Closed mend-for-github-com[bot] closed 1 year ago
I will submit a PR for this shortly.
Hi @prudhvigodithi, can this issue be assigned to me, please? AWS has released v1.45.25 of the AWS SDK for Go, and I have a commit ready for review.
Hey @afrodidact this already taken care by @rblcoder in the PR https://github.com/opensearch-project/terraform-provider-opensearch/pull/91/files. Thanks
Closing this issue as the change https://github.com/opensearch-project/terraform-provider-opensearch/pull/91 is already pushed. Thank you
Hi @prudhvigodithi, I believe @rblcoder's PR takes care of issue #78, whereas mine takes care of issue #91.
Hey @afrodidact from @rblcoder PR the github.com/aws/aws-sdk-go
is already updated to v1.45.24
, hence I have closed this issue. Thanks
@afrodidact do you think this is fixed in v1.45.25
?
@prudhvigodithi @afrodidact I didn't check that the issue is unresolved https://github.com/aws/aws-sdk-go/issues/4738
I understand now that this issue will be resolved in the next release after 31st October.
Sorry for the confusion.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
Found in HEAD commit: 24a1c298b7e63c6f1872f0290e22be5ef64e10f7
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2022-41721
### Vulnerable Library - golang.org/x/net-v0.1.0[mirror] Go supplementary network libraries
Library home page: https://proxy.golang.org/golang.org/x/net/@v/v0.1.0.zip
Dependency Hierarchy: - github.com/aws/aws-sdk-go-v1.45.24 (Root Library) - :x: **golang.org/x/net-v0.1.0** (Vulnerable Library)
Found in HEAD commit: 24a1c298b7e63c6f1872f0290e22be5ef64e10f7
Found in base branch: main
### Vulnerability DetailsA request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.
Publish Date: 2023-01-13
URL: CVE-2022-41721
### CVSS 3 Score Details (7.5)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Release Date: 2023-01-13
Fix Resolution: v0.2.0