Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Add length check to github signature#187

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Open
AdamKorcz wants to merge1 commit intogo-playground:master
base:master
Choose a base branch
Loading
fromAdamKorcz:fix-out-of-range

Conversation

@AdamKorcz
Copy link

Adds a length check to avoid an out-of-range panic.

@coveralls
Copy link

coveralls commentedNov 18, 2023
edited
Loading

Coverage Status

coverage: 88.586% (-0.2%) from 88.765%
when pullingf4db242 on AdamKorcz:fix-out-of-range
into53694f8 on go-playground:master.

@AdamKorczAdamKorczforce-pushed thefix-out-of-range branch 3 times, most recently from5554ed1 to316ebeeCompareNovember 18, 2023 15:26
@davidhadas
Copy link

@robinlieb, this PR relates to a Security Audit done to the CNCF Knative Project,
Knative uses this repository as a dependency and the audit requires this to be fixed.

Can you check to see if this PR is expected to be fixed any time soon, or should Knative look for alternatives instead?

@robinlieb
Copy link
Member

Hi@AdamKorcz,
is this change still needed after the merge of#173?

@AdamKorcz
Copy link
Author

Hi@AdamKorcz, is this change still needed after the merge of#173?

Yes

@AdamKorcz
Copy link
Author

@robinlieb Can you have a look athttps://github.com/go-playground/webhooks/security/advisories/GHSA-m7vc-6h95-xrjq and invite@davidhadas as a collaborator there as well?

Signed-off-by: AdamKorcz <adam@adalogics.com>
@evankanderson
Copy link

@robinlieb Can you have a look athttps://github.com/go-playground/webhooks/security/advisories/GHSA-m7vc-6h95-xrjq and invite@davidhadas as a collaborator there as well?

I'm the other security lead on Knative, and I'd appreciate if I could be on this issue as well.

@evankanderson
Copy link

Actually,#173did fix this by swapping[]byte(signature[5:]) forstrings.TrimSignature, which removes the slice indexing.

I think we can close this given#173 being merged. Do you agree@AdamKorcz ?

@robinlieb
Copy link
Member

Seems like I don't have access neither.@deankarn can you have a look and add me and the two mentioned in the thread to this security advisory?

@deankarn
Copy link
Collaborator

Maybe I missed something how would I add someone to the security advisory? Not sure I understand.

@AdamKorcz
Copy link
Author

Maybe I missed something how would I add someone to the security advisory? Not sure I understand.

https://docs.github.com/en/code-security/security-advisories/working-with-repository-security-advisories/adding-a-collaborator-to-a-repository-security-advisory

@deankarn
Copy link
Collaborator

OK y'all should be added now as collaborators.

Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

No reviews

Assignees

No one assigned

Labels

None yet

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

6 participants

@AdamKorcz@coveralls@davidhadas@robinlieb@evankanderson@deankarn

[8]ページ先頭

©2009-2025 Movatter.jp