-
Notifications
You must be signed in to change notification settings - Fork 502
Description
Hi Team,
We have identified high risk vulnerability in our service, which uses your library https://github.com/smallstep/certificates
The vulnerability is related to protobuf component, which is a transitive dependency bought into smallstep certificates by Badger DB.
The badger DB version that you’re using here https://github.com/smallstep/certificates/blob/master/go.mod
are github.com/dgraph-io/badger v1.6.2
, github.com/dgraph-io/badger/v2 v2.2007.4
These are using older protobuf implementations which are not maintained currently as mentioned here https://github.com/golang/protobuf
Here's the flow:
github.com/smallstep/certificates v0.28.4
↓
github.com/dgraph-io/badger v1.6.2 ← Database storage library
↓
github.com/golang/protobuf v1.3.1 ← OLD VULNERABLE VERSION
-
The vulnerability exists even with this one (
github.com/golang/protobuf v1.5.3
) and the corresponding CVE ishttps://nvd.nist.gov/vuln/detail/CVE-2024-24786
-
Upon further checking, the latest version of protobuf library:
https://github.com/protocolbuffers/protobuf-go
v1.36.7 does not have any vulnerabilities associated with it. -
The latest version of badger
https://github.com/hypermodeinc/badger/blob/main/go.mod
is already using 1.36.6 version of protobuf and even this one doesn’t have any vulnerabilities.
Kindly requesting the smallstep team to please update the badger DB version so that these high severity vulnerabilities can be completely removed.
Please let me know if there are any challenges involved in this process, any reason this was not updated to maintain backward compatibility etc.
If there’s no problem, by when can we expect a new release which fixes this.