Skip to content

Commit

Permalink
ci: auto-formatting prettier issues
Browse files Browse the repository at this point in the history
  • Loading branch information
frederickjoi authored and github-actions[bot] committed Sep 20, 2024
1 parent c1cbc23 commit c0b7f11
Show file tree
Hide file tree
Showing 3 changed files with 13 additions and 6 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,9 @@ input.

## Our Official Summary

A flaw was found in the Unmarshal function in Go-Yaml. This vulnerability results in program crashes when attempting to convert (or deserialize) invalid input data, potentially impacting system stability and reliability. 3rd party images affected will be upgraded to remove the vulnerability.
A flaw was found in the Unmarshal function in Go-Yaml. This vulnerability results in program crashes when attempting to
convert (or deserialize) invalid input data, potentially impacting system stability and reliability. 3rd party images
affected will be upgraded to remove the vulnerability.

## CVE Severity

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,9 +27,12 @@ parsed headers.

## Our Official Summary

This CVE involves excessive memory allocation in net/http and net/textproto, potentially leading to a denial-of-service due to large memory allocation while parsing HTTP and MIME
headers even for small inputs. Attackers can exploit this vulnerability to exhaust an HTTP server's memory resources, causing a denial of service. By crafting specific input data
patterns, an attacker can trigger the excessive memory allocation behavior in the HTTP and MIME header parsing functions, leading to memory exhaustion. The risk of this vulnerability exploited in Spectro Cloud products is very low. 3rd party images affected will be upgraded to remove the vulnerability.
This CVE involves excessive memory allocation in net/http and net/textproto, potentially leading to a denial-of-service
due to large memory allocation while parsing HTTP and MIME headers even for small inputs. Attackers can exploit this
vulnerability to exhaust an HTTP server's memory resources, causing a denial of service. By crafting specific input data
patterns, an attacker can trigger the excessive memory allocation behavior in the HTTP and MIME header parsing
functions, leading to memory exhaustion. The risk of this vulnerability exploited in Spectro Cloud products is very low.
3rd party images affected will be upgraded to remove the vulnerability.

## CVE Severity

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,8 +24,10 @@ service.

## Our Official Summary

This is a vulnerability in libtiff that can be exploited by a remote attacker to cause a heap-buffer overflow and denial-of-service. The vulnerability is caused by a segment
fault (SEGV) flaw that can be triggered when a crafted TIFF file is passed to the TIFFReadRGBATileExt() API. Investigating a possible fix for this vulnerability on the affected images.
This is a vulnerability in libtiff that can be exploited by a remote attacker to cause a heap-buffer overflow and
denial-of-service. The vulnerability is caused by a segment fault (SEGV) flaw that can be triggered when a crafted TIFF
file is passed to the TIFFReadRGBATileExt() API. Investigating a possible fix for this vulnerability on the affected
images.

## CVE Severity

Expand Down

0 comments on commit c0b7f11

Please sign in to comment.