Join GitHub today
GitHub is home to over 31 million developers working together to host and review code, manage projects, and build software together.
Sign upThe vendored Azure autorest may present security issues #3987
Comments
This comment has been minimized.
This comment has been minimized.
|
Would you like to send a PR updating the vendoring? |
This comment has been minimized.
This comment has been minimized.
|
Hi Brian, I'd love to if I could, but my Go foo is not sufficient right now I fear. |
This comment has been minimized.
This comment has been minimized.
|
It's only a govendor fetch, and then verifying that it works. |
This comment has been minimized.
This comment has been minimized.
|
I'm pretty sure the current vendored azure is so ancient, it's not just changing the azure references to the latest releases, but it also needs some code adjustments. And since it has security implications, really not something I'd trust myself with right now (maybe later when I have more Go experience) |
This comment has been minimized.
This comment has been minimized.
|
Hi everyone, I'm new in Go and Prometheus community. Hope my pull request will be helpful. |
This comment has been minimized.
This comment has been minimized.
|
Fixed by #4147 |
simonpasquier
closed this
Aug 1, 2018
This comment has been minimized.
This comment has been minimized.
lock
bot
commented
Mar 22, 2019
|
This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs. |
nim-nim commentedMar 20, 2018
A race condition was discovered in the Azure Active Directory client of github.com/Azure/go-autorest/ when refreshing auth tokens, requiring an API change to fix and the bump of the autorest major version from 9 to 10.
prometheus is still built against an ancient 7.2.2 pre-10 autorest version with the security issue (and probably many others fixed since).
It would be awfully nice if it could be switched to the latest autorest 10 release and the matching azure 14.x release (which is out of beta unlike the currently vendored version)
I've no idea if the race is exploitable but in such cases it's better not to try to be smarter than attackers and just apply security fixes.