-
Notifications
You must be signed in to change notification settings - Fork 845
Fix infinite recursion in type definition parser #642
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Fix infinite recursion in type definition parser #642
Conversation
6d83653
to
4188bd5
Compare
* Implements fix from: graphql-go/graphql#642 * I couldn't use the `replace` directive without a version tag so I've used my own fork. --- Signed-off-by: James Phillips <jamesdphillips@gmail.com>
* Implements fix from: graphql-go/graphql#642 * I couldn't use the `replace` directive without a version tag so I've used my own fork. --- Signed-off-by: James Phillips <jamesdphillips@gmail.com>
What's blocking to merging this in and bumping the release? |
hey guys, this is blocking our deployments because it's getting caught from our code scanners, any ETA on when this can be merged and released? |
Hi guys, Can we merge this? This impacts our SCAs. |
Our dependency graphql-go v0.8.0 has a bug in which a malformed schema string can cause a stack overflow in the parser, causing a Go panic. This is considered a DoS attack vector, assigned CVE-2022-37315. Seven months later, the fix for this bug has still not been merged, so we need to fork graphql-go and apply the fix ourselves. - Forked graphql-go repo to couchbasedeps/graphql-go. - In the forked repo, cherry-picked fix of CVE-2022-37315, from graphql-go/graphql#642 . Tagged this v0.8.1. - Updated SG's go.mod file to override original go-graphql with our fork. - Added a unit test in db/functions that tests the fix. I verified that, without the fix applied, this test panics; with it, it just returns an expected syntax error.
Our dependency graphql-go v0.8.0 has a bug in which a malformed schema string can cause a stack overflow in the parser, causing a Go panic. This is considered a DoS attack vector, assigned CVE-2022-37315. Seven months later, the fix for this bug has still not been merged, so we need to fork graphql-go and apply the fix ourselves. - Forked graphql-go repo to couchbasedeps/graphql-go. - In the forked repo, cherry-picked fix of CVE-2022-37315, from graphql-go/graphql#642 . Tagged this v0.8.1. - Updated SG's go.mod file to override original go-graphql with our fork. - Added a unit test in db/functions that tests the fix. I verified that, without the fix applied, this test panics; with it, it just returns an expected syntax error.
@chris-ramon @sogko I see you two are the owners of this org. Could you please merge this in to resolve the CVE? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 👍 🚢
Fixes #637.