-
-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
traefik: 3.1.2 -> 3.1.4 #344149
traefik: 3.1.2 -> 3.1.4 #344149
Conversation
This fixes CVE-2024-45410[0] (GHSA-62c8-mh53-4cqv[1]). [0]: https://nvd.nist.gov/vuln/detail/CVE-2024-45410 [1]: GHSA-62c8-mh53-4cqv Signed-off-by: Sefa Eyeoglu <contact@scrumplex.net>
Result of 1 package built:
|
@ofborg test traefik |
CC @NixOS/security This PR fixes a critical vulnerability in Traefik. See https://nvd.nist.gov/vuln/detail/CVE-2024-45410 GHSA-62c8-mh53-4cqv |
@Scrumplex Are you planning to apply a patch for NixOS 24.05? |
By which I mean a patch application should be investigated! |
According to GHSA-62c8-mh53-4cqv, any Traefik v3 version before 3.1.3 is affected. As 24.05 is on 3.0.4 it should probably also be updated. I will prepare a PR. |
I just noticed that we don't have go_1_23 on 24.05 |
Could be traefik/traefik@5841441 |
traefik/traefik@5841441 can't be applied onto v3. That change was merged into v2 and then merged into v3 in traefik/traefik@093989f which is a much larger merge as well. |
Gross. |
traefik/traefik@093989f#diff-164089fbccd1553baf9568ff75818f506cc9d96c524d6b9454b672e0f959a33d (pkg/middlewares/forwardedheaders/forwarded_header.go) looks like the relevant bits. |
I have prepared Scrumplex/traefik@21f0062 which is traefik/traefik@5841441 but merged into v3.1.2 (the last version before upstream updated to Go 1.23) What I had to merge:
Edit: I corrected the patch just now. I didn't merge one line properly (variable declaration instead of assignment in headers.go) |
See #344222 |
Description of changes
This fixes CVE-2024-45410[0] (GHSA-62c8-mh53-4cqv[1]).
Closes #344144
Relevant Releases:
https://github.com/traefik/traefik/releases/tag/v3.1.3 (actual vulnerability fix)
https://github.com/traefik/traefik/releases/tag/v3.1.4 (latest release)
Things done
nix.conf
? (See Nix manual)sandbox = relaxed
sandbox = true
nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"
. Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/
)Add a 👍 reaction to pull requests you find important.