You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@superset.apache.org by GitBox <gi...@apache.org> on 2022/04/06 14:42:02 UTC

[GitHub] [superset] dependabot[bot] opened a new pull request, #19566: chore(deps): bump node-forge from 1.2.1 to 1.3.1 in /docs

dependabot[bot] opened a new pull request, #19566:
URL: https://github.com/apache/superset/pull/19566

   Bumps [node-forge](https://github.com/digitalbazaar/forge) from 1.2.1 to 1.3.1.
   <details>
   <summary>Changelog</summary>
   <p><em>Sourced from <a href="https://github.com/digitalbazaar/forge/blob/main/CHANGELOG.md">node-forge's changelog</a>.</em></p>
   <blockquote>
   <h2>1.3.1 - 2022-03-29</h2>
   <h3>Fixes</h3>
   <ul>
   <li>RFC 3447 and RFC 8017 allow for optional <code>DigestAlgorithm</code> <code>NULL</code> parameters
   for <code>sha*</code> algorithms and require <code>NULL</code> paramters for <code>md2</code> and <code>md5</code>
   algorithms.</li>
   </ul>
   <h2>1.3.0 - 2022-03-17</h2>
   <h3>Security</h3>
   <ul>
   <li>Three RSA PKCS#1 v1.5 signature verification issues were reported by Moosa
   Yahyazadeh (<a href="mailto:moosa-yahyazadeh@uiowa.edu">moosa-yahyazadeh@uiowa.edu</a>).</li>
   <li><strong>HIGH</strong>: Leniency in checking <code>digestAlgorithm</code> structure can lead to
   signature forgery.
   <ul>
   <li>The code is lenient in checking the digest algorithm structure. This can
   allow a crafted structure that steals padding bytes and uses unchecked
   portion of the PKCS#1 encoded message to forge a signature when a low
   public exponent is being used. For more information, please see
   <a href="https://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE/">&quot;Bleichenbacher's RSA signature forgery based on implementation
   error&quot;</a>
   by Hal Finney.</li>
   <li>CVE ID: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24771">CVE-2022-24771</a></li>
   <li>GHSA ID: <a href="https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765">GHSA-cfm4-qjh2-4765</a></li>
   </ul>
   </li>
   <li><strong>HIGH</strong>: Failing to check tailing garbage bytes can lead to signature
   forgery.
   <ul>
   <li>The code does not check for tailing garbage bytes after decoding a
   <code>DigestInfo</code> ASN.1 structure. This can allow padding bytes to be removed
   and garbage data added to forge a signature when a low public exponent is
   being used.  For more information, please see <a href="https://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE/">&quot;Bleichenbacher's RSA
   signature forgery based on implementation
   error&quot;</a>
   by Hal Finney.</li>
   <li>CVE ID: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24772">CVE-2022-24772</a></li>
   <li>GHSA ID: <a href="https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g">GHSA-x4jg-mjrx-434g</a></li>
   </ul>
   </li>
   <li><strong>MEDIUM</strong>: Leniency in checking type octet.
   <ul>
   <li><code>DigestInfo</code> is not properly checked for proper ASN.1 structure. This can
   lead to successful verification with signatures that contain invalid
   structures but a valid digest.</li>
   <li>CVE ID: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24773">CVE-2022-24773</a></li>
   <li>GHSA ID: <a href="https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr">GHSA-2r2c-g63r-vccr</a></li>
   </ul>
   </li>
   </ul>
   <h3>Fixed</h3>
   <ul>
   <li>[asn1] Add fallback to pretty print invalid UTF8 data.</li>
   <li>[asn1] <code>fromDer</code> is now more strict and will default to ensuring all input
   bytes are parsed or throw an error. A new option <code>parseAllBytes</code> can disable
   this behavior.
   <ul>
   <li><strong>NOTE</strong>: The previous behavior is being changed since it can lead to
   security issues with crafted inputs. It is possible that code doing custom
   DER parsing may need to adapt to this new behavior and optional flag.</li>
   </ul>
   </li>
   <li>[rsa] Add and use a validator to check for proper structure of parsed ASN.1</li>
   </ul>
   <!-- raw HTML omitted -->
   </blockquote>
   <p>... (truncated)</p>
   </details>
   <details>
   <summary>Commits</summary>
   <ul>
   <li><a href="https://github.com/digitalbazaar/forge/commit/a0a4a4264bedb3296974b9675349c9c190144aeb"><code>a0a4a42</code></a> Release 1.3.1.</li>
   <li><a href="https://github.com/digitalbazaar/forge/commit/a33830f61c351e8e3a34309767e8dd0de148376b"><code>a33830f</code></a> Update changelog.</li>
   <li><a href="https://github.com/digitalbazaar/forge/commit/740954d747ac56b76a6e1ae12a057c9548843436"><code>740954d</code></a> Allow optional DigestAlgorithm parameters.</li>
   <li><a href="https://github.com/digitalbazaar/forge/commit/56f4316b4cc6592e678f8c416209c45984b6547b"><code>56f4316</code></a> Allow DigestInfo.DigestAlgorith.parameters to be optional</li>
   <li><a href="https://github.com/digitalbazaar/forge/commit/cbf0bd590d47fe3120a57e7c36f2f4e64381ad81"><code>cbf0bd5</code></a> Start 1.3.1-0.</li>
   <li><a href="https://github.com/digitalbazaar/forge/commit/6c5b90133d46af63d139b98bf65371732c8c7dad"><code>6c5b901</code></a> Release 1.3.0.</li>
   <li><a href="https://github.com/digitalbazaar/forge/commit/0f3972ad5883a9869703c6f54a0627bc454bca47"><code>0f3972a</code></a> Update changelog.</li>
   <li><a href="https://github.com/digitalbazaar/forge/commit/dc77b39dd347e7f8b60a0f25a311fe5f06130579"><code>dc77b39</code></a> Fix error checking.</li>
   <li><a href="https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2"><code>bb822c0</code></a> Add advisory links.</li>
   <li><a href="https://github.com/digitalbazaar/forge/commit/d4395fec831622837ecfec9e428d4620e208f9a8"><code>d4395fe</code></a> Update changelog.</li>
   <li>Additional commits viewable in <a href="https://github.com/digitalbazaar/forge/compare/v1.2.1...v1.3.1">compare view</a></li>
   </ul>
   </details>
   <br />
   
   
   [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=node-forge&package-manager=npm_and_yarn&previous-version=1.2.1&new-version=1.3.1)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)
   
   Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`.
   
   [//]: # (dependabot-automerge-start)
   [//]: # (dependabot-automerge-end)
   
   ---
   
   <details>
   <summary>Dependabot commands and options</summary>
   <br />
   
   You can trigger Dependabot actions by commenting on this PR:
   - `@dependabot rebase` will rebase this PR
   - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it
   - `@dependabot merge` will merge this PR after your CI passes on it
   - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it
   - `@dependabot cancel merge` will cancel a previously requested merge and block automerging
   - `@dependabot reopen` will reopen this PR if it is closed
   - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
   - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
   - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
   - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
   You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/apache/superset/network/alerts).
   
   </details>


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscribe@superset.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: notifications-unsubscribe@superset.apache.org
For additional commands, e-mail: notifications-help@superset.apache.org


[GitHub] [superset] villebro merged pull request #19566: chore(deps): bump node-forge from 1.2.1 to 1.3.1 in /docs

Posted by GitBox <gi...@apache.org>.
villebro merged PR #19566:
URL: https://github.com/apache/superset/pull/19566


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscribe@superset.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: notifications-unsubscribe@superset.apache.org
For additional commands, e-mail: notifications-help@superset.apache.org