Skip to content

[ci] fix false positive CVE scan from node#17510

Merged
mattklein123 merged 2 commits intoenvoyproxy:mainfrom
asraa:cve-false
Jul 28, 2021
Merged

[ci] fix false positive CVE scan from node#17510
mattklein123 merged 2 commits intoenvoyproxy:mainfrom
asraa:cve-false

Conversation

@asraa
Copy link
Contributor

@asraa asraa commented Jul 27, 2021

Signed-off-by: Asra Ali asraa@google.com

Commit Message: Fixes a false positive caught by the CVE scanner from a Node issue
Additional Description:
Risk Level: Low
Testing:
Docs Changes:
Release Notes:
Platform Specific Features:
[Optional Runtime guard:]
[Optional Fixes #Issue]
[Optional Deprecated:]
[Optional API Considerations:]

See https://dev.azure.com/cncf/envoy/_build/results?buildId=83597&view=logs&j=12f1170f-54f2-53f3-20dd-22fc7dff55f9&t=9c939e41-62c2-5605-5e05-fc3554afc9f5&l=164

  CVE ID: CVE-2021-22918
  CVSS v3 score: 5.3
  Severity: MEDIUM
  Published date: 2021-07-12
  Last modified date: 2021-07-20
  Dependencies: com_github_nodejs_http_parser
  Description: Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-
  bounds read when uv__idna_toascii() is used to convert strings to
  ASCII. The pointer p is read and increased without checking whether it
  is beyond pe, with the latter holding a pointer to the end of the
  buffer. This can lead to information disclosures or crashes. This
  function can be triggered via uv_getaddrinfo().
  Affected CPEs:
  - cpe:2.3:a:nodejs:node.js:*

  CVE ID: CVE-2021-22921
  CVSS v3 score: 7.8
  Severity: HIGH
  Published date: 2021-07-12
  Last modified date: 2021-07-15
  Dependencies: com_github_nodejs_http_parser
  Description: Node.js before 16.4.1, 14.17.2, and 12.22.2 is vulnerable to local
  privilege escalation attacks under certain conditions on Windows
  platforms. More specifically, improper configuration of permissions in
  the installation directory allows an attacker to perform two different
  escalation attacks: PATH and DLL hijacking.

asraa added 2 commits July 27, 2021 15:55
Signed-off-by: Asra Ali <asraa@google.com>
Signed-off-by: Asra Ali <asraa@google.com>
@mattklein123 mattklein123 merged commit 9bd86b8 into envoyproxy:main Jul 28, 2021
baojr added a commit to baojr/envoy that referenced this pull request Jul 29, 2021
…bridge-stream

* upstream/main: (140 commits)
  quiche: remove google quic support (envoyproxy#17465)
  runtime: removing envoy.reloadable_features.check_ocsp_policy (envoyproxy#17524)
  upstream: not trying to do HTTP/3 where not configured (envoyproxy#17454)
  api: Remove confusing line about auto-generation (envoyproxy#17536)
  v2: removing bootstrap (envoyproxy#17523)
  connpool: Fix crash in pool removal if the cluster was already deleted (envoyproxy#17522)
  Enhance the comments clearly (envoyproxy#17517)
  mysql proxy: connection attributes parsing  (envoyproxy#17209)
  [ci] fix false positive CVE scan from node (envoyproxy#17510)
  Fixing Envoy Mobile factory strings (envoyproxy#17509)
  http3: validating codec (envoyproxy#17452)
  quic: add QUIC upstream stream reset error stats (envoyproxy#17496)
  thrift proxy: move UpstreamRequest into its own file (envoyproxy#17498)
  docs: Fixed FaultDelay docs. (envoyproxy#17495)
  updates links to jaegertracing-plugin.tar.gz (envoyproxy#17497)
  http: make custom inline headers bootstrap configurable (envoyproxy#17330)
  deps: update yaml-cpp to latest master (envoyproxy#17489)
  improving tracer coverage (envoyproxy#17493)
  Increase buffer size of `Win32RedirectRecords` (envoyproxy#17471)
  ext_proc: Fix problem with buffered body mode with empty or no body (envoyproxy#17430)
  ...

Signed-off-by: Garrett Bourg <bourg@squareup.com>
leyao-daily pushed a commit to leyao-daily/envoy that referenced this pull request Sep 30, 2021
Signed-off-by: Asra Ali <asraa@google.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants