Skip to content

Not for review#2156

Closed
ddelnano wants to merge 8 commits intopixie-io:mainfrom
ddelnano:csmc/experimental-memory-optimized-agent
Closed

Not for review#2156
ddelnano wants to merge 8 commits intopixie-io:mainfrom
ddelnano:csmc/experimental-memory-optimized-agent

Conversation

@ddelnano
Copy link
Copy Markdown
Member

No description provided.

Signed-off-by: Dom Del Nano <ddelnano@gmail.com>
…sed carnot functionality

Signed-off-by: Dom Del Nano <ddelnano@gmail.com>
(cherry picked from commit 7554c43)
parsing. Fix compilation issues due to removing tracepoint support

Signed-off-by: Dom Del Nano <ddelnano@gmail.com>
(cherry picked from commit 64010b8)
…on offsets. Add FLAGS_disable_dwarf_parsing to opt into this mode

Signed-off-by: Dom Del Nano <ddelnano@gmail.com>
Signed-off-by: Dom Del Nano <ddelnano@gmail.com>
Signed-off-by: Dom Del Nano <ddelnano@gmail.com>
Signed-off-by: Dom Del Nano <ddelnano@gmail.com>
…n fork

Signed-off-by: Dom Del Nano <ddelnano@gmail.com>
@@ -0,0 +1,40 @@
module pxgrpc

Check failure

Code scanning / trivy-fs

gRPC-Go HTTP/2 Rapid Reset vulnerability High test

Package: google.golang.org/grpc
Installed Version: v1.53.0
Vulnerability GHSA-m425-mq94-257g
Severity: HIGH
Fixed Version: 1.56.3, 1.57.1, 1.58.3
Link: GHSA-m425-mq94-257g
@@ -0,0 +1,40 @@
module pxgrpc

Check warning

Code scanning / trivy-fs

HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) Medium test

Package: google.golang.org/grpc
Installed Version: v1.53.0
Vulnerability CVE-2023-44487
Severity: MEDIUM
Fixed Version: 1.58.3, 1.57.1, 1.56.3
Link: CVE-2023-44487
@@ -0,0 +1,40 @@
module pxgrpc

Check failure

Code scanning / trivy-fs

golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON High test

Package: google.golang.org/protobuf
Installed Version: v1.29.1
Vulnerability CVE-2024-24786
Severity: MEDIUM
Fixed Version: 1.33.0
Link: CVE-2024-24786
@@ -0,0 +1,39 @@
module pxgrpc

Check failure

Code scanning / trivy-fs

gRPC-Go HTTP/2 Rapid Reset vulnerability High test

Package: google.golang.org/grpc
Installed Version: v1.53.0
Vulnerability GHSA-m425-mq94-257g
Severity: HIGH
Fixed Version: 1.56.3, 1.57.1, 1.58.3
Link: GHSA-m425-mq94-257g
@@ -0,0 +1,39 @@
module pxgrpc

Check warning

Code scanning / trivy-fs

HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) Medium test

Package: google.golang.org/grpc
Installed Version: v1.53.0
Vulnerability CVE-2023-44487
Severity: MEDIUM
Fixed Version: 1.58.3, 1.57.1, 1.56.3
Link: CVE-2023-44487
@@ -0,0 +1,39 @@
module pxgrpc

Check failure

Code scanning / trivy-fs

golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON High test

Package: google.golang.org/protobuf
Installed Version: v1.29.1
Vulnerability CVE-2024-24786
Severity: MEDIUM
Fixed Version: 1.33.0
Link: CVE-2024-24786
@@ -0,0 +1,25 @@
module http2app

Check warning

Code scanning / trivy-fs

golang.org/x/net/proxy: golang.org/x/net/http/httpproxy: HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net Medium test

Package: golang.org/x/net
Installed Version: v0.33.0
Vulnerability CVE-2025-22870
Severity: MEDIUM
Fixed Version: 0.36.0
Link: CVE-2025-22870
@ddelnano ddelnano closed this Mar 25, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants