Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Aug 6, 2024

This PR contains the following updates:

Package Change Age Confidence
github.com/rancher/wrangler v0.8.7 -> v0.8.11 age confidence

GitHub Vulnerability Alerts

CVE-2022-43756

Impact

A denial of services (DoS) vulnerability was discovered in Wrangler Git package affecting versions up to and including v1.0.0.

Specially crafted Git credentials can result in a denial of service (DoS) attack on an application that uses Wrangler due to the exhaustion of the available memory and CPU resources. This is caused by a lack of input validation of Git credentials before they are used, which may lead to a denial of service in some cases. This issue can be triggered when accessing both private and public Git repositories.

Workarounds

A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.

Patches

Patched versions include v1.0.1 and later and the backported tags - v0.7.4-security1, v0.8.5-security1 and v0.8.11.

For more information

If you have any questions or comments about this advisory:

CVE-2022-31249

Impact

A command injection vulnerability was discovered in Wrangler's Git package affecting versions up to and including v1.0.0.

Wrangler's Git package uses the underlying Git binary present in the host OS or container image to execute Git operations. Specially crafted commands can be passed to Wrangler that will change their behavior and cause confusion when executed through Git, resulting in command injection in the underlying host.

Workarounds

A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.

Patches

Patched versions include v1.0.1 and later and the backported tags - v0.7.4-security1, v0.8.5-security1 and v0.8.11.

For more information

If you have any questions or comments about this advisory:


Denial of service when processing Git credentials in github.com/rancher/wrangler

CVE-2022-43756 / GHSA-8fcj-gf77-47mg / GO-2023-1515

More information

Details

A denial of service (DoS) vulnerability exists in the Wrangler Git package. Specially crafted Git credentials can result in a denial of service (DoS) attack on an application that uses Wrangler due to the exhaustion of the available memory and CPU resources.

This is caused by a lack of input validation of Git credentials before they are used, which may lead to a denial of service in some cases. This issue can be triggered when accessing both private and public Git repositories.

A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Denial of service (DoS) when processing Git credentials

CVE-2022-43756 / GHSA-8fcj-gf77-47mg / GO-2023-1515

More information

Details

Impact

A denial of services (DoS) vulnerability was discovered in Wrangler Git package affecting versions up to and including v1.0.0.

Specially crafted Git credentials can result in a denial of service (DoS) attack on an application that uses Wrangler due to the exhaustion of the available memory and CPU resources. This is caused by a lack of input validation of Git credentials before they are used, which may lead to a denial of service in some cases. This issue can be triggered when accessing both private and public Git repositories.

Workarounds

A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.

Patches

Patched versions include v1.0.1 and later and the backported tags - v0.7.4-security1, v0.8.5-security1 and v0.8.11.

For more information

If you have any questions or comments about this advisory:

Severity

  • CVSS Score: 5.9 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Command injection in Git package in Wrangler

CVE-2022-31249 / GHSA-qrg7-hfx7-95c5 / GO-2023-1519

More information

Details

Impact

A command injection vulnerability was discovered in Wrangler's Git package affecting versions up to and including v1.0.0.

Wrangler's Git package uses the underlying Git binary present in the host OS or container image to execute Git operations. Specially crafted commands can be passed to Wrangler that will change their behavior and cause confusion when executed through Git, resulting in command injection in the underlying host.

Workarounds

A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.

Patches

Patched versions include v1.0.1 and later and the backported tags - v0.7.4-security1, v0.8.5-security1 and v0.8.11.

For more information

If you have any questions or comments about this advisory:

Severity

  • CVSS Score: 7.5 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Command injection in github.com/rancher/wrangler

CVE-2022-31249 / GHSA-qrg7-hfx7-95c5 / GO-2023-1519

More information

Details

A command injection vulnerability exists in the Wrangler Git package. Specially crafted commands can be passed to Wrangler that will change their behavior and cause confusion when executed through Git, resulting in command injection in the underlying host.

A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Release Notes

rancher/wrangler (github.com/rancher/wrangler)

v0.8.11

Compare Source

v0.8.10

Compare Source

What's Changed

Full Changelog: rancher/wrangler@v0.8.9...v0.8.10

v0.8.9

Compare Source

What's Changed

New Contributors

Full Changelog: rancher/wrangler@v0.8.8...v0.8.9

v0.8.8

Compare Source

Added new signals pkg with shutdown func for windows services. The SetupSignalHandler now returns a channel so if you are using something like...

ctx := signals.SetupSignalHandler(context.Background())

There is now a func that returns the context that will do the context.Background call for you so switch to

ctx := signals.SetupSignalContext()

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/go-github.com-rancher-wrangler-vulnerability branch 2 times, most recently from 7444887 to 54117b8 Compare November 7, 2024 23:04
@renovate renovate bot added the security label Nov 7, 2024
@renovate renovate bot force-pushed the renovate/go-github.com-rancher-wrangler-vulnerability branch 14 times, most recently from dbb823a to e5f37b7 Compare November 8, 2024 14:14
@renovate renovate bot force-pushed the renovate/go-github.com-rancher-wrangler-vulnerability branch from e5f37b7 to 760ebcb Compare January 14, 2025 22:46
@renovate renovate bot force-pushed the renovate/go-github.com-rancher-wrangler-vulnerability branch 9 times, most recently from 9578d98 to 0ed238d Compare October 22, 2025 15:46
@renovate renovate bot force-pushed the renovate/go-github.com-rancher-wrangler-vulnerability branch from 0ed238d to 10b4bc2 Compare October 22, 2025 16:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant