Skip to content

fix: remediate CVE-2022-28948 - bump gopkg.in/yaml.v3 to v3.0.1#102

Open
Ompragash wants to merge 1 commit intomasterfrom
fix/cve-2022-28948-yaml-v3
Open

fix: remediate CVE-2022-28948 - bump gopkg.in/yaml.v3 to v3.0.1#102
Ompragash wants to merge 1 commit intomasterfrom
fix/cve-2022-28948-yaml-v3

Conversation

@Ompragash
Copy link
Copy Markdown
Member

Security Remediation - CVE-2022-28948

Summary

This PR bumps gopkg.in/yaml.v3 from v3.0.0-20210107192922-496545a6307b to v3.0.1 to remediate a HIGH severity vulnerability.

Patched CVEs

CVE Severity Package Fixed Version Advisory
CVE-2022-28948 HIGH gopkg.in/yaml.v3 v3.0.1 GHSA-hp87-p4gw-j4gq

Vulnerability Details

CVE-2022-28948 / GHSA-hp87-p4gw-j4gq
A crafted YAML document can trigger a panic in gopkg.in/yaml.v3's unmarshaling logic (CWE-502), enabling a Denial-of-Service attack. Fixed in v3.0.1.

Files Changed

  • go.mod - bumped gopkg.in/yaml.v3 to v3.0.1
  • go.sum - regenerated checksums via go mod tidy

Test Results

All tests passed - go test ./...

  • ok github.com/drone-plugins/drone-buildx
  • ok github.com/drone-plugins/drone-buildx/cmd/drone-ecr
  • ok github.com/drone-plugins/drone-buildx/config/docker

Unfixed CVEs (No patch available)

None.


This PR was automatically generated by Vigil - Harness Security Remediation Agent.

Upgrades gopkg.in/yaml.v3 from v3.0.0-20210107192922-496545a6307b to
v3.0.1 to address CVE-2022-28948 (HIGH severity) — a panic via crafted
YAML input. All tests pass.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant