Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2021-44716 (High) detected in github.com/docker/Cli-v20.10.7+incompatible, github.com/docker/distribution-v2.7.1 #109

Open
mend-bolt-for-github bot opened this issue Jun 15, 2022 · 2 comments
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource no-issue-activity

Comments

@mend-bolt-for-github
Copy link
Contributor

mend-bolt-for-github bot commented Jun 15, 2022

CVE-2021-44716 - High Severity Vulnerability

Vulnerable Libraries - github.com/docker/Cli-v20.10.7+incompatible, github.com/docker/distribution-v2.7.1

github.com/docker/Cli-v20.10.7+incompatible

The Docker CLI

Library home page: https://proxy.golang.org/github.com/docker/!cli/@v/v20.10.7+incompatible.zip

Path to dependency file: /go.mod

Path to vulnerable library: /go.mod

Dependency Hierarchy:

  • github.com/google/go-containerregistry-v0.6.0 (Root Library)
    • github.com/docker/Cli-v20.10.7+incompatible (Vulnerable Library)
github.com/docker/distribution-v2.7.1

The toolkit to pack, ship, store, and deliver container content

Library home page: https://proxy.golang.org/github.com/docker/distribution/@v/v2.7.1+incompatible.zip

Path to dependency file: /go.mod

Path to vulnerable library: /go.mod

Dependency Hierarchy:

  • github.com/docker/distribution-v2.7.1 (Vulnerable Library)

Found in HEAD commit: df1f7d3f67826e841793324e4796be4fbd91c00f

Found in base branch: main

Vulnerability Details

net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests.

Publish Date: 2022-01-01

URL: CVE-2021-44716

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-vc3p-29h2-gpcp

Release Date: 2022-01-01

Fix Resolution: github.com/golang/net - 491a49abca63de5e07ef554052d180a1b5fe2d70


Step up your Open Source Security Game with Mend here

@mend-bolt-for-github mend-bolt-for-github bot added the Mend: dependency security vulnerability Security vulnerability detected by WhiteSource label Jun 15, 2022
@github-actions
Copy link

Stale issue message

@mend-bolt-for-github mend-bolt-for-github bot changed the title CVE-2021-44716 (High) detected in multiple libraries CVE-2021-44716 (High) detected in github.com/docker/Cli-v20.10.7+incompatible, github.com/docker/distribution-v2.7.1 Jan 19, 2025
Copy link
Contributor Author

ℹ️ This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource no-issue-activity
Projects
None yet
Development

No branches or pull requests

0 participants