vendor: google.golang.org/grpc v1.56.3#4341
Conversation
|
Why do wee need both commits 1.56.2 and 1.56.3 and not just 1.56.3? |
|
I had the 1.56.2 commit because that's the version used by moby/moby currently (had it in a branch I was working on), then recalled that the latest Go CVE also affected grpc; I thought having the CVE-fix in a separate commit made it more apparent, and allowed for reviewing the security fix in isolation. |
|
I think these need to land in containerd first. Otherwise, we don't know what this is breaking. The CVE does not apply to buildkit afaics because buildkit can only be accessed from authenticated API. |
full diff: - grpc/grpc-go@v1.53.0...v1.56.2 - googleapis/go-genproto@7f2fa6f...daa745c Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
server: prohibit more than MaxConcurrentStreams handlers from running at once (CVE-2023-44487). In addition to this change, applications should ensure they do not leave running tasks behind related to the RPC before returning from method handlers, or should enforce appropriate limits on any such work. - grpc/grpc-go@v1.56.2...v1.56.3 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
|
Update in containerd was merged; this good to go, or do we need to wait for containerd to release it? (did a quick rebase to get a fresh run of CI) |
Do we not need to vendor containerd to the version with the fix. |
|
I guess the important questions here were;
It's always the question who "owns" the dependency, but with go modules I don't think there's no other choice than "It's SemVer, so nobody own, and SemVer compatible means "we shouldn't care" (..... in an ideal world). I opened this PR because I was in the process of updating the docker / moby dependency in BuildKit; for Moby we're already on this version, because the Google logging driver forced us to move to a newer version, so while Moby not yet has a |
|
@tonistiigi @crazy-max PTAL; any concerns remaining on this one? |
vendor: google.golang.org/grpc v1.56.2
full diff:
vendor: google.golang.org/grpc v1.56.3
server: prohibit more than MaxConcurrentStreams handlers from running at once
(CVE-2023-44487).
In addition to this change, applications should ensure they do not leave running
tasks behind related to the RPC before returning from method handlers, or should
enforce appropriate limits on any such work.