-
Notifications
You must be signed in to change notification settings - Fork 8
Open
Labels
Description
Summary
Update github.com/golang-jwt/jwt/v5 from v5.2.1 to v5.2.2 or later (v5.3.0 available) to address HIGH severity vulnerability GHSA-mh63-6h87-95cp.
Vulnerability Details
- CVE: GHSA-mh63-6h87-95cp
- Severity: HIGH (CVSS 7.5)
- Issue: Excessive memory allocation during header parsing when processing untrusted JWT tokens
- Current Version: v5.2.1 (vulnerable)
- Fixed In: v5.2.2+
- Latest Version: v5.3.0
Affected Files
go.mod(repository root)deploy/operator/go.mod
Remediation Steps
Since this is a transitive dependency, identify and update the direct dependencies that pull it in, or add a replace directive to force the fixed version:
# For root go.mod
cd <repo-root>
go get github.com/golang-jwt/jwt/[email protected]
go mod tidy
go test ./...
# For operator go.mod
cd deploy/operator
go get github.com/golang-jwt/jwt/[email protected]
go mod tidy
go test ./...References
- Original PR: Operator: initial implementation #170
- Discussion: Operator: initial implementation #170 (comment)
This issue was created as a follow-up to the security review in PR #170 at the request of @mangelajo.