Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: CVE-2024-45337: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass #8088

Merged
merged 1 commit into from
Dec 16, 2024

Conversation

jdesouza
Copy link
Contributor

@jdesouza jdesouza commented Dec 12, 2024

CVE-2024-45337: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass

Description

CVE-2024-45337: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass

Related issues

  • Close #XXX

Related PRs

  • #XXX
  • #YYY

Remove this section if you don't have related PRs.

Checklist

  • I've read the guidelines for contributing to this repository.
  • I've followed the conventions in the PR title.
  • I've added tests that prove my fix is effective or that my feature works.
  • I've updated the documentation with the relevant information (if needed).
  • I've added usage information (if the PR introduces new options)
  • I've included a "before" and "after" example to the description (if the PR is a user interface change).

@jdesouza jdesouza requested a review from knqyf263 as a code owner December 12, 2024 12:56
@jdesouza jdesouza changed the title CVE-2024-45337: Misuse of ServerConfig.PublicKeyCallback may cause au… CVE-2024-45337: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass Dec 12, 2024
@jdesouza jdesouza changed the title CVE-2024-45337: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass fix: CVE-2024-45337: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass Dec 12, 2024
Copy link
Collaborator

@knqyf263 knqyf263 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We confirmed it wouldn't affect Trivy, so users don't need to care about it, but it's better to fix it anyway. Thanks.

Ref: #8100

@knqyf263 knqyf263 added this pull request to the merge queue Dec 16, 2024
Merged via the queue into aquasecurity:main with commit d7ac286 Dec 16, 2024
12 of 21 checks passed
@knqyf263
Copy link
Collaborator

After I reviewed GHSA-v778-237x-gjrc again, it turned out v0.30.0 was not a patched version.
#8103

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants