You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
While this is low in Impact (CVSS Base Score 4.3) @mariotoffia please consider upgrading the dependency, because users of your library need to security audit this.
There was an automatic PR #213 for this, but the SharpCompress release notes did not even mention the CVE.
Thanks ❤️
The text was updated successfully, but these errors were encountered:
Mario-Hofstaetter
changed the title
Update from SharpCompress 0.23.0 due to CVE-2021-39208
Update to SharpCompress 0.29.0 due to CVE-2021-39208
Nov 19, 2021
Mario-Hofstaetter
changed the title
Update to SharpCompress 0.29.0 due to CVE-2021-39208
Update to SharpCompress 0.30.0 due to CVE-2021-39208
Nov 22, 2021
Hi @Mario-Hofstaetter and thanks for this issue - It seems that it is when you use this on a "unknown" archive that could go outside your "sandbox". I use sharp-compress to create archives so it does not affect fluentdocker.
Having said that I do understand that I need to fix it so FluentDocker do not get blacklisted or if someone uses this as transient dependency for their own purpose.
I'll fix it - but it is not a straight off fix since it breaks the build on something...
We have been alerted by our Dependency-Track server that
currently used by
Ductus.FluentDocker
is affected byCVE-2021-39208
.See also https://nvd.nist.gov/vuln/detail/CVE-2021-39208
This has been fixed in SharpCompress >=
0.29.0
.While this is low in Impact (
CVSS Base Score 4.3
) @mariotoffia please consider upgrading the dependency, because users of your library need to security audit this.There was an automatic PR #213 for this, but the SharpCompress release notes did not even mention the CVE.
Thanks ❤️
The text was updated successfully, but these errors were encountered: