-
Notifications
You must be signed in to change notification settings - Fork 60
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
github.com/aws/aws-sdk-go-v1.45.24: 1 vulnerabilities (highest severity is: 7.5) - autoclosed #96
Comments
I will submit a PR for this shortly. |
Hi @prudhvigodithi, can this issue be assigned to me, please? AWS has released v1.45.25 of the AWS SDK for Go, and I have a commit ready for review. |
Hey @afrodidact this already taken care by @rblcoder in the PR https://github.com/opensearch-project/terraform-provider-opensearch/pull/91/files. Thanks |
Closing this issue as the change #91 is already pushed. Thank you |
Hi @prudhvigodithi, I believe @rblcoder's PR takes care of issue #78, whereas mine takes care of issue #91. |
Hey @afrodidact from @rblcoder PR the |
@afrodidact do you think this is fixed in |
@prudhvigodithi @afrodidact I didn't check that the issue is unresolved aws/aws-sdk-go#4738 |
I understand now that this issue will be resolved in the next release after 31st October. Sorry for the confusion. |
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory. |
Vulnerable Library - github.com/aws/aws-sdk-go-v1.45.24
Found in HEAD commit: 24a1c298b7e63c6f1872f0290e22be5ef64e10f7
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2022-41721
Vulnerable Library - golang.org/x/net-v0.1.0
[mirror] Go supplementary network libraries
Library home page: https://proxy.golang.org/golang.org/x/net/@v/v0.1.0.zip
Dependency Hierarchy:
Found in HEAD commit: 24a1c298b7e63c6f1872f0290e22be5ef64e10f7
Found in base branch: main
Vulnerability Details
A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.
Publish Date: 2023-01-13
URL: CVE-2022-41721
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2023-01-13
Fix Resolution: v0.2.0
The text was updated successfully, but these errors were encountered: