Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: address CVE-2022-24434, GHSA-wm7h-9275-46v2 caused by dicer #3420

Conversation

petermetz
Copy link
Contributor

The process for this fix was to:

  1. yarn why -R dicer
  2. Then examine the output of that and see which dependencies are using
    dicer indirectly (transient dependencies)
  3. yarn up multer --exact
  4. yarn up express-openapi-validator --exact
  5. Profit, e.g. running yarn why -R dicer at this point shows that
    dicer has been eliminated from the dependency tree completely.

https://github.com/hyperledger/cacti/security/dependabot/176

Weaknesses
CWE-248

CVE ID
CVE-2022-24434

GHSA ID
GHSA-wm7h-9275-46v2

Signed-off-by: Peter Somogyvari [email protected]

Pull Request Requirements

  • Rebased onto upstream/main branch and squashed into single commit to help maintainers review it more efficient and to avoid spaghetti git commit graphs that obfuscate which commit did exactly what change, when and, why.
  • Have git sign off at the end of commit message to avoid being marked red. You can add -s flag when using git commit command. You may refer to this link for more information.
  • Follow the Commit Linting specification. You may refer to this link for more information.

Character Limit

  • Pull Request Title and Commit Subject must not exceed 72 characters (including spaces and special characters).
  • Commit Message per line must not exceed 80 characters (including spaces and special characters).

A Must Read for Beginners
For rebasing and squashing, here's a must read guide for beginners.

The process for this fix was to:
1. `yarn why -R dicer`
2. Then examine the output of that and see which dependencies are using
dicer indirectly (transient dependencies)
3. `yarn up multer --exact`
4. `yarn up express-openapi-validator --exact`
5. Profit, e.g. running `yarn why -R dicer` at this point shows that
dicer has been eliminated from the dependency tree completely.

https://github.com/hyperledger/cacti/security/dependabot/176

Weaknesses
CWE-248

CVE ID
CVE-2022-24434

GHSA ID
GHSA-wm7h-9275-46v2

Also sneaking in a test case hot-fix for
besu/deploy-contract/private-deploy-contract-from-json-cactus.test.ts
where the error message assertion broke down after a change in error
handling of the contract deployment endpoint.

Signed-off-by: Peter Somogyvari <[email protected]>
@petermetz petermetz force-pushed the fix-cve-2022-24434-dicer-ghsa-wm7h-9275-46v2 branch from ca0b1dc to 0060c9c Compare July 18, 2024 16:31
@petermetz petermetz merged commit 6ff8111 into hyperledger-cacti:main Jul 18, 2024
139 of 143 checks passed
@petermetz petermetz deleted the fix-cve-2022-24434-dicer-ghsa-wm7h-9275-46v2 branch July 18, 2024 17:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants