Bump golang.org/x/crypto from 0.28.0 to 0.31.0 in the go_modules group across 1 directory by dependabot[bot] · Pull Request #931 · nginx/nginx-prometheus-exporter (original) (raw)

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Conversation5 Commits1 Checks14 Files changed

Conversation

This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.Learn more about bidirectional Unicode characters

[ Show hidden characters]({{ revealButtonHref }})

[dependabot[bot]](/apps/dependabot)

Bumps the go_modules group with 1 update in the / directory: golang.org/x/crypto.

Updates golang.org/x/crypto from 0.28.0 to 0.31.0

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

@dependabot

Bumps the go_modules group with 1 update in the / directory: golang.org/x/crypto.

Updates golang.org/x/crypto from 0.28.0 to 0.31.0


updated-dependencies:

Signed-off-by: dependabot[bot] support@github.com

jjngx

vepatel

@jjngx jjngx deleted the dependabot/go_modules/go_modules-5a9c29dde4 branch

December 16, 2024 10:19

@ns-rtorre

@jjngx

@ns-rtorre Nginx-prometheus-exporter code is not affected by this CVE:

➜ nginx-prometheus-exporter git:(main) ✗ govulncheck -show verbose ./... Scanning your code and 251 packages across 26 dependent modules for known vulnerabilities...

Fetching vulnerabilities from the database...

Checking the code against the vulnerabilities...

=== Symbol Results ===

No vulnerabilities found.

=== Package Results ===

No other vulnerabilities found.

=== Module Results ===

Vulnerability #1: GO-2024-3333 Non-linear parsing of case-insensitive content in golang.org/x/net/html More info: https://pkg.go.dev/vuln/GO-2024-3333 Module: golang.org/x/net Found in: golang.org/x/net@v0.32.0 Fixed in: golang.org/x/net@v0.33.0

Your code is affected by 0 vulnerabilities. This scan also found 0 vulnerabilities in packages you import and 1 vulnerability in modules you require, but your code doesn't appear to call these vulnerabilities.

@jjngx

@ns-rtorre and the latest tagged version v1.4.0 wasn't affected either:

➜ nginx-prometheus-exporter git:(main) ✗ git co -b test-140 v1.4.0 Switched to a new branch 'test-140' ➜ nginx-prometheus-exporter git:(test-140) ✗ git lg ➜ nginx-prometheus-exporter git:(test-140) ✗ govulncheck -show verbose ./... Scanning your code and 251 packages across 26 dependent modules for known vulnerabilities...

Fetching vulnerabilities from the database...

Checking the code against the vulnerabilities...

=== Symbol Results ===

No vulnerabilities found.

=== Package Results ===

No other vulnerabilities found.

=== Module Results ===

Vulnerability #1: GO-2024-3333 Non-linear parsing of case-insensitive content in golang.org/x/net/html More info: https://pkg.go.dev/vuln/GO-2024-3333 Module: golang.org/x/net Found in: golang.org/x/net@v0.29.0 Fixed in: golang.org/x/net@v0.33.0

Vulnerability #2: GO-2024-3321 Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto More info: https://pkg.go.dev/vuln/GO-2024-3321 Module: golang.org/x/crypto Found in: golang.org/x/crypto@v0.28.0 Fixed in: golang.org/x/crypto@v0.31.0

Your code is affected by 0 vulnerabilities. This scan also found 0 vulnerabilities in packages you import and 2 vulnerabilities in modules you require, but your code doesn't appear to call these vulnerabilities.

@ns-rtorre

Thanks, I also noticed that the vulnerable function ServerConfig.PublicKeyCallback is not called. Only trouble is that the vulnerable dep crypto 0.28.0 shows up in some bin scans.

@jjngx

Yes, that's the nature of various CVEs scanners.