repo_id
stringclasses
927 values
file_path
stringlengths
99
214
content
stringlengths
2
4.15M
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2885.yaml
id: GO-2024-2885 modules: - module: github.com/stacklok/minder versions: - fixed: 0.0.51 vulnerable_at: 0.0.50 summary: Denial of service of Minder Server from maliciously crafted GitHub attestations in github.com/stacklok/minder cves: - CVE-2024-35238 ghsas: - GHSA-8fmj-33gw-g7pw references: - advisory: https://github.com/stacklok/minder/security/advisories/GHSA-8fmj-33gw-g7pw - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-35238 - fix: https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892 - web: https://github.com/stacklok/minder/blob/daccbc12e364e2d407d56b87a13f7bb24cbdb074/internal/verifier/sigstore/container/container.go#L271-L300 source: id: GHSA-8fmj-33gw-g7pw created: 2024-06-04T14:25:34.37589-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1640.yaml
id: GO-2023-1640 modules: - module: github.com/dablelv/go-huge-util versions: - fixed: 0.0.34 vulnerable_at: 0.0.33 packages: - package: github.com/dablelv/go-huge-util/zip symbols: - unzipFile derived_symbols: - Unzip summary: Path traversal when unzipping files in github.com/dablelv/go-huge-util cves: - CVE-2023-28105 ghsas: - GHSA-5g39-ppwg-6xx8 credits: - '@cokeBeer' references: - advisory: https://github.com/dablelv/go-huge-util/security/advisories/GHSA-5g39-ppwg-6xx8 - fix: https://github.com/dablelv/go-huge-util/commit/0e308b0fac8973e6fa251b0ab095cdc5c1c0956b review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0104.yaml
id: GO-2021-0104 modules: - module: github.com/pion/webrtc/v3 versions: - fixed: 3.0.15 vulnerable_at: 3.0.14 packages: - package: github.com/pion/webrtc/v3 symbols: - DTLSTransport.Start derived_symbols: - PeerConnection.AddTrack - PeerConnection.AddTransceiverFromKind - PeerConnection.AddTransceiverFromTrack - PeerConnection.CreateDataChannel - PeerConnection.RemoveTrack - PeerConnection.SetLocalDescription - PeerConnection.SetRemoteDescription - operations.Done - operations.Enqueue summary: Authorization bypass in github.com/pion/webrtc/v3 description: |- Due to improper error handling, DTLS connections were not killed when certificate verification failed, causing users who did not check the connection state to continue to use the connection. This could allow allow an attacker which holds the ICE password, but not a valid certificate, to bypass this restriction. published: 2021-07-28T18:08:05Z cves: - CVE-2021-28681 ghsas: - GHSA-74xm-qj29-cq8p credits: - Gaukas Wang (@Gaukas) references: - fix: https://github.com/pion/webrtc/pull/1709 - fix: https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e - web: https://github.com/pion/webrtc/issues/1708 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1558.yaml
id: GO-2023-1558 modules: - module: github.com/ipfs/go-bitfield versions: - fixed: 1.1.0 vulnerable_at: 1.0.0 packages: - package: github.com/ipfs/go-bitfield symbols: - NewBitfield - FromBytes summary: Denial of service via malformed size parameters in github.com/ipfs/go-bitfield description: |- When feeding untrusted user input into the size parameter of NewBitfield and FromBytes functions, an attacker can trigger panics. This happens when the size is a not a multiple of 8 or is negative. A workaround is to ensure size%8 == 0 && size >= 0 yourself before calling NewBitfield or FromBytes. cves: - CVE-2023-23626 ghsas: - GHSA-2h6c-j3gf-xp9r credits: - Jorropo references: - advisory: https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r - fix: https://github.com/ipfs/go-bitfield/commit/5e1d256fe043fc4163343ccca83862c69c52e579 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2096.yaml
id: GO-2023-2096 modules: - module: github.com/consensys/gnark-crypto versions: - fixed: 0.12.0 vulnerable_at: 0.11.2 packages: - package: github.com/consensys/gnark-crypto/ecc/bls12-377/ecdsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bls12-377/twistededwards symbols: - Signature.SetBytes - package: github.com/consensys/gnark-crypto/ecc/bls12-378/ecdsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bls12-378/twistededwards/eddsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bls12-381/bandersnatch/eddsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bls12-381/ecdsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bls12-381/twistededwards/eddsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bls24-315/ecdsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bls24-315/twistededwards/eddsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bls24-317/ecdsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bls24-317/twistededwards/eddsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bn254/ecdsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bn254/twistededwards/eddsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bw6-633/ecdsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bw6-633/twistededwards/eddsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bw6-756/ecdsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bw6-756/twistededwards/eddsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bw6-761/ecdsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/bw6-761/twistededwards/eddsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/secp256k1/ecdsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify - package: github.com/consensys/gnark-crypto/ecc/stark-curve/ecdsa symbols: - Signature.SetBytes derived_symbols: - PublicKey.Verify summary: Signature malleability in github.com/consensys/gnark-crypto cves: - CVE-2023-44273 ghsas: - GHSA-9xfq-8j3r-xp5g references: - fix: https://github.com/Consensys/gnark-crypto/pull/449 - web: https://verichains.io - web: https://github.com/Consensys/gnark-crypto/releases/tag/v0.12.0 - advisory: https://github.com/advisories/GHSA-9xfq-8j3r-xp5g review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0318.yaml
id: GO-2022-0318 modules: - module: cmd versions: - fixed: 1.16.14 - introduced: 1.17.0-0 - fixed: 1.17.7 vulnerable_at: 1.17.6 packages: - package: cmd/go/internal/modfetch symbols: - codeRepo.convert - codeRepo.validatePseudoVersion skip_fix: 'TODO: revisit this reason (cant request explicit version v1.17.6 of standard library package cmd/go/internal/modfetch)' summary: Incorrect access control in the go command in cmd/go/internal/modfetch description: |- Incorrect access control is possible in the go command. The go command can misinterpret branch names that falsely appear to be version tags. This can lead to incorrect access control if an actor is authorized to create branches but not tags. published: 2022-08-01T22:20:42Z cves: - CVE-2022-23773 references: - fix: https://go.dev/cl/378400 - fix: https://go.googlesource.com/go/+/fa4d9b8e2bc2612960c80474fca83a4c85a974eb - report: https://go.dev/issue/35671 - web: https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2409.yaml
id: GO-2023-2409 modules: - module: github.com/dvsekhvalnov/jose2go versions: - fixed: 1.5.1-0.20231206184617-48ba0b76bc88 vulnerable_at: 1.5.0 packages: - package: github.com/dvsekhvalnov/jose2go symbols: - Pbse2HmacAesKW.WrapNewKey - Pbse2HmacAesKW.Unwrap - encrypt - decrypt derived_symbols: - Compress - Decode - DecodeBytes - Encrypt - EncryptBytes summary: |- Denial of service when decrypting attacker controlled input in github.com/dvsekhvalnov/jose2go description: |- An attacker controlled input of a PBES2 encrypted JWE blob can have a very large p2c value that, when decrypted, produces a denial-of-service. cves: - CVE-2023-50658 ghsas: - GHSA-mhpq-9638-x6pw - GHSA-6294-6rgp-fr7r credits: - '@mschwager' references: - web: https://github.com/dvsekhvalnov/jose2go/issues/31 - web: https://www.blackhat.com/us-23/briefings/schedule/#three-new-attacks-against-json-web-tokens-31695 - fix: https://github.com/dvsekhvalnov/jose2go/commit/a4584e9dd7128608fedbc67892eba9697f0d5317 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0422.yaml
id: GO-2022-0422 modules: - module: github.com/ipld/go-codec-dagpb versions: - fixed: 1.3.1 vulnerable_at: 1.3.0 packages: - package: github.com/ipld/go-codec-dagpb symbols: - DecodeBytes derived_symbols: - Decode - Decoder - Unmarshal summary: Panic when decoding invalid blocks in github.com/ipld/go-codec-dagpb description: The dag-pb codec can panic when decoding invalid blocks. published: 2022-07-01T20:08:04Z ghsas: - GHSA-967g-cjx4-h7j6 - GHSA-g3vv-g2j5-45f2 references: - fix: https://github.com/ipld/go-codec-dagpb/commit/a17ace35cc760a2698645c09868f9050fa219f57 cve_metadata: id: CVE-2022-2584 cwe: 'CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0521.yaml
id: GO-2022-0521 modules: - module: std versions: - fixed: 1.17.12 - introduced: 1.18.0-0 - fixed: 1.18.4 vulnerable_at: 1.18.3 packages: - package: encoding/xml symbols: - Decoder.Skip summary: Stack exhaustion from deeply nested XML documents in encoding/xml description: |- Calling Decoder.Skip when parsing a deeply nested XML document can cause a panic due to stack exhaustion. published: 2022-07-20T17:02:04Z credits: - Go Security Team - Juho Nurminen of Mattermost references: - fix: https://go.dev/cl/417062 - fix: https://go.googlesource.com/go/+/08c46ed43d80bbb67cb904944ea3417989be4af3 - report: https://go.dev/issue/53614 - web: https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE cve_metadata: id: CVE-2022-28131 cwe: 'CWE-674: Uncontrolled Recursion' description: |- Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a deeply nested XML document. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2901.yaml
id: GO-2024-2901 modules: - module: github.com/ollama/ollama versions: - fixed: 0.1.34 vulnerable_at: 0.1.34-rc1 summary: Ollama does not validate the format of the digest (sha256 with 64 hex digits) in github.com/ollama/ollama cves: - CVE-2024-37032 ghsas: - GHSA-8hqg-whrw-pv92 unknown_aliases: - CGA-hv8x-jmgj-fp3m references: - advisory: https://github.com/advisories/GHSA-8hqg-whrw-pv92 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37032 - fix: https://github.com/ollama/ollama/commit/2a21363bb756a7341d3d577f098583865bd7603f - fix: https://github.com/ollama/ollama/pull/4175 - web: https://github.com/ollama/ollama/blob/adeb40eaf29039b8964425f69a9315f9f1694ba8/server/modelpath_test.go#L41-L58 - web: https://github.com/ollama/ollama/compare/v0.1.33...v0.1.34 source: id: GHSA-8hqg-whrw-pv92 created: 2024-06-26T14:08:48.678944-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2833.yaml
id: GO-2024-2833 modules: - module: github.com/octo-sts/app versions: - fixed: 0.1.0 vulnerable_at: 0.0.0-20240502160256-1fc549c0973c packages: - package: github.com/octo-sts/app/pkg/provider symbols: - Get summary: Denial of service in github.com/octo-sts/app description: |- Excessively large requests can be processed, consuming a large amount of resources. This could potentially lead to a denial of service. cves: - CVE-2024-34079 ghsas: - GHSA-75r6-6jg8-pfcq credits: - '@enj' references: - advisory: https://github.com/octo-sts/app/security/advisories/GHSA-75r6-6jg8-pfcq - fix: https://github.com/octo-sts/app/commit/74ba874c017cf973edd6711144cf4399a9fcff57 source: id: CVE-2024-34079 created: 2024-05-11T07:37:36.149537-07:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2644.yaml
id: GO-2024-2644 modules: - module: github.com/fluid-cloudnative/fluid versions: - fixed: 0.9.3 vulnerable_at: 0.9.2 summary: Fluid vulnerable to OS Command Injection for Fluid Users with JuicefsRuntime in github.com/fluid-cloudnative/fluid cves: - CVE-2023-51699 ghsas: - GHSA-wx8q-4gm9-rj2g references: - advisory: https://github.com/fluid-cloudnative/fluid/security/advisories/GHSA-wx8q-4gm9-rj2g - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-51699 - fix: https://github.com/fluid-cloudnative/fluid/commit/02b7cd8b79a26092df95d625664994bda485c722 - fix: https://github.com/fluid-cloudnative/fluid/commit/e0184cff8790ad000c3e8943392c7f544fad7d66 source: id: GHSA-wx8q-4gm9-rj2g created: 2024-05-17T16:14:37.080903-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1737.yaml
id: GO-2023-1737 modules: - module: github.com/gin-gonic/gin versions: - introduced: 1.3.1-0.20190301021747-ccb9e902956d - fixed: 1.9.1 vulnerable_at: 1.9.0 packages: - package: github.com/gin-gonic/gin symbols: - Context.FileAttachment summary: |- Improper handling of filenames in Content-Disposition HTTP header in github.com/gin-gonic/gin description: |- The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of "setup.bat";x=.txt" will be sent as a file named "setup.bat". If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header. ghsas: - GHSA-2c4m-59x9-fr2g credits: - motoyasu-saburi references: - report: https://github.com/gin-gonic/gin/issues/3555 - fix: https://github.com/gin-gonic/gin/pull/3556 - web: https://github.com/gin-gonic/gin/releases/tag/v1.9.1 cve_metadata: id: CVE-2023-29401 cwe: 'CWE 20: Improper Input Validation' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2466.yaml
id: GO-2024-2466 modules: - module: gopkg.in/src-d/go-git.v4 versions: - introduced: 4.7.1 vulnerable_at: 4.13.1 - module: github.com/go-git/go-git/v5 versions: - introduced: 5.0.0 - fixed: 5.11.0 vulnerable_at: 5.10.1 packages: - package: github.com/go-git/go-git/v5 symbols: - checkFastForwardUpdate - isFastForward - InitWithOptions - Repository.CreateTag - Worktree.PullContext - Worktree.createBranch - Worktree.checkoutFileSymlink derived_symbols: - AddOptions.Validate - Blame - BlameResult.String - Clone - CloneContext - CommitOptions.Validate - CreateTagOptions.Validate - GrepOptions.Validate - GrepResult.String - Init - NoMatchingRefSpecError.Error - Open - PlainClone - PlainCloneContext - PlainInit - PlainInitWithOptions - PlainOpen - PlainOpenWithOptions - Remote.Fetch - Remote.FetchContext - Remote.List - Remote.ListContext - Remote.Push - Remote.PushContext - Remote.String - Repository.BlobObject - Repository.BlobObjects - Repository.Branch - Repository.Branches - Repository.CommitObject - Repository.CommitObjects - Repository.Config - Repository.ConfigScoped - Repository.CreateBranch - Repository.CreateRemote - Repository.CreateRemoteAnonymous - Repository.DeleteBranch - Repository.DeleteObject - Repository.DeleteRemote - Repository.DeleteTag - Repository.Fetch - Repository.FetchContext - Repository.Grep - Repository.Head - Repository.Log - Repository.Notes - Repository.Object - Repository.Objects - Repository.Prune - Repository.Push - Repository.PushContext - Repository.Reference - Repository.References - Repository.Remote - Repository.Remotes - Repository.RepackObjects - Repository.ResolveRevision - Repository.SetConfig - Repository.Tag - Repository.TagObject - Repository.TagObjects - Repository.Tags - Repository.TreeObject - Repository.TreeObjects - ResetOptions.Validate - Status.String - Submodule.Init - Submodule.Repository - Submodule.Status - Submodule.Update - Submodule.UpdateContext - SubmoduleStatus.String - Submodules.Init - Submodules.Status - Submodules.Update - Submodules.UpdateContext - SubmodulesStatus.String - Worktree.Add - Worktree.AddGlob - Worktree.AddWithOptions - Worktree.Checkout - Worktree.Clean - Worktree.Commit - Worktree.Grep - Worktree.Move - Worktree.Pull - Worktree.Remove - Worktree.RemoveGlob - Worktree.Reset - Worktree.ResetSparsely - Worktree.Status - Worktree.Submodule - Worktree.Submodules - buildTreeHelper.BuildTree - package: github.com/go-git/go-git/v5/config symbols: - RemoteConfig.Validate - Branch.Validate derived_symbols: - Config.Unmarshal - Config.Validate - LoadConfig - ReadConfig - package: github.com/go-git/go-git/v5/plumbing/object symbols: - getFileStatsFromFilePatches derived_symbols: - Commit.Stats - Commit.StatsContext - Patch.Stats - package: github.com/go-git/go-git/v5/storage/filesystem symbols: - NewStorageWithOptions derived_symbols: - ConfigStorage.Config - ConfigStorage.SetConfig - ModuleStorage.Module - NewStorage - ObjectStorage.EncodedObject - package: github.com/go-git/go-git/v5/storage/filesystem/dotgit symbols: - DotGit.Alternates summary: Denial of service in github.com/go-git/go-git/v5 and gopkg.in/src-d/go-git.v4 cves: - CVE-2023-49568 ghsas: - GHSA-mw99-9chc-xw7r credits: - Ionut Lalu references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-49568 notes: - This is identical to GO-2024-2456. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0762.yaml
id: GO-2022-0762 modules: - module: github.com/microcosm-cc/bluemonday versions: - fixed: 1.0.5 vulnerable_at: 1.0.4 packages: - package: github.com/microcosm-cc/bluemonday symbols: - Policy.sanitize derived_symbols: - Policy.Sanitize - Policy.SanitizeBytes - Policy.SanitizeReader summary: |- Cross-site scripting due to incorrect sanitization in github.com/microcosm-cc/bluemonday description: |- An XSS injection was possible because the sanitization of the Cyrillic character i bypass a protection mechanism against user-inputted HTML elements such as the <script> tag. published: 2021-05-18T21:07:37Z cves: - CVE-2021-29272 ghsas: - GHSA-3x58-xr87-2fcj references: - fix: https://github.com/microcosm-cc/bluemonday/commit/524f142fe46e945b7dcd291d7805c4b7dcf75bee - web: https://github.com/microcosm-cc/bluemonday/issues/111 - web: https://github.com/microcosm-cc/bluemonday/releases/tag/v1.0.5 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0251.yaml
id: GO-2022-0251 modules: - module: github.com/cloudflare/cfrpki versions: - fixed: 1.4.0 vulnerable_at: 1.3.0 packages: - package: github.com/cloudflare/cfrpki/validator/lib symbols: - readObject derived_symbols: - BER2DER - DecodeManifest - DecoderConfig.DecodeManifest summary: Panic on NUL character in ROA in github.com/cloudflare/cfrpki description: |- OctoRPKI crashes when a repository returns an invalid ROA that is only an encoded NUL character (\0). published: 2022-07-15T23:07:28Z cves: - CVE-2021-3910 ghsas: - GHSA-5mxh-2qfv-4g7j credits: - Koen van Hove references: - fix: https://github.com/cloudflare/cfrpki/commit/76f0f7a98da001fa04e5bc0407c6702f91096bfa review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1878.yaml
id: GO-2023-1878 modules: - module: std versions: - fixed: 1.19.11 - introduced: 1.20.0-0 - fixed: 1.20.6 vulnerable_at: 1.20.5 packages: - package: net/http symbols: - Request.write derived_symbols: - Client.CloseIdleConnections - Client.Do - Client.Get - Client.Head - Client.Post - Client.PostForm - Get - Head - Post - PostForm - Request.Write - Request.WriteProxy - Transport.CancelRequest - Transport.CloseIdleConnections - Transport.RoundTrip summary: Insufficient sanitization of Host header in net/http description: |- The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value. credits: - Bartek Nowotarski references: - report: https://go.dev/issue/60374 - fix: https://go.dev/cl/506996 - web: https://groups.google.com/g/golang-announce/c/2q13H6LEEx0 cve_metadata: id: CVE-2023-29406 cwe: 'CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers (''HTTP Request/Response Splitting'')' references: - https://security.netapp.com/advisory/ntap-20230814-0002/ - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2849.yaml
id: GO-2024-2849 modules: - module: github.com/dotmesh-io/dotmesh unsupported_versions: - last_affected: 0.8.1 vulnerable_at: 0.0.0-20200428140901-6bdf6885808f summary: dotmesh arbitrary file read and/or write in github.com/dotmesh-io/dotmesh cves: - CVE-2020-26312 ghsas: - GHSA-hf54-fq2m-p9v6 references: - advisory: https://github.com/advisories/GHSA-hf54-fq2m-p9v6 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-26312 - advisory: https://securitylab.github.com/advisories/GHSL-2020-254-zipslip-dotmesh - web: https://github.com/dotmesh-io/dotmesh/blob/master/pkg/archiver/tar.go#L255 source: id: GHSA-hf54-fq2m-p9v6 created: 2024-06-04T14:27:24.630281-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1008.yaml
id: GO-2022-1008 modules: - module: github.com/containers/buildah versions: - fixed: 1.27.1 vulnerable_at: 1.27.0 packages: - package: github.com/containers/buildah symbols: - Builder.configureUIDGID derived_symbols: - Builder.Run summary: Unauthorized file access in github.com/containers/buildah description: |- SGID programs executed in a container can access files that have negative group permissions for the user's primary group. Consider a file which is owned by user u1 and group g1, permits user and other read access, and does NOT permit group read access. This file is readable by u1 and all other users except for ones in group g1. A program with the set-group-ID (SGID) bit set assumes the primary group of the program's group when it executes. A user with the primary group g1 who executes an SGID program owned by group g2 should not be able to access the file described above. While the program executes with the primary group g2, the group g1 should remain in its supplementary groups, blocking access to the file. Buildah does not correctly add g1 to the supplementary groups in this scenario, permitting unauthorized access. cves: - CVE-2022-2990 ghsas: - GHSA-fjm8-m7m6-2fjp related: - CVE-2022-2989 - CVE-2022-2995 - CVE-2022-36109 - CVE-2023-25173 - GHSA-4wjj-jwc9-2x96 - GHSA-hmfx-3pcx-653p - GHSA-phjr-8j92-w5v7 - GHSA-rc4r-wh2q-q6c4 references: - article: https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ - fix: https://github.com/containers/buildah/commit/4a8bf740e862f2438279c6feee2ea59ddf0cda0b review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2902.yaml
id: GO-2024-2902 modules: - module: github.com/argoproj/argo-cd vulnerable_at: 1.8.6 - module: github.com/argoproj/argo-cd/v2 versions: - introduced: 2.9.3 - fixed: 2.9.17 - introduced: 2.10.0 - fixed: 2.10.12 - introduced: 2.11.0 - fixed: 2.11.3 vulnerable_at: 2.11.2 summary: Unauthenticated Access to sensitive settings in Argo CD in github.com/argoproj/argo-cd cves: - CVE-2024-37152 ghsas: - GHSA-87p9-x75h-p4j2 unknown_aliases: - BIT-argo-cd-2024-37152 references: - advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-87p9-x75h-p4j2 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37152 - fix: https://github.com/argoproj/argo-cd/commit/256d90178b11b04bc8174d08d7b663a2a7b1771b source: id: GHSA-87p9-x75h-p4j2 created: 2024-06-26T14:08:53.979347-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1623.yaml
id: GO-2023-1623 modules: - module: github.com/crossplane/crossplane-runtime versions: - introduced: 0.6.0 - fixed: 0.16.1 - introduced: 0.17.0 - fixed: 0.19.2 vulnerable_at: 0.19.1 packages: - package: github.com/crossplane/crossplane-runtime/pkg/fieldpath symbols: - Paved.SetValue derived_symbols: - Paved.MergeValue - Paved.SetBool - Paved.SetNumber - Paved.SetString summary: Out-of-memory panic in github.com/crossplane/crossplane-runtime description: |- An out of memory panic vulnerability exists in the crossplane-runtime libraries. Applications that use the Paved type's SetValue method with user-provided input that is not properly validated might use excessive amounts of memory and cause an out of memory panic. In the fieldpath package, the Paved.SetValue method sets a value on the Paved object according to the provided path, without any validation. This allows setting values in slices at any provided index, which grows the target array up to the requested index. The index is currently capped at max uint32 (4294967295), a large value. If callers do not validate paths' indexes on their own, this could allow users to consume arbitrary amounts of memory. Applications that do not use the Paved type's SetValue method are not affected. Users unable to upgrade can work around this issue by parsing and validating the path before passing it to the SetValue method of the Paved type, constraining the index size as deemed appropriate. cves: - CVE-2023-27483 ghsas: - GHSA-vfvj-3m3g-m532 credits: - Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF. references: - advisory: https://github.com/crossplane/crossplane-runtime/security/advisories/GHSA-vfvj-3m3g-m532 - fix: https://github.com/crossplane/crossplane-runtime/commit/53508a9f4374604db140dd8ab2fa52276441e738 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2382.yaml
id: GO-2023-2382 modules: - module: std versions: - fixed: 1.20.12 - introduced: 1.21.0-0 - fixed: 1.21.5 vulnerable_at: 1.21.4 packages: - package: net/http/internal symbols: - chunkedReader.beginChunk - readChunkLine derived_symbols: - chunkedReader.Read summary: Denial of service via chunk extensions in net/http description: |- A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small. credits: - Bartek Nowotarski references: - report: https://go.dev/issue/64433 - fix: https://go.dev/cl/547335 - web: https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ cve_metadata: id: CVE-2023-39326 cwe: 'CWE-400: Uncontrolled Resource Consumption' references: - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIU6HOGV6RRIKWM57LOXQA75BGZSIH6G/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0246.yaml
id: GO-2022-0246 modules: - module: github.com/cloudflare/cfrpki versions: - fixed: 1.3.0 vulnerable_at: 1.2.2 packages: - package: github.com/cloudflare/cfrpki/validator/lib symbols: - ROAEntry.Validate derived_symbols: - RPKIROA.ValidateEntries summary: Insufficient validation in github.com/cloudflare/cfrpki description: |- The ROAEntry.Validate function fails to perform bounds checks on the MaxLength field, allowing invalid values to pass validation. published: 2022-07-15T23:06:38Z cves: - CVE-2021-3761 ghsas: - GHSA-c8xp-8mf3-62h9 credits: - Job Snijders references: - fix: https://github.com/cloudflare/cfrpki/pull/90 - fix: https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2719.yaml
id: GO-2024-2719 modules: - module: github.com/sigstore/cosign vulnerable_at: 1.13.6 - module: github.com/sigstore/cosign/v2 versions: - fixed: 2.2.4 unsupported_versions: - last_affected: 2.2.3 vulnerable_at: 2.2.3 summary: Cosign malicious artifacts can cause machine-wide DoS in github.com/sigstore/cosign cves: - CVE-2024-29903 ghsas: - GHSA-95pr-fxf5-86gv unknown_aliases: - BIT-cosign-2024-29903 references: - advisory: https://github.com/sigstore/cosign/security/advisories/GHSA-95pr-fxf5-86gv - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-29903 - fix: https://github.com/sigstore/cosign/commit/629f5f8fa672973503edde75f84dcd984637629e - web: https://github.com/sigstore/cosign/blob/14795db16417579fac0c00c11e166868d7976b61/pkg/cosign/verify.go#L948-L955 - web: https://github.com/sigstore/cosign/blob/286a98a4a99c1b2f32f84b0d560e324100312280/pkg/oci/remote/signatures.go#L56-L70 - web: https://github.com/sigstore/cosign/releases/tag/v2.2.4 source: id: GHSA-95pr-fxf5-86gv created: 2024-06-26T14:00:49.329229-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2922.yaml
id: GO-2024-2922 modules: - module: github.com/cilium/cilium versions: - introduced: 1.13.0 - fixed: 1.13.17 - introduced: 1.14.0 - fixed: 1.14.12 - introduced: 1.15.0 - fixed: 1.15.6 vulnerable_at: 1.15.5 summary: Cilium leaks sensitive information in cilium-bugtool in github.com/cilium/cilium cves: - CVE-2024-37307 ghsas: - GHSA-wh78-7948-358j unknown_aliases: - BIT-cilium-2024-37307 - BIT-cilium-operator-2024-37307 - BIT-hubble-2024-37307 - CGA-8w6w-3p6g-f399 - CGA-p2fw-jcxq-g6wg - CGA-p8cv-xfxg-fg8f - CGA-pqp4-rcvv-jvgj - CGA-qm9x-3p47-5whw references: - advisory: https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37307 - fix: https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407 - fix: https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a - fix: https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741 - fix: https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653 - fix: https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b - fix: https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61 source: id: GHSA-wh78-7948-358j created: 2024-06-26T14:09:36.703033-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2887.yaml
id: GO-2024-2887 modules: - module: std versions: - fixed: 1.21.11 - introduced: 1.22.0-0 - fixed: 1.22.4 vulnerable_at: 1.22.3 packages: - package: net/netip symbols: - Addr.IsLoopback - Addr.IsMulticast - Addr.IsInterfaceLocalMulticast - Addr.IsLinkLocalMulticast - Addr.IsGlobalUnicast - Addr.IsPrivate summary: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses in net/netip description: |- The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms. credits: - Enze Wang of Alioth (@zer0yu) - Jianjun Chen of Zhongguancun Lab (@chenjj) references: - fix: https://go.dev/cl/590316 - report: https://go.dev/issue/67680 - web: https://groups.google.com/g/golang-announce/c/XbxouI9gY7k/m/TuoGEhxIEwAJ cve_metadata: id: CVE-2024-24790 cwe: 'CWE-180: Incorrect Behavior Order: Validate Before Canonicalize' references: - http://www.openwall.com/lists/oss-security/2024/06/04/1 source: id: go-security-team created: 2024-06-04T17:58:12.283051-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2591.yaml
id: GO-2024-2591 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 9.2.0+incompatible - fixed: 9.2.5+incompatible - introduced: 9.3.0+incompatible - fixed: 9.3.1+incompatible vulnerable_at: 9.3.1-rc2+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - fixed: 8.1.9 vulnerable_at: 8.0.0-20240626184126-817e18414e41 summary: Mattermost post fetching without auditing in compliance export in github.com/mattermost/mattermost-server cves: - CVE-2024-1887 ghsas: - GHSA-fx48-xv6q-6gp3 unknown_aliases: - CGA-9c85-rg9h-4w8m references: - advisory: https://github.com/advisories/GHSA-fx48-xv6q-6gp3 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1887 - web: https://mattermost.com/security-updates source: id: GHSA-fx48-xv6q-6gp3 created: 2024-06-26T16:10:47.852031-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1546.yaml
id: GO-2023-1546 modules: - module: go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp versions: - introduced: 0.38.0 - fixed: 0.39.0 vulnerable_at: 0.38.0 packages: - package: go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp symbols: - Handler.ServeHTTP summary: |- Denial of service in go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp description: |- The otelhttp package of opentelemetry-go-contrib is vulnerable to a denial-of-service attack. The otelhttp package uses the httpconv.ServerRequest function to annotate metric measurements for the http.server.request_content_length, http.server.response_content_length, and http.server.duration instruments. The ServerRequest function sets the http.target attribute value to be the whole request URI (including the query string). The metric instruments do not "forget" previous measurement attributes when "cumulative" temporality is used, meaning that the cardinality of the measurements allocated is directly correlated with the unique URIs handled. If the query string is constantly random, this will result in a constant increase in memory allocation that can be used in a denial-of-service attack. cves: - CVE-2023-25151 ghsas: - GHSA-5r5m-65gx-7vrh related: - CVE-2022-21698 - CVE-2023-45142 - GHSA-cg3q-j54f-5p7p - GHSA-rcjv-mgp8-qvmr references: - advisory: https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-5r5m-65gx-7vrh review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0435.yaml
id: GO-2022-0435 modules: - module: std versions: - fixed: 1.17.9 - introduced: 1.18.0-0 - fixed: 1.18.1 vulnerable_at: 1.18.0 packages: - package: crypto/elliptic symbols: - p256GetScalar derived_symbols: - CurveParams.ScalarBaseMult - CurveParams.ScalarMult - p256Curve.CombinedMult - p256Curve.ScalarBaseMult - p256Curve.ScalarMult summary: Panic due to large inputs affecting P-256 curves in crypto/elliptic description: |- A crafted scalar input longer than 32 bytes can cause P256().ScalarMult or P256().ScalarBaseMult to panic. Indirect uses through crypto/ecdsa and crypto/tls are unaffected. amd64, arm64, ppc64le, and s390x are unaffected. published: 2022-05-20T21:17:46Z cves: - CVE-2022-28327 credits: - Project Wycheproof references: - fix: https://go.dev/cl/397135 - fix: https://go.googlesource.com/go/+/37065847d87df92b5eb246c88ba2085efcf0b331 - report: https://go.dev/issue/52075 - web: https://groups.google.com/g/golang-announce/c/oecdBNLOml8 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0201.yaml
id: GO-2022-0201 modules: - module: cmd versions: - fixed: 1.8.7 - introduced: 1.9.0-0 - fixed: 1.9.4 vulnerable_at: 1.9.3 packages: - package: cmd/go skip_fix: 'TODO: revisit this reason (cant request explicit version of standard library package cmd/go)' summary: Remote command execution via "go get" command with cgo in cmd/go description: |- The "go get" command with cgo is vulnerable to remote command execution by leveraging the gcc or clang plugin feature. When cgo is enabled, the build step during "go get" invokes the host C compiler, gcc or clang, adding compiler flags specified in the Go source files. Both gcc and clang support a plugin mechanism in which a shared-library plugin is loaded into the compiler, as directed by compiler flags. This means that a Go package repository can contain an attack.so file along with a Go source file that says (for example) "// #cgo CFLAGS: -fplugin=attack.so" causing the attack plugin to be loaded into the host C compiler during the build. Gcc and clang plugins are completely unrestricted in their access to the host system. published: 2022-08-09T18:15:41Z cves: - CVE-2018-6574 credits: - Christopher Brown of Mattermost references: - fix: https://go.googlesource.com/go/+/1dcb5836ad2c60776561da2923c70576ba2eefc6 - report: https://go.dev/issue/23672 - web: https://groups.google.com/g/golang-nuts/c/Gbhh1NxAjMU review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2792.yaml
id: GO-2024-2792 modules: - module: github.com/argoproj/argo-cd vulnerable_at: 1.8.6 - module: github.com/argoproj/argo-cd/v2 versions: - fixed: 2.8.17 - introduced: 2.9.0 - fixed: 2.9.13 - introduced: 2.10.0 - fixed: 2.10.8 vulnerable_at: 2.10.7 summary: |- Argo CD vulnerable to a Denial of Service via malicious jqPathExpressions in ignoreDifferences in github.com/argoproj/argo-cd cves: - CVE-2024-32476 ghsas: - GHSA-9m6p-x4h2-6frq unknown_aliases: - BIT-argo-cd-2024-32476 references: - advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-9m6p-x4h2-6frq - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32476 - fix: https://github.com/argoproj/argo-cd/commit/7893979a1e78d59cedd0ba790ded24e30bb40657 - fix: https://github.com/argoproj/argo-cd/commit/9e5cc5a26ff0920a01816231d59fdb5eae032b5a - fix: https://github.com/argoproj/argo-cd/commit/e2df7315fb7d96652186bf7435773a27be330cac source: id: GHSA-9m6p-x4h2-6frq created: 2024-06-26T14:04:57.097041-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1113.yaml
id: GO-2022-1113 modules: - module: github.com/oam-dev/kubevela versions: - fixed: 1.5.8 - introduced: 1.6.0 - fixed: 1.6.1 vulnerable_at: 1.6.0 packages: - package: github.com/oam-dev/kubevela/pkg/utils/common symbols: - HTTPGetResponse skip_fix: 'TODO: Revisit this reason. (Running fix causes error containing unknown revision konnectivity-client/v0.0.0)' summary: Server-side request forgery in github.com/oam-dev/kubevela description: |- When using Helm Chart as the component delivery method, the request address of the warehouse is not restricted, and there is a blind SSRF vulnerability. cves: - CVE-2022-39383 ghsas: - GHSA-m5xf-x7q6-3rm7 references: - advisory: https://github.com/kubevela/kubevela/security/advisories/GHSA-m5xf-x7q6-3rm7 - fix: https://github.com/kubevela/kubevela/pull/5000 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1664.yaml
id: GO-2023-1664 modules: - module: github.com/crewjam/saml versions: - fixed: 0.4.13 vulnerable_at: 0.4.12 packages: - package: github.com/crewjam/saml symbols: - NewIdpAuthnRequest - ServiceProvider.ValidateLogoutResponseRedirect derived_symbols: - IdentityProvider.ServeSSO - ServiceProvider.ValidateLogoutResponseRequest summary: Denial of service via deflate compression bomb in github.com/crewjam/saml cves: - CVE-2023-28119 ghsas: - GHSA-5mqj-xc49-246p credits: - '@nszetei' references: - advisory: https://github.com/crewjam/saml/security/advisories/GHSA-5mqj-xc49-246p - fix: https://github.com/crewjam/saml/commit/8e9236867d176ad6338c870a84e2039aef8a5021 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2567.yaml
id: GO-2024-2567 modules: - module: github.com/jackc/pgx/v5 versions: - introduced: 5.0.0-alpha.5 - fixed: 5.5.2 vulnerable_at: 5.5.1 packages: - package: github.com/jackc/pgx/v5/pgconn symbols: - Pipeline.Sync summary: Panic in Pipeline when PgConn is busy or closed in github.com/jackc/pgx description: Pipeline can panic when PgConn is busy or closed. ghsas: - GHSA-fqpg-rq76-99pq references: - fix: https://github.com/jackc/pgx/commit/dfd198003a03dbb96e4607b0d3a0bb9a7398ccb7 source: id: go-security-team created: 2024-07-02T11:36:18.541988-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0025.yaml
id: GO-2020-0025 modules: - module: code.cloudfoundry.org/archiver versions: - fixed: 0.0.0-20180523222229-09b5706aa936 vulnerable_at: 0.0.0-20170223024658-7291196139d7 packages: - package: code.cloudfoundry.org/archiver/extractor symbols: - extractTarArchiveFile - extractZipArchiveFile derived_symbols: - detectableExtractor.Extract - tarExtractor.Extract - tgzExtractor.Extract - zipExtractor.Extract summary: Path traversal in code.cloudfoundry.org/archiver description: |- Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. published: 2021-04-14T20:04:52Z ghsas: - GHSA-32qh-8vg6-9g43 references: - fix: https://github.com/cloudfoundry/archiver/commit/09b5706aa9367972c09144a450bb4523049ee840 - web: https://snyk.io/research/zip-slip-vulnerability cve_metadata: id: CVE-2018-25046 cwe: 'CWE 29: Path Traversal: "\..\filename"' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0079.yaml
id: GO-2021-0079 modules: - module: github.com/bytom/bytom versions: - fixed: 1.0.4-0.20180831054840-1ac3c8ac4f2b vulnerable_at: 1.0.4-0.20180831031436-69b3d4c7cf41 packages: - package: github.com/bytom/bytom/p2p/discover symbols: - Network.checkTopicRegister skip_fix: 'TODO: Revisit this reason. (Fix causes error containing cannot find module providing package github.com/bytom/common)' summary: Panic in github.com/bytom/bytom description: |- A malformed query can cause an out-of-bounds panic due to improper validation of arguments. If processing queries from untrusted parties, this may be used as a vector for denial of service attacks. published: 2021-04-14T20:04:52Z cves: - CVE-2018-18206 ghsas: - GHSA-vc3x-gx6c-g99f credits: - '@yahtoo' references: - fix: https://github.com/Bytom/bytom/pull/1307 - fix: https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2899.yaml
id: GO-2024-2899 modules: - module: chainguard.dev/apko versions: - fixed: 0.14.5 vulnerable_at: 0.14.4 summary: apko Exposure of HTTP basic auth credentials in log output in chainguard.dev/apko cves: - CVE-2024-36127 ghsas: - GHSA-v6mg-7f7p-qmqp references: - advisory: https://github.com/chainguard-dev/apko/security/advisories/GHSA-v6mg-7f7p-qmqp - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-36127 - web: https://github.com/chainguard-dev/apko/commit/2c0533e4d52e83031a04f6a83ec63fc2a11eff01 source: id: GHSA-v6mg-7f7p-qmqp created: 2024-06-13T12:07:02.08859-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2675.yaml
id: GO-2024-2675 modules: - module: github.com/temporalio/ui-server vulnerable_at: 0.15.1 - module: github.com/temporalio/ui-server/v2 versions: - fixed: 2.25.0 vulnerable_at: 2.24.0 summary: Temporal UI Server cross-site scripting vulnerability in github.com/temporalio/ui-server cves: - CVE-2024-2435 ghsas: - GHSA-8f25-w7qj-r7hc references: - advisory: https://github.com/advisories/GHSA-8f25-w7qj-r7hc - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-2435 - web: https://github.com/temporalio/ui-server/releases/tag/v2.25.0 source: id: GHSA-8f25-w7qj-r7hc created: 2024-06-26T13:58:51.59593-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2375.yaml
id: GO-2023-2375 modules: - module: std versions: - fixed: 1.20.0 vulnerable_at: 1.19.0 packages: - package: crypto/tls symbols: - rsaKeyAgreement.processClientKeyExchange - rsaKeyAgreement.generateClientKeyExchange derived_symbols: - Conn.Handshake - Conn.HandshakeContext - Conn.Read - Conn.Write - Dial - DialWithDialer - Dialer.Dial - Dialer.DialContext summary: |- Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel description: |- Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels. references: - report: https://go.dev/issue/20654 - fix: https://go.dev/cl/326012/26 - web: https://groups.google.com/g/golang-announce/c/QMK8IQALDvA - article: https://people.redhat.com/~hkario/marvin/ cve_metadata: id: CVE-2023-45287 cwe: 'CWE-208: Observable Timing Discrepancy' references: - https://security.netapp.com/advisory/ntap-20240112-0005/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0475.yaml
id: GO-2022-0475 modules: - module: cmd versions: - fixed: 1.14.12 - introduced: 1.15.0-0 - fixed: 1.15.5 vulnerable_at: 1.15.4 packages: - package: cmd/go symbols: - Builder.cgo skip_fix: 'TODO: revisit this reason (cant request explicit version v1.15.4 of standard library package cmd/go)' - package: cmd/cgo symbols: - dynimport skip_fix: 'TODO: revisit this reason (cant request explicit version v1.15.4 of standard library package cmd/go)' summary: Arbitrary code execution in go command with cgo in cmd/go and cmd/cgo description: |- The go command may execute arbitrary code at build time when cgo is in use. This may occur when running go get on a malicious package, or any other command that builds untrusted code. This can be caused by malicious unquoted symbol name in a linked object file. published: 2022-07-28T17:24:30Z credits: - Chris Brown (Tempus Ex) references: - fix: https://go.dev/cl/269658 - fix: https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292 - report: https://go.dev/issue/42559 - web: https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM cve_metadata: id: CVE-2020-28366 cwe: 'CWE-94: Improper Control of Generation of Code (''Code Injection'')' description: |- Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0220.yaml
id: GO-2022-0220 modules: - module: std versions: - fixed: 1.11.10 - introduced: 1.12.0-0 - fixed: 1.12.2 vulnerable_at: 1.12.1 packages: - package: runtime goos: - windows - package: syscall goos: - windows symbols: - LoadDLL summary: DLL injection on Windows in runtime and syscall description: |- Go on Windows misused certain LoadLibrary functionality, leading to DLL injection. published: 2022-05-25T18:01:46Z cves: - CVE-2019-9634 credits: - Samuel Cochran - Jason Donenfeld references: - fix: https://go.dev/cl/165798 - fix: https://go.googlesource.com/go/+/9b6e9f0c8c66355c0f0575d808b32f52c8c6d21c - report: https://go.dev/issue/28978 - web: https://groups.google.com/g/golang-announce/c/z9eTD34GEIs/m/Z_XmhTrVAwAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2513.yaml
id: GO-2024-2513 modules: - module: github.com/grafana/grafana non_go_versions: - fixed: 7.2.1 vulnerable_at: 5.4.5+incompatible summary: Grafana information disclosure in github.com/grafana/grafana cves: - CVE-2020-12458 ghsas: - GHSA-3jq7-8ph8-63xm unknown_aliases: - BIT-grafana-2020-12458 references: - advisory: https://github.com/advisories/GHSA-3jq7-8ph8-63xm - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-12458 - fix: https://github.com/grafana/grafana/commit/102448040d5132460e3b0013e03ebedec0677e00 - report: https://github.com/grafana/grafana/issues/8283 - web: https://access.redhat.com/security/cve/CVE-2020-12458 - web: https://bugzilla.redhat.com/show_bug.cgi?id=1827765 - web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTQCKJZZYXMCSHJFZZ3YXEO5NUBANGZS - web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEBCIEVSYIDDCA7FTRS2IFUOYLIQU34A - web: https://security.netapp.com/advisory/ntap-20200518-0001 source: id: GHSA-3jq7-8ph8-63xm created: 2024-06-14T11:39:09.292022-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0190.yaml
id: GO-2022-0190 modules: - module: cmd versions: - fixed: 1.10.6 - introduced: 1.11.0-0 - fixed: 1.11.3 vulnerable_at: 1.11.2 packages: - package: cmd/go/internal/get symbols: - downloadPackage skip_fix: 'TODO: revisit this reason (cant request explicit version v1.11.2 of standard library package cmd/go/internal/get' summary: Directory traversal via "go get" command in cmd/go description: |- The "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly brace (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution. published: 2022-08-02T15:44:23Z cves: - CVE-2018-16874 credits: - ztz of Tencent Security Platform references: - fix: https://go.dev/cl/154101 - fix: https://go.googlesource.com/go/+/bc82d7c7db83487e05d7a88e06549d4ae2a688c3 - report: https://go.dev/issue/29230 - web: https://groups.google.com/g/golang-announce/c/Kw31K8G7Fi0 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0110.yaml
id: GO-2021-0110 modules: - module: github.com/ory/fosite versions: - fixed: 0.31.0 vulnerable_at: 0.30.6 packages: - package: github.com/ory/fosite symbols: - Fosite.AuthenticateClient derived_symbols: - Fosite.NewAccessRequest - Fosite.NewRevocationRequest summary: Token reuse in github.com/ory/fosite description: Uniqueness of JWT IDs (jti) are not checked, allowing the JWT to be replayed. published: 2021-07-28T18:08:05Z cves: - CVE-2020-15222 ghsas: - GHSA-v3q9-2p3m-7g43 references: - fix: https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2815.yaml
id: GO-2024-2815 modules: - module: github.com/pterodactyl/wings versions: - fixed: 1.11.12 vulnerable_at: 1.11.11 summary: |- Pterodactyl Wings vulnerable to Server-Side Request Forgery during remote file pull in github.com/pterodactyl/wings cves: - CVE-2024-34068 ghsas: - GHSA-qq22-jj8x-4wwv related: - GHSA-6rg3-8h8x-5xfv references: - advisory: https://github.com/pterodactyl/wings/security/advisories/GHSA-qq22-jj8x-4wwv - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-34068 - fix: https://github.com/pterodactyl/wings/commit/c152e36101aba45d8868a9a0eeb890995e8934b8 - web: https://github.com/pterodactyl/wings/security/advisories/GHSA-6rg3-8h8x-5xfv notes: - manually moved GHSA-6rg3-8h8x-5xfv to related section and re-classified advisory to web source: id: GHSA-qq22-jj8x-4wwv created: 2024-06-26T14:06:28.726486-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0433.yaml
id: GO-2022-0433 modules: - module: std versions: - fixed: 1.17.9 - introduced: 1.18.0-0 - fixed: 1.18.1 vulnerable_at: 1.18.0 packages: - package: encoding/pem symbols: - Decode summary: Stack overflow from a large amount of PEM data in encoding/pem description: |- encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data. published: 2022-05-20T21:17:25Z cves: - CVE-2022-24675 credits: - Juho Nurminen of Mattermost references: - fix: https://go.dev/cl/399820 - fix: https://go.googlesource.com/go/+/45c3387d777caf28f4b992ad9a6216e3085bb8fe - report: https://go.dev/issue/51853 - web: https://groups.google.com/g/golang-announce/c/oecdBNLOml8 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0706.yaml
id: GO-2022-0706 modules: - module: go.elastic.co/apm versions: - fixed: 1.11.0 vulnerable_at: 1.10.0 packages: - package: go.elastic.co/apm symbols: - modelWriter.buildModelTransaction derived_symbols: - NewTracer - NewTracerOptions summary: Information disclosure in go.elastic.co/apm description: |- Sensitive HTTP headers may not be properly sanitized before being sent to the APM server if the program panics. published: 2021-05-18T18:34:18Z cves: - CVE-2021-22133 ghsas: - GHSA-qqc5-rgcc-cjqh references: - fix: https://github.com/elastic/apm-agent-go/pull/888 - fix: https://github.com/elastic/apm-agent-go/commit/dd3e8c593580e7b80a98b57e1cc6e017e56747b4 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0619.yaml
id: GO-2022-0619 modules: - module: github.com/emicklei/go-restful versions: - fixed: 2.16.0+incompatible vulnerable_at: 2.15.0+incompatible packages: - package: github.com/emicklei/go-restful symbols: - CrossOriginResourceSharing.isOriginAllowed derived_symbols: - CrossOriginResourceSharing.Filter - module: github.com/emicklei/go-restful/v2 versions: - introduced: 2.7.1 vulnerable_at: 2.7.1 packages: - package: github.com/emicklei/go-restful/v2 symbols: - CrossOriginResourceSharing.isOriginAllowed derived_symbols: - CrossOriginResourceSharing.Filter - module: github.com/emicklei/go-restful/v3 versions: - introduced: 3.0.0 - fixed: 3.8.0 vulnerable_at: 3.7.4 packages: - package: github.com/emicklei/go-restful/v3 symbols: - CrossOriginResourceSharing.isOriginAllowed derived_symbols: - CrossOriginResourceSharing.Filter summary: |- Authorization bypass in github.com/emicklei/go-restful, go-restful/v2 and go-restful/v3 description: |- CORS filters that use an AllowedDomains configuration parameter can match domains outside the specified set, permitting an attacker to avoid the CORS policy. The AllowedDomains configuration parameter is documented as a list of allowed origin domains, but values in this list are applied as regular expression matches. For example, an allowed domain of "example.com" will match the Origin header "example.com.malicious.domain". published: 2022-08-15T18:05:29Z cves: - CVE-2022-1996 ghsas: - GHSA-r48q-9g5r-8q2h references: - fix: https://github.com/emicklei/go-restful/commit/f292efff46ae17e9d104f865a60a39a2ae9402f1 - web: https://github.com/emicklei/go-restful/issues/489 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2930.yaml
id: GO-2024-2930 modules: - module: github.com/rancher/rke versions: - introduced: 1.4.18 - fixed: 1.4.19 - introduced: 1.5.9 - fixed: 1.5.10 vulnerable_at: 1.5.10-rc.1 packages: - package: github.com/rancher/rke/k8s symbols: - UpdateSecret - GetSecretsList - GetSecret - GetSystemSecret - package: github.com/rancher/rke/cluster symbols: - SaveFullStateToKubernetes - RebuildState - GetK8sVersion - Cluster.GetStateFileFromConfigMap - Cluster.StoreAddonConfigMap - FullState.WriteStateFile - buildFreshState - ReadStateFile - GetStateFromKubernetes derived_symbols: - Cluster.CheckClusterPorts - Cluster.CleanDeadLogs - Cluster.CleanupNodes - Cluster.ClusterRemove - Cluster.DeployControlPlane - Cluster.DeployRestoreCerts - Cluster.DeployStateFile - Cluster.DeployWorkerPlane - Cluster.DisableSecretsEncryption - Cluster.PrePullK8sImages - Cluster.ReconcileDesiredStateEncryptionConfig - Cluster.RewriteSecrets - Cluster.RotateEncryptionKey - Cluster.RunSELinuxCheck - Cluster.SetUpHosts - Cluster.SyncLabelsAndTaints - Cluster.TunnelHosts - Cluster.UpdateClusterCurrentState - Cluster.UpgradeControlPlane - Cluster.UpgradeWorkerPlane - ConfigureCluster - GetClusterCertsFromKubernetes - RebuildKubeconfig - ReconcileCluster - ReconcileEncryptionProviderConfig - RestartClusterPods - package: github.com/rancher/rke/cmd symbols: - ClusterUp - getStateFile - saveClusterState derived_symbols: - ClusterInit - ClusterRemove - RestoreEtcdSnapshot - RestoreEtcdSnapshotFromCli - RetrieveClusterStateConfigMap - RotateEncryptionKey - SnapshotRemoveFromEtcdHosts - SnapshotSaveEtcdHosts - SnapshotSaveEtcdHostsFromCli summary: RKE credentials are stored in the RKE1 Cluster state ConfigMap in github.com/rancher/rke description: |- When RKE provisions a cluster, it stores the cluster state in a configmap called "full-cluster-state" inside the "kube-system" namespace of the cluster itself. This cluster state object contains information used to set up the K8s cluster, which may include sensitive data. cves: - CVE-2023-32191 ghsas: - GHSA-6gr4-52w6-vmqx references: - advisory: https://github.com/rancher/rke/security/advisories/GHSA-6gr4-52w6-vmqx - fix: https://github.com/rancher/rke/commit/cf49199481a1891909acb1384eed73a5c987d5bd - fix: https://github.com/rancher/rke/commit/f7485b8dce376db0fc15a7c3ceb3de7029c8d0cf source: id: GHSA-6gr4-52w6-vmqx created: 2024-07-01T13:30:12.796528-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2653.yaml
id: GO-2024-2653 modules: - module: github.com/cilium/cilium versions: - introduced: 1.13.9 - fixed: 1.13.13 - introduced: 1.14.0 - fixed: 1.14.8 - introduced: 1.15.0 - fixed: 1.15.2 vulnerable_at: 1.15.1 summary: HTTP policy bypass in github.com/cilium/cilium description: |- Cilium's HTTP policies are not consistently applied to all traffic in the scope of the policies, leading to HTTP traffic being incorrectly and intermittently forwarded when it should be dropped. cves: - CVE-2024-28248 ghsas: - GHSA-68mj-9pjq-mc85 credits: - '@romikps' - '@sayboras' - '@jrajahalme' references: - web: https://docs.cilium.io/en/stable/security/policy/language/#http review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2486.yaml
id: GO-2024-2486 modules: - module: github.com/hashicorp/vault versions: - introduced: 0.9.0 - fixed: 1.3.4 vulnerable_at: 1.3.3 summary: HashiCorp Vault Improper Privilege Management in github.com/hashicorp/vault cves: - CVE-2020-10660 ghsas: - GHSA-m979-w9wj-qfj9 unknown_aliases: - BIT-vault-2020-10660 references: - advisory: https://github.com/advisories/GHSA-m979-w9wj-qfj9 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-10660 - fix: https://github.com/hashicorp/vault/commit/18485ee9d4352ac8e8396c580b5941ccf8e5b31a - fix: https://github.com/hashicorp/vault/pull/8606 - web: https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#134-march-19th-2020 - web: https://www.hashicorp.com/blog/category/vault source: id: GHSA-m979-w9wj-qfj9 created: 2024-06-14T11:37:27.238275-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2671.yaml
id: GO-2024-2671 modules: - module: github.com/hashicorp/nomad versions: - introduced: 0.11.0 - fixed: 1.4.11 - introduced: 1.5.0 - fixed: 1.5.7 vulnerable_at: 1.4.10 packages: - package: github.com/hashicorp/nomad/acl symbols: - ACL.AllowVariableSearch - package: github.com/hashicorp/nomad/nomad symbols: - sufficientSearchPerms - filteredSearchContexts - getEnterpriseFuzzyResourceIter derived_symbols: - ACL.GetPolicies - ACL.GetPolicy - ACL.GetRoleByID - ACL.GetRoleByName - ACL.GetRolesByID - ACL.GetToken - ACL.GetTokens - ACL.ListPolicies - ACL.ListRoles - ACL.ListTokens - Alloc.GetAlloc - Alloc.GetAllocs - Alloc.GetServiceRegistrations - Alloc.List - CSIPlugin.Get - CSIPlugin.List - CSIVolume.Get - CSIVolume.List - Deployment.Allocations - Deployment.GetDeployment - Deployment.List - Eval.Allocations - Eval.Count - Eval.GetEval - Eval.List - Job.Allocations - Job.Deployments - Job.Dispatch - Job.Evaluations - Job.GetJob - Job.GetJobVersions - Job.GetServiceRegistrations - Job.LatestDeployment - Job.List - Job.Plan - Job.ScaleStatus - Job.Summary - Keyring.Get - Keyring.List - Namespace.GetNamespace - Namespace.GetNamespaces - Namespace.ListNamespaces - NewServer - NewWorker - Node.GetAllocs - Node.GetClientAllocs - Node.GetNode - Node.List - PeriodicDispatch.SetEnabled - Scaling.GetPolicy - Scaling.ListPolicies - Search.FuzzySearch - Search.PrefixSearch - Server.Reload - Server.RunningChildren - Server.SetSchedulerWorkerConfig - ServiceRegistration.GetService - ServiceRegistration.List - TestACLServer - TestServer - TestServerErr - Variables.List - Variables.Read - Worker.Start - nomadFSM.Apply - nomadFSM.Restore - nomadFSM.RestoreWithFilter summary: CSI plugin names disclosure in github.com/hashicorp/nomad description: |- A vulnerability was identified in Nomad such that the search HTTP API can reveal names of available CSI plugins to unauthenticated users or users without the plugin:read policy. This vulnerability affects Nomad since 0.11.0 and was fixed in 1.4.11 and 1.5.7. cves: - CVE-2023-3300 ghsas: - GHSA-v5fm-hr72-27hx credits: - anonymous4ACL24 references: - fix: https://github.com/hashicorp/nomad/commit/a8789d3872bbf1b1f420f28b0f7ad8532a41d5e3 - web: https://discuss.hashicorp.com/t/hcsec-2023-22-nomad-search-api-leaks-information-about-csi-plugins/56272 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0160.yaml
id: GO-2021-0160 modules: - module: std versions: - introduced: 1.5.0-0 - fixed: 1.5.3 vulnerable_at: 1.5.2 packages: - package: math/big symbols: - nat.expNNMontgomery - nat.montgomery skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Incorrect calculation affecting RSA computations in math/big description: |- Int.Exp Montgomery mishandled carry propagation and produced an incorrect output, which makes it easier for attackers to obtain private RSA keys via unspecified vectors. This issue can affect RSA computations in crypto/rsa, which is used by crypto/tls. TLS servers on 32-bit systems could plausibly leak their RSA private key due to this issue. Other protocol implementations that create many RSA signatures could also be impacted in the same way. Specifically, incorrect results in one part of the RSA Chinese Remainder computation can cause the result to be incorrect in such a way that it leaks one of the primes. While RSA blinding should prevent an attacker from crafting specific inputs that trigger the bug, on 32-bit systems the bug can be expected to occur at random around one in 2^26 times. Thus collecting around 64 million signatures (of known data) from an affected server should be enough to extract the private key used. Note that on 64-bit systems, the frequency of the bug is so low (less than one in 2^50) that it would be very difficult to exploit. published: 2022-01-05T15:31:16Z cves: - CVE-2015-8618 credits: - Nick Craig-Wood references: - fix: https://go.dev/cl/18491 - fix: https://go.googlesource.com/go/+/1e066cad1ba23f4064545355b8737e4762dd6838 - fix: https://go.googlesource.com/go/+/4306352182bf94f86f0cfc6a8b0ed461cbf1d82c - fix: https://go.dev/cl/17672 - report: https://go.dev/issue/13515 - web: https://groups.google.com/g/golang-announce/c/MEATuOi_ei4 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2874.yaml
id: GO-2024-2874 modules: - module: github.com/cosmos/ibc-go - module: github.com/cosmos/ibc-go/v2 - module: github.com/cosmos/ibc-go/v3 - module: github.com/cosmos/ibc-go/v4 - module: github.com/cosmos/ibc-go/v5 - module: github.com/cosmos/ibc-go/v6 - module: github.com/cosmos/ibc-go/v7 versions: - fixed: 7.0.1 vulnerable_at: 7.0.1-wasm-client packages: - package: github.com/cosmos/ibc-go/v7/modules/core/04-channel/keeper symbols: - Keeper.UnreceivedPackets summary: |- Inter-Blockchain Communication (IBC) protocol "Huckleberry" vulnerability in github.com/cosmos/ibc-go description: |- The ibc-go module is affected by the Inter-Blockchain Communication (IBC) protocol "Huckleberry" vulnerability. The vulnerability allowed an attacker to send arbitrary transactions onto target chains and trigger arbitrary state transitions, including but not limited to, theft of funds. It was possible to exploit this vulnerability in specific situations involving relaying packets in which the source chain is also the final destination chain. Affected networks are those that allow for fee grant capabilities and use a native Relayer (e.g., Osmosis and Juno). ghsas: - GHSA-qjcv-rx3v-7mvj references: - fix: https://github.com/cosmos/ibc-go/commit/c77f80f812940fe3b93980d13a5cdd6980e907cc - report: https://github.com/cosmos/ibc-go/issues/1532 source: id: GHSA-qjcv-rx3v-7mvj created: 2024-05-22T16:53:22.072180612Z review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0001.yaml
id: GO-2020-0001 modules: - module: github.com/gin-gonic/gin versions: - fixed: 1.6.0 vulnerable_at: 1.5.0 packages: - package: github.com/gin-gonic/gin symbols: - LoggerWithConfig derived_symbols: - Default - Logger - LoggerWithFormatter - LoggerWithWriter summary: Arbitrary log line injection in github.com/gin-gonic/gin description: |- The default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path. published: 2021-04-14T20:04:52Z ghsas: - GHSA-6vm3-jj99-7229 credits: - '@thinkerou <thinkerou@gmail.com>' references: - fix: https://github.com/gin-gonic/gin/pull/2237 - fix: https://github.com/gin-gonic/gin/commit/a71af9c144f9579f6dbe945341c1df37aaf09c0d cve_metadata: id: CVE-2020-36567 cwe: CWE-117 Improper Output Neutralization for Logs description: |- Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1589.yaml
id: GO-2023-1589 modules: - module: github.com/notaryproject/notation-go versions: - fixed: 1.0.0-rc.3 vulnerable_at: 1.0.0-rc.1 packages: - package: github.com/notaryproject/notation-go/internal/pkix symbols: - ParseDistinguishedName - package: github.com/notaryproject/notation-go/verifier symbols: - verifyX509TrustedIdentities derived_symbols: - New - NewFromConfig - verifier.Verify - package: github.com/notaryproject/notation-go/verifier/trustpolicy symbols: - validateTrustedIdentities derived_symbols: - Document.Validate summary: Denial of service from memory exhaustion in github.com/notaryproject/notation-go description: |- Parsing PKIX distinguished names containing the string "=#" can cause excessive memory consumption. cves: - CVE-2023-25656 ghsas: - GHSA-87x9-7grx-m28v references: - fix: https://github.com/notaryproject/notation-go/pull/275 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2045.yaml
id: GO-2023-2045 modules: - module: std versions: - introduced: 1.21.0-0 - fixed: 1.21.1 vulnerable_at: 1.21.0 packages: - package: crypto/tls symbols: - QUICConn.HandleData summary: Memory exhaustion in QUIC connection handling in crypto/tls description: |- QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size. credits: - Marten Seemann references: - report: https://go.dev/issue/62266 - fix: https://go.dev/cl/523039 - web: https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ cve_metadata: id: CVE-2023-39322 cwe: 'CWE-400: Uncontrolled Resource Consumption' references: - https://security.netapp.com/advisory/ntap-20231020-0004/ - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0067.yaml
id: GO-2021-0067 modules: - module: std versions: - introduced: 1.16.0-0 - fixed: 1.16.1 vulnerable_at: 1.16.0 packages: - package: archive/zip symbols: - toValidName skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Panic when opening archives in archive/zip description: |- Using Reader.Open on an archive containing a file with a path prefixed by "../" will cause a panic due to a stack overflow. If parsing user supplied archives, this may be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2021-27919 references: - fix: https://go.dev/cl/300489 - fix: https://go.googlesource.com/go/+/cd3b4ca9f20fd14187ed4cdfdee1a02ea87e5cd8 - report: https://go.dev/issue/44916 - web: https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw/m/zzhWj5jPAQAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2572.yaml
id: GO-2024-2572 modules: - module: github.com/cosmos/cosmos-sdk versions: - fixed: 0.47.9 - introduced: 0.50.0 - fixed: 0.50.4 vulnerable_at: 0.50.3 packages: - package: github.com/cosmos/cosmos-sdk/x/auth/vesting symbols: - msgServer.CreatePeriodicVestingAccount summary: |- Missing BlockedAddressed Validation in Vesting Module in github.com/cosmos/cosmos-sdk ghsas: - GHSA-4j93-fm92-rp4m references: - advisory: https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-4j93-fm92-rp4m - fix: https://github.com/cosmos/cosmos-sdk/commit/c05850241e2d615721e3492d15fee4e1deec082b - web: https://github.com/cosmos/cosmos-sdk/releases/tag/v0.47.9 - web: https://github.com/cosmos/cosmos-sdk/releases/tag/v0.50.4 source: id: GHSA-4j93-fm92-rp4m created: 2024-07-01T15:01:58.512805-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0052.yaml
id: GO-2021-0052 modules: - module: github.com/gin-gonic/gin versions: - fixed: 1.7.7 vulnerable_at: 1.7.6 packages: - package: github.com/gin-gonic/gin symbols: - Context.ClientIP - Context.RemoteIP derived_symbols: - Context.Next - Engine.HandleContext - Engine.Run - Engine.RunFd - Engine.RunListener - Engine.RunTLS - Engine.RunUnix - Engine.ServeHTTP summary: Inconsistent interpretation of HTTP Requests in github.com/gin-gonic/gin description: |- Due to improper HTTP header sanitization, a malicious user can spoof their source IP address by setting the X-Forwarded-For header. This may allow a user to bypass IP based restrictions, or obfuscate their true source. published: 2021-04-14T20:04:52Z cves: - CVE-2020-28483 ghsas: - GHSA-h395-qcrw-5vmq credits: - '@sorenisanerd' references: - report: https://github.com/gin-gonic/gin/issues/2862 - report: https://github.com/gin-gonic/gin/issues/2473 - report: https://github.com/gin-gonic/gin/issues/2232 - fix: https://github.com/gin-gonic/gin/pull/2844 - fix: https://github.com/gin-gonic/gin/commit/5929d521715610c9dd14898ebbe1d188d5de8937 - fix: https://github.com/gin-gonic/gin/pull/2632 - fix: https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711 - fix: https://github.com/gin-gonic/gin/pull/2675 - fix: https://github.com/gin-gonic/gin/commit/03e5e05ae089bc989f1ca41841f05504d29e3fd9 - web: https://github.com/gin-gonic/gin/pull/2474 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2716.yaml
id: GO-2024-2716 modules: - module: github.com/authzed/spicedb versions: - fixed: 1.30.1 vulnerable_at: 1.30.0 summary: |- SpiceDB: LookupSubjects may return partial results if a specific kind of relation is used in github.com/authzed/spicedb cves: - CVE-2024-32001 ghsas: - GHSA-j85q-46hg-36p2 references: - advisory: https://github.com/authzed/spicedb/security/advisories/GHSA-j85q-46hg-36p2 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32001 - fix: https://github.com/authzed/spicedb/commit/a244ed1edfaf2382711dccdb699971ec97190c7b - web: https://github.com/authzed/spicedb/releases/tag/v1.30.1 source: id: GHSA-j85q-46hg-36p2 created: 2024-05-17T16:13:26.196238-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0294.yaml
id: GO-2022-0294 modules: - module: github.com/google/go-attestation versions: - fixed: 0.4.0 vulnerable_at: 0.3.2 packages: - package: github.com/google/go-attestation/attest symbols: - AKPublic.validate12Quote - AKPublic.validate20Quote derived_symbols: - AKPublic.Verify - TPM.AttestPlatform summary: Improper input validation in github.com/google/go-attestation description: |- A local attacker can defeat remotely-attested measured boot. Improper input validation in AKPublic.Verify can cause it to succeed when provided with a maliciously-formed Quote over no/some PCRs. Subsequent use of the same set of PCR values in Eventlog.Verify lacks the authentication performed by quote verification, meaning a local attacker can couple this vulnerability with a maliciously-formed TCG log in Eventlog.Verify to spoof events in the TCG log, defeating remotely-attested measured-boot. published: 2022-07-15T23:27:21Z cves: - CVE-2022-0317 ghsas: - GHSA-99cg-575x-774p credits: - Nikki VonHollen references: - fix: https://github.com/google/go-attestation/commit/82f2c9c2c76e1d3691d17ee78116d1d93a123788 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2916.yaml
id: GO-2024-2916 modules: - module: github.com/goharbor/harbor versions: - fixed: 2.8.6+incompatible - introduced: 2.9.0+incompatible - fixed: 2.9.4+incompatible - introduced: 2.10.0+incompatible - fixed: 2.10.2+incompatible vulnerable_at: 2.10.2-rc1+incompatible summary: SQL Injection in Harbor scan log API in github.com/goharbor/harbor cves: - CVE-2024-22261 ghsas: - GHSA-vw63-824v-qf2j references: - advisory: https://github.com/goharbor/harbor/security/advisories/GHSA-vw63-824v-qf2j - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-22261 source: id: GHSA-vw63-824v-qf2j created: 2024-06-13T12:05:42.621716-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2610.yaml
id: GO-2024-2610 modules: - module: std versions: - fixed: 1.21.8 - introduced: 1.22.0-0 - fixed: 1.22.1 vulnerable_at: 1.22.0 packages: - package: html/template symbols: - jsValEscaper - escaper.commit derived_symbols: - Template.Execute - Template.ExecuteTemplate summary: |- Errors returned from JSON marshaling may break template escaping in html/template description: |- If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates. credits: - RyotaK (https://ryotak.net) references: - report: https://go.dev/issue/65697 - fix: https://go.dev/cl/564196 - web: https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg cve_metadata: id: CVE-2024-24785 cwe: 'CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences' references: - https://security.netapp.com/advisory/ntap-20240329-0008/ - http://www.openwall.com/lists/oss-security/2024/03/08/4 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0470.yaml
id: GO-2022-0470 modules: - module: github.com/blevesearch/bleve vulnerable_at: 1.0.14 packages: - package: github.com/blevesearch/bleve/http symbols: - AliasHandler.ServeHTTP - CreateIndexHandler.ServeHTTP - DebugDocumentHandler.ServeHTTP - DeleteIndexHandler.ServeHTTP - DocCountHandler.ServeHTTP - DocDeleteHandler.ServeHTTP - DocGetHandler.ServeHTTP - DocIndexHandler.ServeHTTP - GetIndexHandler.ServeHTTP - ListFieldsHandler.ServeHTTP - SearchHandler.ServeHTTP - module: github.com/blevesearch/bleve/v2 vulnerable_at: 2.3.2 packages: - package: github.com/blevesearch/bleve/v2/http symbols: - AliasHandler.ServeHTTP - CreateIndexHandler.ServeHTTP - DebugDocumentHandler.ServeHTTP - DeleteIndexHandler.ServeHTTP - DocCountHandler.ServeHTTP - DocDeleteHandler.ServeHTTP - DocGetHandler.ServeHTTP - DocIndexHandler.ServeHTTP - GetIndexHandler.ServeHTTP - ListFieldsHandler.ServeHTTP - SearchHandler.ServeHTTP summary: No access control in github.com/blevesearch/bleve and bleve/v2 description: |- HTTP handlers provide unauthenticated access to the local filesystem. The Bleve http package is intended for demonstration purposes and contains no authentication, authorization, or validation of user inputs. Exposing handlers from this package can permit attackers to create files and delete directories. published: 2022-07-15T23:29:55Z cves: - CVE-2022-31022 ghsas: - GHSA-9w9f-6mg8-jp7w references: - fix: https://github.com/blevesearch/bleve/commit/1c7509d6a17d36f265c90b4e8f4e3a3182fe79ff review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0972.yaml
id: GO-2022-0972 modules: - module: github.com/shamaton/msgpack/v2 versions: - fixed: 2.1.1 vulnerable_at: 2.1.0 packages: - package: github.com/shamaton/msgpack/v2 symbols: - Unmarshal summary: Panic in github.com/shamaton/msgpack/v2 description: |- Unmarshal can panic on some inputs, possibly allowing for denial of service attacks. ghsas: - GHSA-jr77-8gx4-h5qh credits: - Red Canary references: - report: https://github.com/shamaton/msgpack/issues/31 - fix: https://github.com/shamaton/msgpack/pull/32 cve_metadata: id: CVE-2022-41719 cwe: 'CWE 400: Uncontrolled Resource Consumption' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2769.yaml
id: GO-2024-2769 modules: - module: code.gitea.io/gitea versions: - fixed: 1.16.9 vulnerable_at: 1.16.8 summary: Gitea allowed assignment of private issues in code.gitea.io/gitea cves: - CVE-2022-38183 ghsas: - GHSA-fhv8-m4j4-cww2 unknown_aliases: - BIT-gitea-2022-38183 references: - advisory: https://github.com/advisories/GHSA-fhv8-m4j4-cww2 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-38183 - web: https://blog.gitea.io/2022/07/gitea-1.16.9-is-released - web: https://github.com/go-gitea/gitea/pull/20133 - web: https://github.com/go-gitea/gitea/pull/20196 source: id: GHSA-fhv8-m4j4-cww2 created: 2024-06-06T16:18:38.02836-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2771.yaml
id: GO-2024-2771 modules: - module: github.com/rancher/rancher non_go_versions: - introduced: 2.5.0 - fixed: 2.5.10 vulnerable_at: 1.6.30 summary: |- Rancher's Steve API Component Improper authorization check allows privilege escalation in github.com/rancher/rancher cves: - CVE-2021-36776 ghsas: - GHSA-gvh9-xgrq-r8hw references: - advisory: https://github.com/advisories/GHSA-gvh9-xgrq-r8hw - advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-36776 - web: https://bugzilla.suse.com/show_bug.cgi?id=1189413 source: id: GHSA-gvh9-xgrq-r8hw created: 2024-06-04T15:28:43.930948-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2457.yaml
id: GO-2024-2457 modules: - module: github.com/apache/incubator-answer versions: - fixed: 1.2.1 vulnerable_at: 1.2.1-RC1 summary: Apache Answer Race Condition vulnerability in github.com/apache/incubator-answer cves: - CVE-2023-49619 ghsas: - GHSA-f899-4mr4-fqpv references: - advisory: https://github.com/advisories/GHSA-f899-4mr4-fqpv - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-49619 - web: http://www.openwall.com/lists/oss-security/2024/01/10/1 - web: https://lists.apache.org/thread/nscrl3c7pn68q4j73y3ottql6n5x3hd4 source: id: GHSA-f899-4mr4-fqpv created: 2024-06-14T11:35:54.338882-04:00 review_status: UNREVIEWED unexcluded: NOT_IMPORTABLE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0942.yaml
id: GO-2022-0942 modules: - module: github.com/graphql-go/graphql versions: - fixed: 0.8.1 vulnerable_at: 0.8.0 packages: - package: github.com/graphql-go/graphql/language/parser symbols: - Parse summary: Infinite recursion in parser in github.com/graphql-go/graphql description: |- graphql-go (aka GraphQL for Go) has infinite recursion in the type definition parser. published: 2022-08-23T13:19:13Z cves: - CVE-2022-37315 ghsas: - GHSA-h3qm-jrrf-cgj3 references: - fix: https://github.com/graphql-go/graphql/pull/642 - fix: https://github.com/graphql-go/graphql/pull/642/commits/4188bd5b3877f7badb951b421cf66e0af2eacb22 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1175.yaml
id: GO-2022-1175 modules: - module: github.com/cortexproject/cortex versions: - introduced: 1.13.0 - fixed: 1.13.2 - introduced: 1.14.0 - fixed: 1.14.1 vulnerable_at: 1.14.0 packages: - package: github.com/cortexproject/cortex/pkg/alertmanager symbols: - validateAlertmanagerConfig - validateGlobalConfig skip_fix: 'TODO: Revisit this reason. (Running fix causes error containing undefined: grpc.WithBalancerName)' summary: Exposure of local files in github.com/cortexproject/cortex description: |- A malicious actor could remotely read local files by submitting to the Alertmanager Set Configuration API maliciously crafted inputs. Only users of the Alertmanager service where "-experimental.alertmanager.enable-api" or "enable_api: true" is configured are affected. cves: - CVE-2022-23536 ghsas: - GHSA-cq2g-pw6q-hf7j credits: - Austin Robertson with Amazon Web Services references: - advisory: https://github.com/cortexproject/cortex/security/advisories/GHSA-cq2g-pw6q-hf7j - fix: https://github.com/cortexproject/cortex/commit/03e023d8b012887b31cc268d0d011b01e1e65506 - web: https://cortexmetrics.io/docs/api/#set-alertmanager-configuration review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0022.yaml
id: GO-2020-0022 modules: - module: github.com/cloudflare/golz4 versions: - fixed: 0.0.0-20140711154735-199f5f787806 vulnerable_at: 0.0.0-20140711153818-2dcef6a6aeec packages: - package: github.com/cloudflare/golz4 symbols: - Uncompress summary: Out-of-bounds write in github.com/cloudflare/golz4 description: |- LZ4 bindings use a deprecated C API that is vulnerable to memory corruption, which could lead to arbitrary code execution if called with untrusted user input. published: 2021-04-14T20:04:52Z ghsas: - GHSA-4wp2-8rm2-jgmh credits: - Yann Collet references: - fix: https://github.com/cloudflare/golz4/commit/199f5f7878062ca17a98e079f2dbe1205e2ed898 - web: https://github.com/cloudflare/golz4/issues/5 cve_metadata: id: CVE-2014-125026 cwe: 'CWE 94: Improper Control of Generation of Code (''Code Injection'')' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2554.yaml
id: GO-2024-2554 modules: - module: helm.sh/helm/v3 versions: - fixed: 3.14.1 vulnerable_at: 3.14.0 packages: - package: helm.sh/helm/v3/pkg/chart symbols: - Metadata.Validate derived_symbols: - Chart.Validate - package: helm.sh/helm/v3/pkg/chartutil symbols: - SaveDir - writeTarContents derived_symbols: - CreateFrom - Save - package: helm.sh/helm/v3/pkg/lint/rules symbols: - validateChartName derived_symbols: - Chartfile - Dependencies - Templates - TemplatesWithKubeVersion summary: Path traversal in helm.sh/helm/v3 cves: - CVE-2024-25620 ghsas: - GHSA-v53g-5gjp-272r references: - advisory: https://github.com/helm/helm/security/advisories/GHSA-v53g-5gjp-272r - fix: https://github.com/helm/helm/commit/0d0f91d1ce277b2c8766cdc4c7aa04dbafbf2503 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0014.yaml
id: GO-2020-0014 modules: - module: golang.org/x/net versions: - fixed: 0.0.0-20190125091013-d26f9f9a57f3 vulnerable_at: 0.0.0-20190125002852-4b62a64f59f7 packages: - package: golang.org/x/net/html symbols: - inSelectIM - inSelectInTableIM derived_symbols: - Parse - ParseFragment summary: Infinite loop due to improper handling of "select" tags in golang.org/x/net/html description: |- html.Parse does not properly handle "select" tags, which can lead to an infinite loop. If parsing user supplied input, this may be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2018-17846 ghsas: - GHSA-vfw5-hrgq-h5wf credits: - '@tr3ee' references: - fix: https://go-review.googlesource.com/c/137275 - fix: https://go.googlesource.com/net/+/d26f9f9a57f3fab6a695bec0d84433c2c50f8bbf - report: https://go.dev/issue/27842 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0289.yaml
id: GO-2022-0289 modules: - module: std versions: - fixed: 1.16.12 - introduced: 1.17.0-0 - fixed: 1.17.5 vulnerable_at: 1.17.4 packages: - package: syscall symbols: - ForkExec skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Misdirected I/O in syscall description: |- When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit. published: 2022-05-18T18:23:23Z cves: - CVE-2021-44717 credits: - Tomasz Maczukin - Kamil Trzciński of GitLab references: - fix: https://go.dev/cl/370576 - fix: https://go.googlesource.com/go/+/a76511f3a40ea69ee4f5cd86e735e1c8a84f0aa2 - report: https://go.dev/issue/50057 - web: https://groups.google.com/g/golang-announce/c/hcmEScgc00k - fix: https://go.dev/cl/370577 - fix: https://go.dev/cl/370795 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2747.yaml
id: GO-2024-2747 modules: - module: github.com/gohugoio/hugo versions: - introduced: 0.123.0 - fixed: 0.125.3 vulnerable_at: 0.125.2 packages: - package: github.com/gohugoio/hugo/hugolib summary: Hugo Markdown titles are not escaped in internal render hooks in github.com/gohugoio/hugo cves: - CVE-2024-32875 ghsas: - GHSA-ppf8-hhpp-f5hj references: - advisory: https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj - fix: https://github.com/gohugoio/hugo/commit/15a4b9b33715887001f6eff30721d41c0d4cfdd1 - web: https://github.com/gohugoio/hugo/releases/tag/v0.125.3 - web: https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault source: id: GHSA-ppf8-hhpp-f5hj created: 2024-07-16T11:10:41.124714-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0073.yaml
id: GO-2021-0073 modules: - module: github.com/git-lfs/git-lfs versions: - fixed: 2.1.1-0.20170519163204-f913f5f9c7c6+incompatible vulnerable_at: 2.1.0+incompatible packages: - package: github.com/git-lfs/git-lfs/lfsapi symbols: - sshGetLFSExeAndArgs derived_symbols: - Client.NewRequest - sshAuthClient.Resolve - sshCache.Resolve summary: Arbitrary command execution in github.com/git-lfs/git-lfs description: |- Arbitrary command execution can be triggered by improperly sanitized SSH URLs in LFS configuration files. This can be triggered by cloning a malicious repository. published: 2021-04-14T20:04:52Z cves: - CVE-2017-17831 ghsas: - GHSA-w4xh-w33p-4v29 references: - fix: https://github.com/git-lfs/git-lfs/pull/2241 - fix: https://github.com/git-lfs/git-lfs/commit/f913f5f9c7c6d1301785fdf9884a2942d59cdf19 - web: http://blog.recurity-labs.com/2017-08-10/scm-vulns - web: https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2870.yaml
id: GO-2024-2870 modules: - module: github.com/aquasecurity/trivy versions: - fixed: 0.51.2 vulnerable_at: 0.51.1 packages: - package: github.com/aquasecurity/trivy/pkg/fanal/image/registry/azure - package: github.com/aquasecurity/trivy/pkg/fanal/image/registry/ecr symbols: - ECR.CheckOptions - package: github.com/aquasecurity/trivy/pkg/fanal/image/registry/google symbols: - Registry.CheckOptions summary: Credential leakage in github.com/aquasecurity/trivy description: |- A malicious registry can cause Trivy to leak credentials for legitimate registries such as AWS Elastic Container Registry (ECR), Google Cloud Artifact/Container Registry, or Azure Container Registry (ACR) if the registry is scanned from directly using Trivy. These tokens can then be used to push/pull images from those registries to which the identity/user running Trivy has access. This vulnerability only applies when scanning container images directly from a registry. If you use Docker, containerd or other runtime to pull images locally and scan them with Trivy, you are not affected. To enforce this behavior, you can use the --image-src flag to select which sources you trust. cves: - CVE-2024-35192 ghsas: - GHSA-xcq4-m2r3-cmrj credits: - '@lyoung-confluent' references: - advisory: https://github.com/aquasecurity/trivy/security/advisories/GHSA-xcq4-m2r3-cmrj - fix: https://github.com/aquasecurity/trivy/commit/e7f14f729de259551203f313e57d2d9d3aa2ff87 source: id: GHSA-xcq4-m2r3-cmrj created: 2024-05-22T14:41:45.135631743Z review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2907.yaml
id: GO-2024-2907 modules: - module: github.com/projectdiscovery/interactsh versions: - fixed: 1.2.0 vulnerable_at: 1.1.9 summary: Files or Directories Accessible to External Parties in ProjectDiscovery in github.com/projectdiscovery/interactsh cves: - CVE-2024-5262 ghsas: - GHSA-q5mg-pc7r-r8cr references: - advisory: https://github.com/advisories/GHSA-q5mg-pc7r-r8cr - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-5262 - fix: https://github.com/projectdiscovery/interactsh/commit/6a0cb98b16636a98712729f3d23e34d8bf7260e7 - fix: https://github.com/projectdiscovery/interactsh/pull/874 - web: https://zuso.ai/advisory/za-2024-01 source: id: GHSA-q5mg-pc7r-r8cr created: 2024-06-13T12:06:00.68454-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0643.yaml
id: GO-2022-0643 modules: - module: github.com/elastic/beats versions: - fixed: 6.1.0+incompatible vulnerable_at: 6.0.0 packages: - package: github.com/elastic/beats/packetbeat/protos/pgsql symbols: - pgsqlFieldsParser derived_symbols: - pgsqlPlugin.Parse summary: Denial of service in github.com/elastic/beats description: |- A local attacker can cause a panic if they are able to send arbitrary traffic to a monitored port, due to an out of bounds read. published: 2022-02-15T01:57:18Z cves: - CVE-2017-11480 ghsas: - GHSA-9q3g-m353-cp4p references: - fix: https://github.com/elastic/beats/pull/5457 - fix: https://github.com/elastic/beats/commit/aeca65779d573976981587ca1d1461399e1b59dd review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0113.yaml
id: GO-2021-0113 modules: - module: golang.org/x/text versions: - fixed: 0.3.7 vulnerable_at: 0.3.6 packages: - package: golang.org/x/text/language symbols: - Parse derived_symbols: - MatchStrings - MustParse - ParseAcceptLanguage summary: Out-of-bounds read in golang.org/x/text/language description: |- Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. published: 2021-10-06T17:51:21Z cves: - CVE-2021-38561 ghsas: - GHSA-ppp9-7jff-5vj2 credits: - Guido Vranken references: - fix: https://go.dev/cl/340830 - fix: https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2891.yaml
id: GO-2024-2891 modules: - module: github.com/evmos/evmos vulnerable_at: 1.1.3 - module: github.com/evmos/evmos/v2 vulnerable_at: 2.0.2 - module: github.com/evmos/evmos/v3 vulnerable_at: 3.0.3 - module: github.com/evmos/evmos/v4 vulnerable_at: 4.0.2 - module: github.com/evmos/evmos/v5 vulnerable_at: 5.0.1 - module: github.com/evmos/evmos/v6 vulnerable_at: 6.0.4 - module: github.com/evmos/evmos/v7 vulnerable_at: 7.0.0 - module: github.com/evmos/evmos/v8 vulnerable_at: 8.2.3 - module: github.com/evmos/evmos/v9 vulnerable_at: 9.1.0 - module: github.com/evmos/evmos/v10 vulnerable_at: 10.0.1 - module: github.com/evmos/evmos/v11 vulnerable_at: 11.0.2 - module: github.com/evmos/evmos/v12 vulnerable_at: 12.1.6 - module: github.com/evmos/evmos/v13 vulnerable_at: 13.0.2 - module: github.com/evmos/evmos/v14 vulnerable_at: 14.1.0 - module: github.com/evmos/evmos/v15 vulnerable_at: 15.0.0 - module: github.com/evmos/evmos/v16 vulnerable_at: 16.0.4 - module: github.com/evmos/evmos/v17 vulnerable_at: 17.0.1 - module: github.com/evmos/evmos/v18 versions: - fixed: 18.0.0 summary: evmos allows transferring unvested tokens after delegations in github.com/evmos/evmos cves: - CVE-2024-32873 ghsas: - GHSA-pxv8-qhrh-jc7v related: - CVE-2024-37158 - CVE-2024-37159 references: - advisory: https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32873 - fix: https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb notes: - fix: 'github.com/evmos/evmos/v18: could not add vulnerable_at: could not find tagged version between introduced and fixed' - manually moved CVE-2024-37158 and CVE-2024-37159 to related section source: id: GHSA-pxv8-qhrh-jc7v created: 2024-06-26T14:08:33.882317-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2098.yaml
id: GO-2023-2098 modules: - module: github.com/consensys/gnark versions: - fixed: 0.9.0 vulnerable_at: 0.9.0-alpha packages: - package: github.com/consensys/gnark/frontend/cs/r1cs symbols: - builder.Cmp - builder.AssertIsLessOrEqual - builder.mustBeLessOrEqVar - builder.mustBeLessOrEqCst derived_symbols: - builder.ToBinary - package: github.com/consensys/gnark/frontend/cs/scs symbols: - builder.Cmp - builder.AssertIsLessOrEqual - builder.mustBeLessOrEqVar - builder.mustBeLessOrEqCst derived_symbols: - builder.ToBinary - package: github.com/consensys/gnark/internal/backend/circuits symbols: - recursiveHint.Define - package: github.com/consensys/gnark/std/math/bits symbols: - WithNbDigits summary: |- Unsoundness in variable comparison / non-unique binary decomposition in github.com/consensys/gnark cves: - CVE-2023-44378 ghsas: - GHSA-498w-5j49-vqjg credits: - '@kustosz' references: - report: https://github.com/zkopru-network/zkopru/issues/116 - fix: https://github.com/Consensys/gnark/pull/835 - fix: https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f - advisory: https://github.com/advisories/GHSA-498w-5j49-vqjg review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2778.yaml
id: GO-2024-2778 modules: - module: github.com/rancher/rancher versions: - introduced: 2.0.0+incompatible non_go_versions: - fixed: 2.4.16 - introduced: 2.5.0 - fixed: 2.5.9 summary: Rancher Privilege escalation vulnerability via malicious "Connection" header in github.com/rancher/rancher cves: - CVE-2021-31999 ghsas: - GHSA-pvxj-25m6-7vqr references: - advisory: https://github.com/advisories/GHSA-pvxj-25m6-7vqr - advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-31999 - web: https://bugzilla.suse.com/show_bug.cgi?id=1187084 notes: - fix: 'github.com/rancher/rancher: could not add vulnerable_at: latest version (1.6.30) is before last introduced version' source: id: GHSA-pvxj-25m6-7vqr created: 2024-06-26T14:03:57.874413-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2756.yaml
id: GO-2024-2756 modules: - module: kubevirt.io/kubevirt versions: - fixed: 0.30.0 vulnerable_at: 0.30.0-rc.4 summary: Privilege Escalation in kubevirt in kubevirt.io/kubevirt cves: - CVE-2020-14316 ghsas: - GHSA-828r-r2c8-rfw3 references: - advisory: https://github.com/advisories/GHSA-828r-r2c8-rfw3 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-14316 - web: https://bugzilla.redhat.com/show_bug.cgi?id=1848951 - web: https://github.com/kubevirt/kubevirt/pull/3686 source: id: GHSA-828r-r2c8-rfw3 created: 2024-05-17T16:12:17.184908-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0969.yaml
id: GO-2022-0969 modules: - module: std versions: - fixed: 1.18.6 - introduced: 1.19.0-0 - fixed: 1.19.1 vulnerable_at: 1.19.0 packages: - package: net/http symbols: - http2serverConn.goAway derived_symbols: - ListenAndServe - ListenAndServeTLS - Serve - ServeTLS - Server.ListenAndServe - Server.ListenAndServeTLS - Server.Serve - Server.ServeTLS - http2Server.ServeConn - module: golang.org/x/net versions: - fixed: 0.0.0-20220906165146-f3363e06e74c vulnerable_at: 0.0.0-20220826154423-83b083e8dc8b packages: - package: golang.org/x/net/http2 symbols: - serverConn.goAway derived_symbols: - Server.ServeConn summary: Denial of service in net/http and golang.org/x/net/http2 description: |- HTTP/2 server connections can hang forever waiting for a clean shutdown that was preempted by a fatal error. This condition can be exploited by a malicious client to cause a denial of service. published: 2022-09-12T20:23:06Z cves: - CVE-2022-27664 ghsas: - GHSA-69cg-p879-7622 credits: - Bahruz Jabiyev - Tommaso Innocenti - Anthony Gavazzi - Steven Sprecher - Kaan Onarlioglu references: - web: https://groups.google.com/g/golang-announce/c/x49AQzIVX-s - report: https://go.dev/issue/54658 - fix: https://go.dev/cl/428735 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1557.yaml
id: GO-2023-1557 modules: - module: github.com/ipfs/go-unixfs versions: - fixed: 0.4.3 vulnerable_at: 0.4.2 packages: - package: github.com/ipfs/go-unixfs/hamt symbols: - makeShard - newChilder derived_symbols: - NewHamtFromDag - NewShard - NewShardValue - Shard.EnumLinks - Shard.EnumLinksAsync - Shard.Find - Shard.ForEachLink - Shard.Remove - Shard.Set - Shard.SetLink - Shard.Swap - Shard.Take summary: Denial of service via HAMT decoding panic in github.com/ipfs/go-unixfs description: |- Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by bogus "fanout" parameter in the HAMT directory nodes. A workaround is to not feed untrusted user data to the decoding functions. cves: - CVE-2023-23625 ghsas: - GHSA-q264-w97q-q778 credits: - Jorropo references: - advisory: https://github.com/advisories/GHSA-q264-w97q-q778 - fix: https://github.com/ipfs/go-unixfs/commit/467d139a640ecee4f2e74643dafcc58bb3b54175 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0264.yaml
id: GO-2021-0264 modules: - module: std versions: - fixed: 1.16.10 - introduced: 1.17.0-0 - fixed: 1.17.3 vulnerable_at: 1.17.2 packages: - package: archive/zip symbols: - split - Reader.Open skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Panic when opening certain archives in archive/zip description: |- Previously, opening a zip with (*Reader).Open could result in a panic if the zip contained a file whose name was exclusively made up of slash characters or ".." path elements. Open could also panic if passed the empty string directly as an argument. Now, any files in the zip whose name could not be made valid for fs.FS.Open will be skipped, and no longer added to the fs.FS file list, although they are still accessible through (*Reader).File. Note that it was already the case that a file could be accessible from (*Reader).Open with a name different from the one in (*Reader).File, as the former is the cleaned name, while the latter is the original one. Finally, the actual panic site was made robust as a defense-in-depth measure. published: 2022-01-13T20:54:43Z cves: - CVE-2021-41772 credits: - Colin Arnott (SiteHost) - Noah Santschi-Cooney (Sourcegraph Code Intelligence Team) references: - fix: https://go.dev/cl/349770 - fix: https://go.googlesource.com/go/+/b24687394b55a93449e2be4e6892ead58ea9a10f - web: https://groups.google.com/g/golang-announce/c/0fM21h43arc - report: https://go.dev/issue/48085 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1130.yaml
id: GO-2022-1130 modules: - module: github.com/prometheus/exporter-toolkit versions: - fixed: 0.7.2 - introduced: 0.8.0 - fixed: 0.8.2 vulnerable_at: 0.8.1 packages: - package: github.com/prometheus/exporter-toolkit/web symbols: - webHandler.ServeHTTP derived_symbols: - Listen - ListenAndServe - Serve - ServeMultiple summary: Authentication bypass in github.com/prometheus/exporter-toolkit description: |- If an attacker has access to a Prometheus web.yml file and users' bcrypted passwords, it would be possible to bypass security via the built-in authentication cache. cves: - CVE-2022-46146 ghsas: - GHSA-7rg2-cxvp-9p7p credits: - Lei Wan references: - advisory: https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p - fix: https://github.com/prometheus/exporter-toolkit/commit/5b1eab34484ddd353986bce736cd119d863e4ff5 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1840.yaml
id: GO-2023-1840 modules: - module: std versions: - fixed: 1.19.10 - introduced: 1.20.0-0 - fixed: 1.20.5 vulnerable_at: 1.20.4 packages: - package: runtime summary: Unsafe behavior in setuid/setgid binaries in runtime description: |- On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers. credits: - Vincent Dehors from Synacktiv references: - report: https://go.dev/issue/60272 - fix: https://go.dev/cl/501223 - web: https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ cve_metadata: id: CVE-2023-29403 cwe: 'CWE-642: External Control of Critical State Data' references: - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/ - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0034.yaml
id: GO-2020-0034 modules: - module: github.com/artdarek/go-unzip versions: - fixed: 1.0.0 vulnerable_at: 0.0.0-20180315101617-33dc05190e4b packages: - package: github.com/artdarek/go-unzip symbols: - Unzip.Extract summary: Path traversal in github.com/artdarek/go-unzip description: |- Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. published: 2021-04-14T20:04:52Z ghsas: - GHSA-rmj9-q58g-9qgg references: - fix: https://github.com/artdarek/go-unzip/pull/2 - fix: https://github.com/artdarek/go-unzip/commit/4975cbe0a719dc50b12da8585f1f207c82f7dfe0 - web: https://snyk.io/research/zip-slip-vulnerability cve_metadata: id: CVE-2020-36560 cwe: 'CWE 29: Path Traversal: "\..\filename"' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0533.yaml
id: GO-2022-0533 modules: - module: std versions: - fixed: 1.17.11 - introduced: 1.18.0-0 - fixed: 1.18.3 vulnerable_at: 1.18.2 packages: - package: path/filepath goos: - windows symbols: - Clean summary: Path traversal via Clean on Windows in path/filepath description: |- On Windows, the filepath.Clean function can convert certain invalid paths to valid, absolute paths, potentially allowing a directory traversal attack. For example, Clean(".\c:") returns "c:". published: 2022-07-28T17:25:07Z credits: - Unrud references: - fix: https://go.dev/cl/401595 - fix: https://go.googlesource.com/go/+/9cd1818a7d019c02fa4898b3e45a323e35033290 - report: https://go.dev/issue/52476 - web: https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ cve_metadata: id: CVE-2022-29804 cwe: 'CWE-22: Improper Limitation of a Pathname to a Restricted Directory (''Path Traversal'')' description: |- Incorrect conversion of certain invalid paths to valid, absolute paths in Clean in path/filepath before Go 1.17.11 and Go 1.18.3 on Windows allows potential directory traversal attack. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2866.yaml
id: GO-2024-2866 modules: - module: github.com/submariner-io/submariner-operator versions: - fixed: 0.16.4 - introduced: 0.17.0 unsupported_versions: - last_affected: 0.18.0-m3 vulnerable_at: 0.17.1 summary: Submariner Operator sets unnecessary RBAC permissions in helm charts in github.com/submariner-io/submariner-operator cves: - CVE-2024-5042 ghsas: - GHSA-2rhx-qhxp-5jpw references: - advisory: https://github.com/advisories/GHSA-2rhx-qhxp-5jpw - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-5042 - fix: https://github.com/submariner-io/submariner-operator/commit/b27a04c4270e53cbff6ff8ac6245db10c204bcab - fix: https://github.com/submariner-io/submariner-operator/pull/3040 - report: https://github.com/submariner-io/submariner-operator/issues/3041 - web: https://access.redhat.com/security/cve/CVE-2024-5042 - web: https://bugzilla.redhat.com/show_bug.cgi?id=2280921 source: id: GHSA-2rhx-qhxp-5jpw created: 2024-06-04T14:26:43.671356-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1574.yaml
id: GO-2023-1574 modules: - module: github.com/containerd/containerd versions: - introduced: 1.6.0 - fixed: 1.6.18 vulnerable_at: 1.6.17 packages: - package: github.com/containerd/containerd/oci symbols: - WithUser - WithUIDGID - WithUserID - WithUsername - WithAdditionalGIDs - package: github.com/containerd/containerd/pkg/cri/server symbols: - criService.containerSpecOpts derived_symbols: - criService.CreateContainer - instrumentedAlphaService.CreateContainer - instrumentedService.CreateContainer - module: github.com/containerd/containerd versions: - fixed: 1.5.18 vulnerable_at: 1.5.17 packages: - package: github.com/containerd/containerd/oci symbols: - WithUser - WithUIDGID - WithUserID - WithUsername - WithAdditionalGIDs - package: github.com/containerd/containerd/pkg/cri/server symbols: - criService.containerSpecOpts derived_symbols: - criService.CreateContainer - instrumentedService.CreateContainer summary: |- Privilege escalation via supplementary groups in github.com/containerd/containerd description: |- Supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases and potentially escalate privileges in the container. Uses of the containerd client library may also have improperly setup supplementary groups. cves: - CVE-2023-25173 ghsas: - GHSA-hmfx-3pcx-653p related: - GHSA-4wjj-jwc9-2x96 - GHSA-fjm8-m7m6-2fjp - GHSA-phjr-8j92-w5v7 - GHSA-rc4r-wh2q-q6c4 - CVE-2022-2989 - CVE-2022-2990 - CVE-2022-2995 - CVE-2022-36109 references: - advisory: https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p - web: https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4 - fix: https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a - web: https://github.com/advisories/GHSA-4wjj-jwc9-2x96 - web: https://github.com/advisories/GHSA-fjm8-m7m6-2fjp - web: https://github.com/advisories/GHSA-phjr-8j92-w5v7 - article: https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2590.yaml
id: GO-2024-2590 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 9.2.0+incompatible - fixed: 9.2.5+incompatible - introduced: 9.3.0+incompatible - fixed: 9.3.1+incompatible - introduced: 9.4.0+incompatible - fixed: 9.4.2+incompatible vulnerable_at: 9.4.2-rc2+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - fixed: 8.1.9 vulnerable_at: 8.0.0-20240626184126-817e18414e41 summary: Mattermost leaks details of AD/LDAP groups of a teams in github.com/mattermost/mattermost-server cves: - CVE-2024-23493 ghsas: - GHSA-7v3v-984v-h74r unknown_aliases: - CGA-gvhx-fgcw-f546 references: - advisory: https://github.com/advisories/GHSA-7v3v-984v-h74r - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23493 - web: https://mattermost.com/security-updates source: id: GHSA-7v3v-984v-h74r created: 2024-06-26T16:06:07.408556-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2521.yaml
id: GO-2024-2521 modules: - module: github.com/docker/docker versions: - fixed: 20.10.0-beta1+incompatible non_go_versions: - introduced: 19.03.0 - fixed: 19.03.1 packages: - package: github.com/docker/docker/pkg/chrootarchive skip_fix: fix does not work with incompatible versions - module: github.com/moby/moby versions: - fixed: 20.10.0-beta1+incompatible non_go_versions: - introduced: 19.03.0 - fixed: 19.03.1 packages: - package: github.com/moby/moby/pkg/chrootarchive skip_fix: fix does not work with incompatible versions summary: Moby Docker cp broken with debian containers in github.com/docker/docker description: |- In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container. cves: - CVE-2019-14271 ghsas: - GHSA-v2cv-wwxq-qq97 references: - advisory: https://github.com/advisories/GHSA-v2cv-wwxq-qq97 - fix: https://github.com/moby/moby/commit/11e48badcb67554b3d795241855028f28d244545 - fix: https://github.com/moby/moby/commit/fa8dd90ceb7bcb9d554d27e0b9087ab83e54bd2b - fix: https://github.com/moby/moby/pull/39612 - report: https://github.com/moby/moby/issues/39449 source: id: GHSA-v2cv-wwxq-qq97 created: 2024-07-15T12:29:37.368794-04:00 review_status: REVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2844.yaml
id: GO-2024-2844 modules: - module: github.com/grafana/grafana non_go_versions: - fixed: 8.5.15 - introduced: 9.0.0 - fixed: 9.2.4 vulnerable_at: 5.4.5+incompatible summary: Grafana User enumeration via forget password in github.com/grafana/grafana cves: - CVE-2022-39307 ghsas: - GHSA-3p62-42x7-gxg5 unknown_aliases: - BIT-grafana-2022-39307 references: - advisory: https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-39307 - web: https://security.netapp.com/advisory/ntap-20221215-0004 source: id: GHSA-3p62-42x7-gxg5 created: 2024-06-04T14:27:37.274881-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2809.yaml
id: GO-2024-2809 modules: - module: github.com/carina-io/carina vulnerable_at: 0.13.0 summary: CVE-2024-32359 in github.com/carina-io/carina cves: - CVE-2024-32359 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32359 - web: http://carina.com - web: https://gist.github.com/HouqiyuA/568d9857dab4ddba6b8b6a791e90f906 - web: https://github.com/HouqiyuA/k8s-rbac-poc - web: https://github.com/carina-io/carina source: id: CVE-2024-32359 created: 2024-06-04T15:26:08.181182-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2496.yaml
id: GO-2024-2496 modules: - module: github.com/apache/servicecomb-service-center non_go_versions: - fixed: 2.2.0 vulnerable_at: 1.4.8 summary: |- Apache ServiceComb Service-Center Exposure of Sensitive Information to an Unauthorized Actor vulnerability in github.com/apache/servicecomb-service-center cves: - CVE-2023-44312 ghsas: - GHSA-r8xp-52mq-rmm8 references: - advisory: https://github.com/advisories/GHSA-r8xp-52mq-rmm8 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-44312 - web: http://www.openwall.com/lists/oss-security/2024/01/31/5 - web: https://lists.apache.org/thread/dkvlgnrmc17qzjdy9k0cr60wpzcssk1s source: id: GHSA-r8xp-52mq-rmm8 created: 2024-06-14T11:38:00.285197-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2971.yaml
id: GO-2024-2971 modules: - module: github.com/gogs/gogs unsupported_versions: - last_affected: 0.13.0 vulnerable_at: 0.13.0 summary: Gogs allows argument injection during the previewing of changes in github.com/gogs/gogs cves: - CVE-2024-39932 ghsas: - GHSA-hf29-9hfh-w63j references: - advisory: https://github.com/advisories/GHSA-hf29-9hfh-w63j - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39932 - web: https://github.com/gogs/gogs/releases - web: https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1 source: id: GHSA-hf29-9hfh-w63j created: 2024-07-08T13:24:05.043922-04:00 review_status: UNREVIEWED