You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We are using ansible-operator-plugins for some internal developments and after performing SAST on the project we noticed that that the used protobuf version is vulnerable to several attacks:
✗ Medium severity vulnerability found in google.golang.org/protobuf/internal/encoding/json
Description: Infinite loop
Info: LINK
Introduced through: google.golang.org/protobuf/internal/encoding/[email protected]
From: google.golang.org/protobuf/internal/encoding/[email protected]
Fixed in: 1.33.0
CVE: LINK
✗ Medium severity vulnerability found in google.golang.org/protobuf/encoding/protojson
Description: Stack-based Buffer Overflow
Info: LINK
Introduced through: google.golang.org/protobuf/encoding/[email protected]
From: google.golang.org/protobuf/encoding/[email protected]
Fixed in: 1.32.0
✗ Medium severity vulnerability found in google.golang.org/protobuf/encoding/protojson
Description: Infinite loop
Info: LINK
Introduced through: google.golang.org/protobuf/encoding/[email protected]
From: google.golang.org/protobuf/encoding/[email protected]
Fixed in: 1.33.0
Vulnerability Report: LINK
Would it be possible that the probuf version is updated to the most recent version? Thank you!
The text was updated successfully, but these errors were encountered:
Hello!
We are using ansible-operator-plugins for some internal developments and after performing SAST on the project we noticed that that the used protobuf version is vulnerable to several attacks:
✗ Medium severity vulnerability found in google.golang.org/protobuf/internal/encoding/json
Description: Infinite loop
Info: LINK
Introduced through: google.golang.org/protobuf/internal/encoding/[email protected]
From: google.golang.org/protobuf/internal/encoding/[email protected]
Fixed in: 1.33.0
CVE: LINK
✗ Medium severity vulnerability found in google.golang.org/protobuf/encoding/protojson
Description: Stack-based Buffer Overflow
Info: LINK
Introduced through: google.golang.org/protobuf/encoding/[email protected]
From: google.golang.org/protobuf/encoding/[email protected]
Fixed in: 1.32.0
✗ Medium severity vulnerability found in google.golang.org/protobuf/encoding/protojson
Description: Infinite loop
Info: LINK
Introduced through: google.golang.org/protobuf/encoding/[email protected]
From: google.golang.org/protobuf/encoding/[email protected]
Fixed in: 1.33.0
Vulnerability Report: LINK
Would it be possible that the probuf version is updated to the most recent version? Thank you!
The text was updated successfully, but these errors were encountered: