about summary refs log tree commit diff
path: root/pkgs/servers/http
diff options
context:
space:
mode:
authorThomas Gerbet <thomas@gerbet.me>2024-04-10 22:43:57 +0200
committerThomas Gerbet <thomas@gerbet.me>2024-04-10 22:43:57 +0200
commitbc4dc452fa3ce8895a31273e6d541fbc6abfc2af (patch)
tree75b2776d59f1f556ee05554dfa39fdcfb831a838 /pkgs/servers/http
parentddcd5f27629170e0f2d408a52ed6e90727f74de1 (diff)
envoy: flag as vulnerable to CVE-2024-30255
Envoy 1.27.4 [0] contains the fix but upgrading it is
not straightforward as the build of the current version
is already broken and only thanks to the caching of the deps
(seems to be the case since the removal of Go 1.20).

Fixing the build seems to require more Bazel knownledge than I have
and the the usual maintainer is currently not available.

[0] https://github.com/envoyproxy/envoy/releases/tag/v1.27.4
Diffstat (limited to 'pkgs/servers/http')
-rw-r--r--pkgs/servers/http/envoy/default.nix1
1 files changed, 1 insertions, 0 deletions
diff --git a/pkgs/servers/http/envoy/default.nix b/pkgs/servers/http/envoy/default.nix
index bb8a5e6a575cc..50067d7dd6220 100644
--- a/pkgs/servers/http/envoy/default.nix
+++ b/pkgs/servers/http/envoy/default.nix
@@ -197,5 +197,6 @@ buildBazelPackage {
     license = licenses.asl20;
     maintainers = with maintainers; [ lukegb ];
     platforms = [ "x86_64-linux" "aarch64-linux" ];
+    knownVulnerabilities = [ "CVE-2024-30255" ];
   };
 }