Skip to content

chore(deps): update dependency open-component-model/ocm to v0.22.1 #11336

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Apr 3, 2025

Conversation

uniget-bot
Copy link

This PR contains the following updates:

Package Update Change
open-component-model/ocm patch 0.22.0 -> 0.22.1

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

open-component-model/ocm (open-component-model/ocm)

v0.22.1

Compare Source

What's Changed

🐛 Bug Fixes
🧰 Maintenance

Full Changelog: open-component-model/ocm@v0.22.0...v0.22.1


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

Copy link

@nicholasdille-bot nicholasdille-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved because label type/renovate is present.

Copy link

github-actions bot commented Apr 3, 2025

🔍 Vulnerabilities of ghcr.io/uniget-org/tools/ocm:0.22.1

📦 Image Reference ghcr.io/uniget-org/tools/ocm:0.22.1
digestsha256:18286cf99e9269089842a267a5c4e612b4693eeb1d807af86a1316bbf87a329a
vulnerabilitiescritical: 0 high: 1 medium: 0 low: 1
platformlinux/amd64
size32 MB
packages335
critical: 0 high: 1 medium: 0 low: 0 github.com/golang-jwt/jwt/v4 4.5.1 (golang)

pkg:golang/github.com/golang-jwt/jwt/v4@4.5.1

high 8.7: CVE--2025--30204 Asymmetric Resource Consumption (Amplification)

Affected range<4.5.2
Fixed version4.5.2
CVSS Score8.7
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Description

Summary

Function parse.ParseUnverified currently splits (via a call to strings.Split) its argument (which is untrusted data) on periods.

As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. Relevant weakness: CWE-405: Asymmetric Resource Consumption (Amplification)

Details

See parse.ParseUnverified

Impact

Excessive memory allocation

critical: 0 high: 0 medium: 0 low: 1 github.com/redis/go-redis/v9 9.7.1 (golang)

pkg:golang/github.com/redis/go-redis/v9@9.7.1

low 3.7: CVE--2025--29923 Improper Input Validation

Affected range>=9.7.0-beta.1
<9.7.3
Fixed version9.7.3
CVSS Score3.7
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Description

Impact

The issue only occurs when the CLIENT SETINFO command times out during connection establishment. The following circumstances can cause such a timeout:

  1. The client is configured to transmit its identity. This can be disabled via the DisableIndentity flag.
  2. There are network connectivity issues
  3. The client was configured with aggressive timeouts

The impact differs by use case:

  • Sticky connections: Rather than using a connection from the pool on-demand, the caller can stick with a connection. Then you receive persistent out-of-order responses for the lifetime of the connection.
  • Pipelines: All commands in the pipeline receive incorrect responses.
  • Default connection pool usage without pipelining: When used with the default ConnPool once a connection is returned after use with ConnPool#Put the read buffer will be checked and the connection will be marked as bad due to the unread data. This means that at most one out-of-order response before the connection is discarded.

Patches

We prepared a fix in redis/go-redis#3295 and plan to release patch versions soon.

Workarounds

You can prevent the vulnerability by setting the flag DisableIndentity (BTW: We also need to fix the spelling.) to true when constructing the client instance.

Credit

Akhass Wasti
Ramin Ghorashi
Anton Amlinger
Syed Rahman
Mahesh Venkateswaran
Sergey Zavoloka
Aditya Adarwal
Abdulla Anam
Abd-Alhameed
Alex Vanlint
Gaurav Choudhary
Vedanta Jha
Yll Kelani
Ryan Picard

Copy link

github-actions bot commented Apr 3, 2025

Attempting automerge. See https://github.com/uniget-org/tools/actions/runs/14233394857.

Copy link

github-actions bot commented Apr 3, 2025

PR is clean and can be merged. See https://github.com/uniget-org/tools/actions/runs/14233394857.

@github-actions github-actions bot merged commit fcc3032 into main Apr 3, 2025
10 of 11 checks passed
@github-actions github-actions bot deleted the renovate/open-component-model-ocm-0.22.x branch April 3, 2025 02:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants