Skip to content

Conversation

danielcibrao-form3
Copy link
Contributor

@danielcibrao-form3 danielcibrao-form3 commented Oct 3, 2022

By checking the code there were some security vulnerabilities present in the net-tools binary such has:

usr/local/bin/nats-top
======================
Total: 4 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 4, CRITICAL: 0)

+-----------------------------------+------------------+----------+-------------------+-------------------------------------+---------------------------------------+
|              LIBRARY              | VULNERABILITY ID | SEVERITY | INSTALLED VERSION |            FIXED VERSION            |                 TITLE                 |
+-----------------------------------+------------------+----------+-------------------+-------------------------------------+---------------------------------------+
| github.com/nats-io/jwt            | CVE-2021-3127    | HIGH     | v1.1.0            | 1.2.3-0.20210314221642-a826c77dc9d2 | nats-server: mishandling              |
|                                   |                  |          |                   |                                     | Import Token bindings may lead        |
|                                   |                  |          |                   |                                     | to Incorrect Access Control           |
|                                   |                  |          |                   |                                     | -->avd.aquasec.com/nvd/cve-2021-3127  |
+-----------------------------------+------------------+          +-------------------+-------------------------------------+---------------------------------------+
| github.com/nats-io/nats-server/v2 | CVE-2020-28466   |          | v2.1.9            | v2.2.0                              | Denial of service                     |
|                                   |                  |          |                   |                                     | -->avd.aquasec.com/nvd/cve-2020-28466 |
+                                   +------------------+          +                   +                                     +---------------------------------------+
|                                   | CVE-2021-3127    |          |                   |                                     | nats-server: mishandling              |
|                                   |                  |          |                   |                                     | Import Token bindings may lead        |
|                                   |                  |          |                   |                                     | to Incorrect Access Control           |
|                                   |                  |          |                   |                                     | -->avd.aquasec.com/nvd/cve-2021-3127  |
+                                   +------------------+          +                   +-------------------------------------+---------------------------------------+
|                                   | CVE-2022-24450   |          |                   | 2.7.2                               | nats-server: misusing the             |
|                                   |                  |          |                   |                                     | "dynamically provisioned              |
|                                   |                  |          |                   |                                     | sandbox accounts" feature             |
|                                   |                  |          |                   |                                     |  authenticated user can...            |
|                                   |                  |          |                   |                                     | -->avd.aquasec.com/nvd/cve-2022-24450 |
+-----------------------------------+------------------+----------+-------------------+-------------------------------------+---------------------------------------+

These results come from Trivy from the nats-box image. Upgrading the packages fixed inner dependencies and these crypto and sys packages were upgraded to the latest version.

By checking the code there were some security vulnerabities present in
the net-tools binary such has:

usr/local/bin/nats-top (gobinary)

Total: 3 (UNKNOWN: 1, LOW: 0, MEDIUM: 1, HIGH: 1, CRITICAL: 0)

┌─────────────────────┬─────────────────────┬──────────┬────────────────────────────────────┬───────────────────────────────────┬────────────────────────────────────────────────────────────┐
│       Library       │    Vulnerability    │ Severity │         Installed Version          │           Fixed Version           │                           Title                            │
├─────────────────────┼─────────────────────┼──────────┼────────────────────────────────────┼───────────────────────────────────┼────────────────────────────────────────────────────────────┤
│ golang.org/x/crypto │ CVE-2022-27191      │ HIGH     │ v0.0.0-20220112180741-5e0467b6c7ce │ 0.0.0-20220314234659-1baeb1ce4c0b │ golang: crash in a golang.org/x/crypto/ssh server          │
│                     │                     │          │                                    │                                   │ https://avd.aquasec.com/nvd/cve-2022-27191                 │
│                     ├─────────────────────┼──────────┤                                    │                                   ├────────────────────────────────────────────────────────────┤
│                     │ GHSA-8c26-wmh5-6g9v │ UNKNOWN  │                                    │                                   │ Attackers can cause a crash in SSH servers when the server │
│                     │                     │          │                                    │                                   │ has...                                                     │
│                     │                     │          │                                    │                                   │ GHSA-8c26-wmh5-6g9v          │
├─────────────────────┼─────────────────────┼──────────┼────────────────────────────────────┼───────────────────────────────────┼────────────────────────────────────────────────────────────┤
│ golang.org/x/sys    │ CVE-2022-29526      │ MEDIUM   │ v0.0.0-20220111092808-5a964db01320 │ 0.0.0-20220412211240-33da011f77ad │ golang: syscall: faccessat checks wrong group              │
│                     │                     │          │                                    │                                   │ https://avd.aquasec.com/nvd/cve-2022-29526                 │
└─────────────────────┴─────────────────────┴──────────┴────────────────────────────────────┴───────────────────────────────────┴────────────────────────────────────────────────────────────┘

These results come from Trivy from the nats-box image. Upgrading the
packages fixed inner dependencies and these crypto and sys packages were
upgraded to the latest version.
Copy link
Member

@wallyqs wallyqs left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thanks!

@wallyqs wallyqs merged commit f48bc85 into nats-io:main Oct 3, 2022
@danielcibrao-form3 danielcibrao-form3 deleted the fix/sec-vuln-crypto-and-sys branch October 3, 2022 23:21
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants