Skip to content

Conversation

@lotyp
Copy link
Member

@lotyp lotyp commented Jun 13, 2024

No description provided.

@github-actions
Copy link

github-actions bot commented Jun 13, 2024

🔍 Vulnerabilities of wayofdev/php-dev:latest

📦 Image Reference wayofdev/php-dev:latest
digestsha256:c948b0af62ac088b7515a8b110afa4c89864afb30fdc5c7dc9888cad7a7d4473
vulnerabilitiescritical: 0 high: 2 medium: 0 low: 0
size127 MB
packages240
📦 Base Image php:8-alpine
also known as
  • 8-alpine3.19
  • 8-cli-alpine
  • 8-cli-alpine3.19
  • 8.3-alpine
  • 8.3-alpine3.19
  • 8.3-cli-alpine
  • 8.3-cli-alpine3.19
  • 8.3.6-alpine
  • 8.3.6-alpine3.19
  • 8.3.6-cli-alpine
  • 8.3.6-cli-alpine3.19
  • alpine
  • alpine3.19
  • cli-alpine
  • cli-alpine3.19
digestsha256:dc7d4d8248ec8c31bfa65ec964b7db7b34384cf9a3a16ee5fbc8bf25e29c7413
vulnerabilitiescritical: 0 high: 0 medium: 5 low: 0 unspecified: 2
critical: 0 high: 1 medium: 0 low: 0 google.golang.org/grpc 1.54.0 (golang)

pkg:golang/google.golang.org/grpc@1.54.0

high 7.5: GHSA--m425--mq94--257g

Affected range<1.56.3
Fixed version1.56.3
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Impact

In affected releases of gRPC-Go, it is possible for an attacker to send HTTP/2 requests, cancel them, and send subsequent requests, which is valid by the HTTP/2 protocol, but would cause the gRPC-Go server to launch more concurrent method handlers than the configured maximum stream limit.

Patches

This vulnerability was addressed by #6703 and has been included in patch releases: 1.56.3, 1.57.1, 1.58.3. It is also included in the latest release, 1.59.0.

Along with applying the patch, users should also ensure they are using the grpc.MaxConcurrentStreams server option to apply a limit to the server's resources used for any single connection.

Workarounds

None.

References

#6703

critical: 0 high: 1 medium: 0 low: 0 golang.org/x/net 0.8.0 (golang)

pkg:golang/golang.org/x/net@0.8.0

high 7.5: CVE--2023--39325 Uncontrolled Resource Consumption

Affected range<0.17.0
Fixed version0.17.0
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score0.21%
EPSS Percentile59th percentile
Description

A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing.

With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection.

This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2.

The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.

@github-actions
Copy link

github-actions bot commented Jun 13, 2024

Recommended fixes for image wayofdev/php-dev:latest

Base image is php:8-alpine

Name8.3.6-alpine3.19
Digestsha256:dc7d4d8248ec8c31bfa65ec964b7db7b34384cf9a3a16ee5fbc8bf25e29c7413
Vulnerabilitiescritical: 0 high: 0 medium: 5 low: 0 unspecified: 2
Pushed2 months ago
Size38 MB
Packages49
Flavoralpine
OS3.19
Runtime8.3.6
The base image is also available under the supported tag(s): 8-alpine3.19, 8-cli-alpine, 8-cli-alpine3.19, 8.3-alpine, 8.3-alpine3.19, 8.3-cli-alpine, 8.3-cli-alpine3.19, alpine, alpine3.19, cli-alpine, cli-alpine3.19

Refresh base image

Rebuild the image using a newer base image version. Updating this may result in breaking changes.
TagDetailsPushedVulnerabilities
8-alpine
Newer image for same tag
Also known as:
  • 8.3.8-cli-alpine
  • 8.3.8-cli-alpine3.20
  • 8.3-cli-alpine
  • 8.3-cli-alpine3.20
  • 8-cli-alpine
  • 8-cli-alpine3.20
  • cli-alpine
  • cli-alpine3.20
  • alpine
  • alpine3.20
  • 8.3.8-alpine
  • 8.3.8-alpine3.20
  • 8.3-alpine
  • 8.3-alpine3.20
  • 8-alpine3.20
Benefits:
  • Same OS detected
  • Minor runtime version update
  • Newer image for same tag
  • Image is smaller by 1.7 MB
  • Tag was pushed more recently
  • Image introduces no new vulnerability but removes 3
  • Image contains similar number of packages
  • 8-alpine was pulled 1.6K times last month
Image details:
  • Size: 37 MB
  • Flavor: alpine
  • OS: 3.20
  • Runtime: 8.3.8
6 days ago



Change base image

TagDetailsPushedVulnerabilities
8-alpine3.19
Minor runtime version update
Also known as:
  • 8.3.8-cli-alpine3.19
  • 8.3-cli-alpine3.19
  • 8-cli-alpine3.19
  • cli-alpine3.19
  • alpine3.19
  • 8.3.8-alpine3.19
  • 8.3-alpine3.19
Benefits:
  • Same OS detected
  • Minor runtime version update
  • Image is smaller by 476 KB
  • Tag was pushed more recently
  • Image has same number of vulnerabilities
  • Image contains similar number of packages
Image details:
  • Size: 38 MB
  • Flavor: alpine
  • OS: 3.19
  • Runtime: 8.3.8
6 days ago



@lotyp lotyp merged commit 02ca057 into master Jun 13, 2024
@lotyp lotyp deleted the feat/php-8-3 branch June 13, 2024 10:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants