-
Notifications
You must be signed in to change notification settings - Fork 39.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[CVE-2024-45338] Non-linear parsing of case-insensitive content in golang.org/x/net/html #129347
Comments
This issue is currently awaiting triage. If a SIG or subproject determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Here's the govulncheck verbose output that confirms that we are NOT affected.
|
cc @liggitt |
Some scanners that just go by the version of the x/net module and do NOT inspect the code are very prone to flagging with a false positive. for example here's one:
|
/sig architecture |
Even if Kubernetes is not impacted, I did see usage of golang.org/x/net/html in client-go. I noticed that any object that imported client-go would get hit by those scanners. Anything to worry about for controller-runtime based projects? |
Link please! |
I think you may be right. I did a search of golang.org/x/net and saw where that is used. I didn't look at what uses golang.org/x/net/html. |
@kannon92 yep! for the record here's what the symbols that were fixed are: |
Okay. So for Kueue, here were vendored packages that used this module. TBH I think anything that brings in gomega may take this dependency (ouch!). Only component that I see k8s use is:
rg golang.org/x/net/html
|
@kannon92 for Kueue, run the |
I already updated that library to use v0.33.0 as fighting the battle that the CVE scanners are not accurate seems to take longer than just bumping the dependency.. We got spammed heavily with this CVE and I spent the better part of yesterday bumping libraries to satisfy this. 🐼 |
@kannon92 very sad state of affairs :( |
Details are here:
We do use some code from the package
x/net/html
:https://cs.k8s.io/?q=x%2Fnet%2Fhtml%22&i=nope&files=&excludeFiles=&repos=kubernetes/kubernetes
and though Kubernetes is using
v0.30.0
, We are NOT affected as the symbols affected/fixed are not referenced from our codebase:https://github.com/golang/vulndb/blame/230cf22dcb14b2afd57acae9022e4adebaa8fe05/data/reports/GO-2024-3333.yaml#L8C41-L18
The text was updated successfully, but these errors were encountered: