Bug 2062372
Summary: | CVE-2022-24723 dotnet3.1: urijs: Leading white space bypasses protocol validation [fedora-all] | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | dotnet3.1 | Assignee: | Omair Majid <omajid> |
Status: | CLOSED CURRENTRELEASE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 35 | CC: | crummel, dotnet-packagers, francisco.vergarat, harold, omajid, rjanekov |
Target Milestone: | --- | Keywords: | Security, SecurityTracking |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | No Doc Update | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2022-08-08 17:43:24 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 2062370 |
Description
Guilherme de Almeida Suckevicz
2022-03-09 16:27:05 UTC
Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associated bugs get updated when new packages are pushed to stable. ===== # bugfix, security, enhancement, newpackage (required) type=security # low, medium, high, urgent (required) severity=medium # testing, stable request=testing # Bug numbers: 1234,9876 bugs=2062370,2062372 # Description of your update notes=Security fix for [PUT CVEs HERE] # Enable request automation based on the stable/unstable karma thresholds autokarma=True stable_karma=3 unstable_karma=-3 # Automatically close bugs when this marked as stable close_bugs=True # Suggest that users restart after update suggest_reboot=False ====== Additionally, you may opt to use the bodhi web interface to submit updates: https://bodhi.fedoraproject.org/updates/new Here are all the uses of urijs in Fedora's packaged version of .NET Core 3.1.421: $ ag -A 2 'urijs' src/aspnetcore.1f49b6637a0c3a6af34b42332e06966e4d383d54/src/Components/test/E2ETest/package.json 26: "urijs": ">=1.19.11", 27- "minimist": ">=1.2.6", 28- "async": ">=3.2.2" src/aspnetcore.1f49b6637a0c3a6af34b42332e06966e4d383d54/src/Components/test/E2ETest/yarn.lock 585: urijs "^1.19.1" 586- which "^1.3.1" 587- yauzl "^2.10.0" -- 695:urijs@>=1.19.11, urijs@^1.19.1: 696- version "1.19.11" 697: resolved "https://registry.yarnpkg.com/urijs/-/urijs-1.19.11.tgz#204b0d6b605ae80bea54bea39280cdb7c9f923cc" 698- integrity sha512-HXgFDgDommxn5/bIv0cnQZsPhHDA90NPHD6+c/v21U5+Sx5hoP8+dP9IZXBU1gIfvdRfhG8cel9QNPeionfcCQ== 699- src/aspnetcore.1f49b6637a0c3a6af34b42332e06966e4d383d54/src/ProjectTemplates/test/package.json 19: "urijs": ">=1.19.11", 20- "minimist": ">=1.2.6", 21- "async": ">=3.2.2" src/aspnetcore.1f49b6637a0c3a6af34b42332e06966e4d383d54/src/ProjectTemplates/test/yarn.lock 448: urijs "^1.19.1" 449- which "^1.3.1" 450- yauzl "^2.10.0" -- 529:urijs@>=1.19.11, urijs@^1.19.1: 530- version "1.19.11" 531: resolved "https://registry.yarnpkg.com/urijs/-/urijs-1.19.11.tgz#204b0d6b605ae80bea54bea39280cdb7c9f923cc" 532- integrity sha512-HXgFDgDommxn5/bIv0cnQZsPhHDA90NPHD6+c/v21U5+Sx5hoP8+dP9IZXBU1gIfvdRfhG8cel9QNPeionfcCQ== 533- packages/reference/staging/microsoft.dotnet.web.spa.projecttemplates.3.0/3.0.1/content/React-CSharp/ClientApp/package-lock.json 9924: "integrity": "sha512-8QQikdH7//R2vurIJSutZ1smHYTcLpRWEOlHnzcWHmBYrOGUysKwSsrC89BCiFj3CbrfJ/nXFdJepOVrY1GCHQ==", 9925- "requires": { 9926- "loose-envify": "^1.4.0", packages/reference/staging/microsoft.dotnet.web.spa.projecttemplates.2.1/2.1.34/content/React-CSharp/ClientApp/package-lock.json 2455: "urijs": "1.19.0" 2456- } 2457- }, -- 8740: "urijs": { 8741- "version": "1.19.0", 8742: "resolved": "https://registry.npmjs.org/urijs/-/urijs-1.19.0.tgz", 8743- "integrity": "sha512-Qs2odXn0hST5VSPVjpi73CMqtbAoanahaqWBujGU+IyMrMqpWcIhDewxQRhCkmqYxuyvICDcSuLdv2O7ncWBGw==" 8744- }, packages/reference/staging/microsoft.dotnet.web.spa.projecttemplates.2.1/2.1.34/content/ReactRedux-CSharp/ClientApp/package-lock.json 2455: "urijs": "1.19.0" 2456- } 2457- }, -- 8789: "urijs": { 8790- "version": "1.19.0", 8791: "resolved": "https://registry.npmjs.org/urijs/-/urijs-1.19.0.tgz", 8792- "integrity": "sha512-Qs2odXn0hST5VSPVjpi73CMqtbAoanahaqWBujGU+IyMrMqpWcIhDewxQRhCkmqYxuyvICDcSuLdv2O7ncWBGw==" 8793- }, The versions are all greater than 1.19.11, which includes a fix for the CVE already. The versions in packages/reference are older (1.19.0) but those are only reference packages (think C header files) and are only used to build .NET itself, and do not contain anything that's shipped with the built .NET SDK. |