applications in docker containers
MIT License
5.01k stars 414 forks source link

Update the gomod libraries to address security vulnerabilities #186

Closed mindaugasrukas closed 1 year ago

mindaugasrukas commented 1 year ago

FYI:

% trivy filesystem .
2023-05-26T11:12:05.608-0700    INFO    Vulnerability scanning is enabled
2023-05-26T11:12:05.608-0700    INFO    Secret scanning is enabled
2023-05-26T11:12:05.608-0700    INFO    If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2023-05-26T11:12:05.608-0700    INFO    Please see also https://aquasecurity.github.io/trivy/v0.41/docs/secret/scanning/#recommendation for faster secret detection
2023-05-26T11:12:05.973-0700    INFO    Number of language-specific files: 1
2023-05-26T11:12:05.973-0700    INFO    Detecting gomod vulnerabilities...

go.mod (gomod)

Total: 7 (UNKNOWN: 1, LOW: 0, MEDIUM: 2, HIGH: 4, CRITICAL: 0)

┌─────────────────────┬─────────────────────┬──────────┬───────────────────────────────────┬───────────────────────────────────┬───────────────────────────────────────────────────────────┐
│       Library       │    Vulnerability    │ Severity │         Installed Version         │           Fixed Version           │                           Title                           │
├─────────────────────┼─────────────────────┼──────────┼───────────────────────────────────┼───────────────────────────────────┼───────────────────────────────────────────────────────────┤
│ golang.org/x/crypto │ CVE-2022-27191      │ HIGH     │ 0.0.0-20211215153901-e495a2d5b3d3 │ 0.0.0-20220314234659-1baeb1ce4c0b │ crash in a golang.org/x/crypto/ssh server                 │
│                     │                     │          │                                   │                                   │ https://avd.aquasec.com/nvd/cve-2022-27191                │
├─────────────────────┼─────────────────────┤          ├───────────────────────────────────┼───────────────────────────────────┼───────────────────────────────────────────────────────────┤
│ golang.org/x/net    │ CVE-2021-44716      │          │ 0.0.0-20211112202133-69e39bad7dc2 │ 0.0.0-20211209124913-491a49abca63 │ golang: net/http: limit growth of header canonicalization │
│                     │                     │          │                                   │                                   │ cache                                                     │
│                     │                     │          │                                   │                                   │ https://avd.aquasec.com/nvd/cve-2021-44716                │
│                     ├─────────────────────┤          │                                   ├───────────────────────────────────┼───────────────────────────────────────────────────────────┤
│                     │ CVE-2022-27664      │          │                                   │ 0.0.0-20220906165146-f3363e06e74c │ handle server errors after sending GOAWAY                 │
│                     │                     │          │                                   │                                   │ https://avd.aquasec.com/nvd/cve-2022-27664                │
│                     ├─────────────────────┤          │                                   ├───────────────────────────────────┼───────────────────────────────────────────────────────────┤
│                     │ CVE-2022-41723      │          │                                   │ 0.7.0                             │ avoid quadratic complexity in HPACK decoding              │
│                     │                     │          │                                   │                                   │ https://avd.aquasec.com/nvd/cve-2022-41723                │
│                     ├─────────────────────┼──────────┤                                   ├───────────────────────────────────┼───────────────────────────────────────────────────────────┤
│                     │ CVE-2022-41717      │ MEDIUM   │                                   │ 0.4.0                             │ excessive memory growth in a Go server accepting HTTP/2   │
│                     │                     │          │                                   │                                   │ requests                                                  │
│                     │                     │          │                                   │                                   │ https://avd.aquasec.com/nvd/cve-2022-41717                │
│                     ├─────────────────────┼──────────┤                                   ├───────────────────────────────────┼───────────────────────────────────────────────────────────┤
│                     │ GHSA-vvpx-j8f3-3w6h │ UNKNOWN  │                                   │ 0.7.0                             │ Uncontrolled Resource Consumption                         │
│                     │                     │          │                                   │                                   │ https://github.com/advisories/GHSA-vvpx-j8f3-3w6h         │
├─────────────────────┼─────────────────────┼──────────┼───────────────────────────────────┼───────────────────────────────────┼───────────────────────────────────────────────────────────┤
│ golang.org/x/sys    │ CVE-2022-29526      │ MEDIUM   │ 0.0.0-20211216021012-1d35b9e2eb4e │ 0.0.0-20220412211240-33da011f77ad │ faccessat checks wrong group                              │
│                     │                     │          │                                   │                                   │ https://avd.aquasec.com/nvd/cve-2022-29526                │
└─────────────────────┴─────────────────────┴──────────┴───────────────────────────────────┴───────────────────────────────────┴───────────────────────────────────────────────────────────┘