Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Explicitly check for case where SignatureValue is nil #71

Merged
merged 1 commit into from
Aug 28, 2021

Conversation

aporcupine
Copy link
Contributor

@aporcupine aporcupine commented Apr 5, 2021

Check for the case where SignatureValue is nil in order to explicitly prevent the case reported in #48 and get the CVE closed which is currently preventing those with 'vulnerable dependancy' checks from using the library.

fixes #48

@aporcupine
Copy link
Contributor Author

@russellhaering-okta @russellhaering Would it possible to merge this so that #48 can be closed?

pretty please

@aporcupine
Copy link
Contributor Author

Fixed the missing = 🤦. Tests are all passing now!

validate.go Outdated Show resolved Hide resolved
@aporcupine
Copy link
Contributor Author

bueller

@KuangEleven
Copy link

Any idea on if/when this will get merged in? I'm having issues with this library being flagged as insecure due to it.

@bharat-p
Copy link

bharat-p commented Jun 8, 2021

Please merge this so https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7711 can be addressed

@jakubtomany
Copy link

Any update? Is there a plan to fix the vulnerability CVE-2020-7711 ?

Copy link
Owner

@russellhaering russellhaering left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good fix, thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Crash on nil-pointer dereference with malformed input
6 participants