repo_id
stringclasses 927
values | file_path
stringlengths 99
214
| content
stringlengths 2
4.15M
|
|---|---|---|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0402.yaml
|
id: GO-2022-0402
modules:
- module: github.com/nats-io/jwt
versions:
- fixed: 1.1.0
vulnerable_at: 1.0.1
packages:
- package: github.com/nats-io/jwt
symbols:
- Export.Validate
- Import.Validate
- Imports.Validate
derived_symbols:
- Account.Validate
- AccountClaims.Validate
- Exports.Validate
summary: Panic in NATS JWT decoding in github.com/nats-io/jwt
description: |-
A malicious account can create and sign a User JWT which causes a panic when
decoded by the NATS JWT library.
published: 2022-07-01T20:10:43Z
cves:
- CVE-2020-26521
ghsas:
- GHSA-h2fg-54x9-5qhq
- GHSA-hmm9-r2m2-qg9w
references:
- fix: https://github.com/nats-io/jwt/pull/107
- web: https://advisories.nats.io/CVE/CVE-2020-26521.txt
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2471.yaml
|
id: GO-2024-2471
modules:
- module: github.com/cometbft/cometbft
versions:
- introduced: 0.38.0
- fixed: 0.38.3
vulnerable_at: 0.38.2
packages:
- package: github.com/cometbft/cometbft/types
symbols:
- ConsensusParams.ValidateUpdate
summary: Chain halt panic in github.com/cometbft/cometbft
description: |-
A vulnerability in CometBFT’s validation logic for VoteExtensionsEnableHeight
can result in a chain halt when triggered through a governance parameter change
proposal on an ABCI2 Application Chain. If a parameter change proposal including
a VoteExtensionsEnableHeight modification is passed, nodes running the affected
versions may panic, halting the network.
ghsas:
- GHSA-qr8r-m495-7hc4
credits:
- '@dongsam'
references:
- advisory: https://github.com/cometbft/cometbft/security/advisories/GHSA-qr8r-m495-7hc4
- fix: https://github.com/cometbft/cometbft/commit/5fbc97378b94b0945febe9549399e7c9c5df13ed
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2046.yaml
|
id: GO-2023-2046
modules:
- module: github.com/ethereum/go-ethereum
versions:
- fixed: 1.12.1
vulnerable_at: 1.12.0
summary: Unbounded memory consumption in github.com/ethereum/go-ethereum
cves:
- CVE-2023-40591
ghsas:
- GHSA-ppjg-v974-84cm
references:
- advisory: https://github.com/ethereum/go-ethereum/security/advisories/GHSA-ppjg-v974-84cm
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1882.yaml
|
id: GO-2023-1882
modules:
- module: github.com/cometbft/cometbft
versions:
- introduced: 0.37.1
- fixed: 0.37.2
vulnerable_at: 0.37.1
packages:
- package: github.com/cometbft/cometbft/consensus
symbols:
- PeerState.MarshalJSON
summary: Deadlock in github.com/cometbft/cometbft/consensus
description: |-
An internal modification to the way PeerState is serialized to JSON introduced a
deadlock when the new function MarshalJSON is called.
This function can be called in two ways. The first is via logs, by setting the
consensus logging module to "debug" level (which should not happen in
production), and setting the log output format to JSON. The second is via RPC
dump_consensus_state.
cves:
- CVE-2023-34450
ghsas:
- GHSA-mvj3-qrqh-cjvr
references:
- advisory: https://github.com/cometbft/cometbft/security/advisories/GHSA-mvj3-qrqh-cjvr
- fix: https://github.com/cometbft/cometbft/pull/524
- fix: https://github.com/cometbft/cometbft/pull/863
- fix: https://github.com/cometbft/cometbft/pull/865
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2879.yaml
|
id: GO-2024-2879
modules:
- module: github.com/dapr/dapr
versions:
- introduced: 1.13.0
- fixed: 1.13.3
vulnerable_at: 1.13.2
summary: Dapr API Token Exposure in github.com/dapr/dapr
cves:
- CVE-2024-35223
ghsas:
- GHSA-284c-x8m7-9w5h
references:
- advisory: https://github.com/dapr/dapr/security/advisories/GHSA-284c-x8m7-9w5h
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-35223
- fix: https://github.com/dapr/dapr/commit/e0591e43d0cdfd30a2f2960dce5d9892dc98bc2c
- fix: https://github.com/dapr/dapr/pull/7404
- report: https://github.com/dapr/dapr/issues/7344
- web: https://github.com/dapr/dapr/releases/tag/v1.13.3
source:
id: GHSA-284c-x8m7-9w5h
created: 2024-05-24T19:47:17.904676322Z
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0066.yaml
|
id: GO-2021-0066
modules:
- module: k8s.io/kubernetes
versions:
- fixed: 1.20.0-alpha.1
vulnerable_at: 1.20.0-alpha.0
packages:
- package: k8s.io/kubernetes/pkg/credentialprovider
symbols:
- readDockerConfigFileFromBytes
- readDockerConfigJSONFileFromBytes
skip_fix: 'TODO: revisit this reason (reading k8s.io/api/go.mod at revision v0.0.0: unknown revision v0.0.0)'
summary: Sensitive information leak via log file in k8s.io/kubernetes
description: |-
Attempting to read a malformed .dockercfg may cause secrets to be
inappropriately logged.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-8564
ghsas:
- GHSA-8mjg-8c8g-6h85
credits:
- '@sfowl'
references:
- fix: https://github.com/kubernetes/kubernetes/pull/94712
- fix: https://github.com/kubernetes/kubernetes/commit/11793434dac97a49bfed0150b56ac63e5dc34634
- web: https://github.com/kubernetes/kubernetes/issues/95622
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1788.yaml
|
id: GO-2023-1788
modules:
- module: github.com/goreleaser/nfpm/v2
versions:
- introduced: 2.0.0
- fixed: 2.29.0
vulnerable_at: 2.28.0
packages:
- package: github.com/goreleaser/nfpm/v2
symbols:
- ParseWithEnvMapping
- WithDefaults
derived_symbols:
- Config.Validate
- Info.Validate
- Parse
- ParseFile
- ParseFileWithEnvMapping
- PrepareForPackager
- Validate
- package: github.com/goreleaser/nfpm/v2/files
symbols:
- Content.WithFileInfoDefaults
- PrepareForPackager
- addGlobbedFiles
- addTree
summary: Incorrect permissions in github.com/goreleaser/nfpm/v2
description: |-
When nfpm packages files without additional configuration to enforce its own
permissions, the files could be packaged with incorrect permissions (chmod 666
or 777). Anyone who uses nfpm to create packages and does not check or set file
permissions before packaging could result in files or folders being packaged
with incorrect permissions.
cves:
- CVE-2023-32698
ghsas:
- GHSA-w7jw-q4fg-qc4c
credits:
- oCHRISo
- caarlos0
- djgilcrease
references:
- fix: https://github.com/goreleaser/nfpm/commit/ed9abdf63d5012cc884f2a83b4ab2b42b3680d30
- web: https://github.com/goreleaser/nfpm/releases/tag/v2.29.0
- advisory: https://github.com/advisories/GHSA-w7jw-q4fg-qc4c
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0980.yaml
|
id: GO-2022-0980
modules:
- module: github.com/hashicorp/consul-template
versions:
- fixed: 0.27.3
- introduced: 0.28.0
- fixed: 0.28.3
- introduced: 0.29.0
- fixed: 0.29.2
vulnerable_at: 0.29.1
packages:
- package: github.com/hashicorp/consul-template/template
symbols:
- Template.Execute
summary: |-
Exposure of Vault secrets via error messages in
github.com/hashicorp/consul-template
description: |-
The text of errors returned by Template.Execute can contain Vault secrets,
potentially revealing these secrets in logs or error reports.
cves:
- CVE-2022-38149
ghsas:
- GHSA-8449-7gc2-pwrp
references:
- advisory: https://discuss.hashicorp.com/t/hsec-2022-16-consul-template-may-expose-vault-secrets-when-processing-invalid-input/43215
- fix: https://github.com/hashicorp/consul-template/commit/d6a6f4af219c28e67d847ba0e0b2bea8f5bb9076
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1548.yaml
|
id: GO-2023-1548
modules:
- module: github.com/argoproj/argo-cd/v2
versions:
- introduced: 2.6.0-rc1
- fixed: 2.6.1
vulnerable_at: 2.6.0
packages:
- package: github.com/argoproj/argo-cd/v2/util/argo
symbols:
- validateRepo
derived_symbols:
- ValidateRepo
summary: Repository access credential leak in github.com/argoproj/argo-cd/v2
description: |-
Argo CD has an output sanitization bug which leaks repository access credentials
in error messages.
These error messages are visible to the user, and they are logged. The error
message is visible when a user attempts to create or update an Application via
the Argo CD API (and therefor the UI or CLI).
The user must have "applications, create" or "applications, update" RBAC access
to reach the code which may produce the error. The user is not guaranteed to be
able to trigger the error message. They may attempt to spam the API with
requests to trigger a rate limit error from the upstream repository.
If the user has "repositories, update" access, they may edit an existing
repository to introduce a URL typo or otherwise force an error message.
cves:
- CVE-2023-25163
ghsas:
- GHSA-mv6w-j4xc-qpfw
credits:
- James Callahan
references:
- advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-mv6w-j4xc-qpfw
- report: https://github.com/argoproj/argo-cd/issues/12309
- fix: https://github.com/argoproj/argo-cd/pull/12320
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2948.yaml
|
id: GO-2024-2948
modules:
- module: github.com/hashicorp/go-getter
versions:
- fixed: 1.7.5
vulnerable_at: 1.7.4
packages:
- package: github.com/hashicorp/go-getter
symbols:
- GitGetter.clone
- findRemoteDefaultBranch
derived_symbols:
- Client.ChecksumFromFile
- Client.Get
- FolderStorage.Get
- Get
- GetAny
- GetFile
- GitGetter.Get
- GitGetter.GetFile
- HttpGetter.Get
summary: Code Execution on Git update in github.com/hashicorp/go-getter
description: |-
A crafted request can execute Git update on an existing maliciously modified Git
Configuration. This can potentially lead to arbitrary code execution. When
performing a Git operation, the library will try to clone the given repository
to a specified destination. Cloning initializes a git config in the provided
destination. An attacker may alter the Git config after the cloning step to set
an arbitrary Git configuration to achieve code execution.
cves:
- CVE-2024-6257
ghsas:
- GHSA-xfhp-jf8p-mh5w
references:
- advisory: https://github.com/advisories/GHSA-xfhp-jf8p-mh5w
- fix: https://github.com/hashicorp/go-getter/commit/268c11cae8cf0d9374783e06572679796abe9ce9
- web: https://discuss.hashicorp.com/t/hcsec-2024-13-hashicorp-go-getter-vulnerable-to-code-execution-on-git-update-via-git-config-manipulation/68081
source:
id: GHSA-xfhp-jf8p-mh5w
created: 2024-06-26T13:09:53.132489-07:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2921.yaml
|
id: GO-2024-2921
modules:
- module: github.com/hashicorp/vault
versions:
- introduced: 0.11.0
- fixed: 1.16.3
- introduced: 1.17.0-rc1
- fixed: 1.17.0
non_go_versions:
- fixed: 1.15.9
vulnerable_at: 1.17.0-rc1
summary: |-
HashiCorp Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims in
github.com/hashicorp/vault
cves:
- CVE-2024-5798
ghsas:
- GHSA-32cj-5wx4-gq8p
unknown_aliases:
- BIT-vault-2024-5798
references:
- advisory: https://github.com/advisories/GHSA-32cj-5wx4-gq8p
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-5798
- web: https://discuss.hashicorp.com/t/hcsec-2024-11-vault-incorrectly-validated-json-web-tokens-jwt-audience-claims/67770
notes:
- manually removed 'introduced: 1.16.0-rc1' to fix overlapping versions
source:
id: GHSA-32cj-5wx4-gq8p
created: 2024-07-01T13:30:14.94375-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2723.yaml
|
id: GO-2024-2723
modules:
- module: github.com/apache/solr-operator
versions:
- introduced: 0.3.0
- fixed: 0.8.1
vulnerable_at: 0.8.0
summary: |-
Apache Solr Operator liveness and readiness probes may leak basic auth
credentials in github.com/apache/solr-operator
cves:
- CVE-2024-31391
ghsas:
- GHSA-g9qx-25vj-rf53
references:
- advisory: https://github.com/advisories/GHSA-g9qx-25vj-rf53
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31391
- web: http://www.openwall.com/lists/oss-security/2024/04/12/7
- web: https://lists.apache.org/thread/w7011s78lzywzwyszvy4d8zm99ybt8c7
source:
id: GHSA-g9qx-25vj-rf53
created: 2024-05-17T16:13:13.550401-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2536.yaml
|
id: GO-2024-2536
modules:
- module: github.com/rancher/norman
versions:
- fixed: 0.0.0-20240207153100-3bb70b772b52
vulnerable_at: 0.0.0-20240131191507-a182097c0229
packages:
- package: github.com/rancher/norman/urlbuilder
symbols:
- GetHost
- ParseRequestURL
derived_symbols:
- New
- package: github.com/rancher/norman/api/writer
symbols:
- HTMLResponseWriter.Write
summary: Cross-site scripting in public API in github.com/rancher/norman
cves:
- CVE-2023-32193
ghsas:
- GHSA-r8f4-hv23-6qp6
credits:
- diego95root
- kujalamathias
references:
- advisory: https://github.com/rancher/norman/security/advisories/GHSA-r8f4-hv23-6qp6
- fix: https://github.com/rancher/norman/commit/3bb70b772b52297feac64f5fdeb1b13c06c37e39
- fix: https://github.com/rancher/norman/commit/7b2b467995e6dfab6d4a5dee8dffc15033ae8269
- fix: https://github.com/rancher/norman/commit/a6a6cf5696088c32002953d36b75bdcc84f2399e
- fix: https://github.com/rancher/norman/commit/bd13c653293b9b5e0b37e8a6ccd1c3277f4623ed
- fix: https://github.com/rancher/norman/commit/cb54924f25c7666511a913cd41834299ef22dba4
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0417.yaml
|
id: GO-2022-0417
modules:
- module: github.com/containers/buildah
versions:
- fixed: 1.25.0
vulnerable_at: 1.24.0
packages:
- package: github.com/containers/buildah
symbols:
- setupCapAdd
- setupCapDrop
derived_symbols:
- Builder.Run
- package: github.com/containers/buildah/chroot
symbols:
- setCapabilities
summary: Incorrect default permissions in github.com/containers/buildah
description: |-
Containers are created with non-empty inheritable Linux process capabilities,
permitting programs with inheritable file capabilities to elevate those
capabilities to the permitted set during execve(2).
This bug does not affect the container security sandbox, as the inheritable set
never contains more capabilities than are included in the container's bounding
set.
published: 2022-07-01T20:08:10Z
cves:
- CVE-2022-27651
ghsas:
- GHSA-c3g4-w6cv-6v7h
references:
- fix: https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b
- web: https://bugzilla.redhat.com/show_bug.cgi?id=2066840
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2796.yaml
|
id: GO-2024-2796
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 8.1.0+incompatible
- fixed: 8.1.12+incompatible
- introduced: 9.5.0+incompatible
- fixed: 9.5.3+incompatible
- introduced: 9.6.0-rc1+incompatible
- fixed: 9.6.1+incompatible
vulnerable_at: 9.6.1-rc3+incompatible
summary: Mattermost fails to limit the size of a request path in github.com/mattermost/mattermost-server
cves:
- CVE-2024-22091
ghsas:
- GHSA-p2wq-4ggp-45f3
references:
- advisory: https://github.com/advisories/GHSA-p2wq-4ggp-45f3
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-22091
- web: https://github.com/mattermost/mattermost/commit/13049d8b16b195f98246dff4812b5f64c1e5a627
- web: https://github.com/mattermost/mattermost/commit/49e7c477246e31c7a0bd85c1043599121755b260
- web: https://github.com/mattermost/mattermost/commit/54478f2ccbc6c4f110706966adfe0db2c16a566c
- web: https://github.com/mattermost/mattermost/commit/f6d320017549ec66efb5fdd4bc10b66ab36abb70
- web: https://mattermost.com/security-updates
source:
id: GHSA-p2wq-4ggp-45f3
created: 2024-06-04T15:27:02.38708-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0212.yaml
|
id: GO-2022-0212
modules:
- module: std
versions:
- fixed: 1.12.10
- introduced: 1.13.0-0
- fixed: 1.13.1
vulnerable_at: 1.13.0
packages:
- package: net/textproto
symbols:
- Reader.ReadMimeHeader
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Request smuggling due to accepting invalid headers in net/http via net/textproto
description: |-
net/http (through net/textproto) used to accept and normalize invalid HTTP/1.1
headers with a space before the colon, in violation of RFC 7230.
If a Go server is used behind an uncommon reverse proxy that accepts and
forwards but doesn't normalize such invalid headers, the reverse proxy and the
server can interpret the headers differently. This can lead to filter bypasses
or request smuggling, the latter if requests from separate clients are
multiplexed onto the same upstream connection by the proxy. Such invalid headers
are now rejected by Go servers, and passed without normalization to Go client
applications.
published: 2022-05-23T22:46:20Z
cves:
- CVE-2019-16276
credits:
- Andrew Stucki (99designs.com)
- Adam Scarr (99designs.com)
- Jan Masarik (masarik.sh)
references:
- fix: https://go.dev/cl/197503
- fix: https://go.googlesource.com/go/+/41b1f88efab9d263408448bf139659119002ea50
- report: https://go.dev/issue/34540
- web: https://groups.google.com/g/golang-announce/c/cszieYyuL9Q/m/g4Z7pKaqAgAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0065.yaml
|
id: GO-2021-0065
modules:
- module: k8s.io/client-go
versions:
- fixed: 0.17.0
vulnerable_at: 0.16.16-rc.0
packages:
- package: k8s.io/client-go/transport
symbols:
- debuggingRoundTripper.RoundTrip
derived_symbols:
- basicAuthRoundTripper.RoundTrip
- bearerAuthRoundTripper.RoundTrip
- impersonatingRoundTripper.RoundTrip
- userAgentRoundTripper.RoundTrip
summary: Unauthorized credential disclosure in k8s.io/kubernetes and k8s.io/client-go
description: |-
Authorization tokens may be inappropriately logged if the verbosity level is set
to a debug level.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2019-11250
ghsas:
- GHSA-jmrx-5g74-6v2f
references:
- fix: https://github.com/kubernetes/kubernetes/pull/81330
- fix: https://github.com/kubernetes/kubernetes/commit/4441f1d9c3e94d9a3d93b4f184a591cab02a5245
- web: https://github.com/kubernetes/kubernetes/issues/81114
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0003.yaml
|
id: GO-2020-0003
modules:
- module: github.com/revel/revel
versions:
- fixed: 1.0.0
vulnerable_at: 0.21.0
packages:
- package: github.com/revel/revel
summary: Resource exhaustion in github.com/revel/revel
description: |-
An attacker can cause an application that accepts slice parameters
(https://revel.github.io/manual/parameters.html#slices) to allocate large
amounts of memory and crash through manipulating the request query sent to the
application.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-hggr-p7v6-73p5
credits:
- '@SYM01'
references:
- fix: https://github.com/revel/revel/pull/1427
- fix: https://github.com/revel/revel/commit/d160ecb72207824005b19778594cbdc272e8a605
- web: https://github.com/revel/revel/issues/1424
cve_metadata:
id: CVE-2020-36568
cwe: 'CWE-400: Uncontrolled Resource Consumption'
description: |-
Unsanitized input in the query parser in github.com/revel/revel before v1.0.0
allows remote attackers to cause resource exhaustion via memory allocation.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0041.yaml
|
id: GO-2020-0041
modules:
- module: github.com/unknwon/cae
versions:
- fixed: 1.0.1
vulnerable_at: 1.0.0
packages:
- package: github.com/unknwon/cae/tz
symbols:
- TzArchive.syncFiles
- TzArchive.ExtractToFunc
derived_symbols:
- Create
- ExtractTo
- Open
- OpenFile
- TzArchive.Close
- TzArchive.ExtractTo
- TzArchive.Flush
- TzArchive.Open
- package: github.com/unknwon/cae/zip
symbols:
- ZipArchive.Open
- ZipArchive.ExtractToFunc
derived_symbols:
- Create
- ExtractTo
- ExtractToFunc
- Open
- OpenFile
- ZipArchive.Close
- ZipArchive.ExtractTo
- ZipArchive.Flush
summary: Path Traversal in github.com/unknwon/cae
description: |-
Due to improper path sanitization, archives containing relative file paths can
cause files to be written (or overwritten) outside of the target directory.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-7668
ghsas:
- GHSA-88jf-7rch-32qc
references:
- fix: https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11
- web: https://snyk.io/research/zip-slip-vulnerability
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2715.yaml
|
id: GO-2024-2715
modules:
- module: github.com/evmos/evmos
vulnerable_at: 1.1.3
- module: github.com/evmos/evmos/v2
vulnerable_at: 2.0.2
- module: github.com/evmos/evmos/v3
vulnerable_at: 3.0.3
- module: github.com/evmos/evmos/v4
vulnerable_at: 4.0.2
- module: github.com/evmos/evmos/v5
unsupported_versions:
- last_affected: 5.0.0
vulnerable_at: 5.0.1
- module: github.com/evmos/evmos/v6
unsupported_versions:
- last_affected: 6.0.4
vulnerable_at: 6.0.4
- module: github.com/evmos/evmos/v7
unsupported_versions:
- last_affected: 7.0.0
vulnerable_at: 7.0.0
- module: github.com/evmos/evmos/v8
vulnerable_at: 8.2.3
- module: github.com/evmos/evmos/v9
vulnerable_at: 9.1.0
- module: github.com/evmos/evmos/v10
vulnerable_at: 10.0.1
- module: github.com/evmos/evmos/v11
vulnerable_at: 11.0.2
- module: github.com/evmos/evmos/v12
vulnerable_at: 12.1.6
- module: github.com/evmos/evmos/v13
vulnerable_at: 13.0.2
- module: github.com/evmos/evmos/v14
vulnerable_at: 14.1.0
- module: github.com/evmos/evmos/v15
vulnerable_at: 15.0.0
- module: github.com/evmos/evmos/v16
vulnerable_at: 16.0.4
- module: github.com/evmos/evmos/v17
versions:
- fixed: 17.0.0
- module: github.com/tharsis/evmos
unsupported_versions:
- last_affected: 1.1.3
vulnerable_at: 1.1.3
- module: github.com/tharsis/evmos/v2
unsupported_versions:
- last_affected: 2.0.2
vulnerable_at: 2.0.2
- module: github.com/tharsis/evmos/v3
unsupported_versions:
- last_affected: 3.0.3
vulnerable_at: 3.0.3
- module: github.com/tharsis/evmos/v4
unsupported_versions:
- last_affected: 4.0.2
vulnerable_at: 4.0.2
- module: github.com/tharsis/evmos/v5
unsupported_versions:
- last_affected: 5.0.1
vulnerable_at: 5.0.1
summary: |-
Evmos transaction execution not accounting for all state transition after
interaction with precompiles in github.com/evmos/evmos
cves:
- CVE-2024-32644
ghsas:
- GHSA-3fp5-2xwh-fxm6
references:
- advisory: https://github.com/evmos/evmos/security/advisories/GHSA-3fp5-2xwh-fxm6
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32644
- fix: https://github.com/evmos/evmos/commit/08982b5ee726b97bc50eaf58d1914829648b6a5f
- web: https://github.com/evmos/evmos/blob/b196a522ba4951890b40992e9f97aa610f8b5f9c/x/evm/statedb/state_object.go#L53-L68
- web: https://github.com/evmos/evmos/blob/b196a522ba4951890b40992e9f97aa610f8b5f9c/x/evm/statedb/statedb.go#L33-L55
- web: https://github.com/evmos/evmos/blob/b196a522ba4951890b40992e9f97aa610f8b5f9c/x/evm/statedb/statedb.go#L460-L465
notes:
- fix: 'github.com/evmos/evmos/v17: could not add vulnerable_at: could not find tagged version between introduced and fixed'
source:
id: GHSA-3fp5-2xwh-fxm6
created: 2024-06-26T14:00:32.611718-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2888.yaml
|
id: GO-2024-2888
modules:
- module: std
versions:
- fixed: 1.21.11
- introduced: 1.22.0-0
- fixed: 1.22.4
vulnerable_at: 1.22.3
packages:
- package: archive/zip
symbols:
- findSignatureInBlock
derived_symbols:
- NewReader
- OpenReader
summary: Mishandling of corrupt central directory record in archive/zip
description: |-
The archive/zip package's handling of certain types of invalid zip files differs
from the behavior of most zip implementations. This misalignment could be
exploited to create an zip file with contents that vary depending on the
implementation reading the file. The archive/zip package now rejects files
containing these errors.
credits:
- Yufan You (@ouuan)
references:
- fix: https://go.dev/cl/585397
- report: https://go.dev/issue/66869
- web: https://groups.google.com/g/golang-announce/c/XbxouI9gY7k/m/TuoGEhxIEwAJ
cve_metadata:
id: CVE-2024-24789
cwe: 'CWE-390: Detection of Error Condition Without Action'
references:
- http://www.openwall.com/lists/oss-security/2024/06/04/1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5YAEIA6IUHUNGJ7AIXXPQT6D2GYENX7/
source:
id: go-security-team
created: 2024-06-04T17:58:11.150789-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2842.yaml
|
id: GO-2024-2842
modules:
- module: github.com/containers/image/v5
versions:
- fixed: 5.30.1
vulnerable_at: 5.30.0
packages:
- package: github.com/containers/image/v5/copy
symbols:
- copier.createProgressBar
- imageCopier.copyConfig
- imageCopier.copyLayer
derived_symbols:
- Image
- package: github.com/containers/image/v5/directory
symbols:
- dirImageDestination.PutBlobWithOptions
- dirImageDestination.TryReusingBlobWithOptions
- dirImageDestination.PutManifest
- dirImageDestination.PutSignaturesWithFormat
- dirImageSource.GetManifest
- dirImageSource.GetBlob
- dirImageSource.GetSignaturesWithFormat
derived_symbols:
- dirReference.NewImage
- package: github.com/containers/image/v5/docker
symbols:
- dockerClient.fetchManifest
- dockerClient.getBlob
- dockerClient.getSigstoreAttachmentManifest
- dockerClient.getExtensionsSignatures
- sigstoreAttachmentTag
- GetRepositoryTags
- dockerImageDestination.blobExists
- dockerImageDestination.PutManifest
- dockerImageDestination.putSignaturesToLookaside
- dockerImageDestination.putSignaturesToSigstoreAttachments
- dockerImageSource.GetManifest
- dockerImageSource.GetBlobAt
- dockerImageSource.getSignaturesFromLookaside
- deleteImage
- lookasideStorageURL
derived_symbols:
- Image.GetRepositoryTags
- dockerImageDestination.PutBlobWithOptions
- dockerImageDestination.PutSignaturesWithFormat
- dockerImageDestination.TryReusingBlobWithOptions
- dockerImageSource.GetBlob
- dockerImageSource.GetSignaturesWithFormat
- dockerReference.DeleteImage
- dockerReference.NewImage
- dockerReference.NewImageSource
- package: github.com/containers/image/v5/docker/internal/tarfile
symbols:
- Destination.PutBlobWithOptions
- Writer.ensureSingleLegacyLayerLocked
- Writer.writeLegacyMetadataLocked
- Writer.ensureManifestItemLocked
- Writer.configPath
- Writer.physicalLayerPath
derived_symbols:
- Destination.PutManifest
- package: github.com/containers/image/v5/openshift
symbols:
- openshiftImageSource.GetSignaturesWithFormat
derived_symbols:
- openshiftImageDestination.PutBlobWithOptions
- openshiftImageDestination.PutManifest
- openshiftImageDestination.TryReusingBlobWithOptions
- openshiftImageSource.GetBlob
- openshiftImageSource.GetManifest
- openshiftReference.NewImage
- package: github.com/containers/image/v5/ostree
symbols:
- ostreeImageDestination.TryReusingBlobWithOptions
- ostreeImageDestination.Commit
- ostreeImageSource.GetBlob
skip_fix: contains build constraints
- package: github.com/containers/image/v5/pkg/blobcache
symbols:
- BlobCache.blobPath
- BlobCache.findBlob
- blobCacheDestination.saveStream
derived_symbols:
- BlobCache.HasBlob
- BlobCache.NewImage
- blobCacheDestination.PutBlobWithOptions
- blobCacheDestination.PutManifest
- blobCacheDestination.TryReusingBlobWithOptions
- blobCacheSource.GetBlob
- blobCacheSource.GetBlobAt
- blobCacheSource.GetManifest
- blobCacheSource.LayerInfosForCopy
- package: github.com/containers/image/v5/storage
symbols:
- storageImageDestination.tryReusingBlobAsPending
- manifestBigDataKey
- signatureBigDataKey
derived_symbols:
- ResolveReference
- storageImageDestination.Commit
- storageImageDestination.PutBlobWithOptions
- storageImageDestination.TryReusingBlobWithOptions
- storageImageSource.GetManifest
- storageImageSource.GetSignaturesWithFormat
- storageImageSource.LayerInfosForCopy
- storageReference.DeleteImage
- storageReference.NewImage
- storageReference.NewImageSource
- storageTransport.GetImage
- storageTransport.GetStoreImage
summary: Unexpected authenticated registry accesses in github.com/containers/image/v5
description: |-
An attacker may trigger unexpected authenticated registry accesses on behalf of
a victim user, causing resource exhaustion, local path traversal, and other
attacks.
cves:
- CVE-2024-3727
ghsas:
- GHSA-6wvf-f2vw-3425
references:
- advisory: https://github.com/advisories/GHSA-6wvf-f2vw-3425
- fix: https://github.com/containers/image/commit/132678b47bae29c710589012668cb85859d88385
- web: https://access.redhat.com/security/cve/CVE-2024-3727
- web: https://bugzilla.redhat.com/show_bug.cgi?id=2274767
- web: https://github.com/containers/image/releases/tag/v5.30.1
source:
id: GHSA-6wvf-f2vw-3425
created: 2024-05-17T14:13:29.295109-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0356.yaml
|
id: GO-2021-0356
modules:
- module: golang.org/x/crypto
versions:
- fixed: 0.0.0-20220314234659-1baeb1ce4c0b
vulnerable_at: 0.0.0-20220314234646-fcc990c556fe
packages:
- package: golang.org/x/crypto/ssh
symbols:
- ServerConfig.AddHostKey
summary: Denial of service via crafted Signer in golang.org/x/crypto/ssh
description: |-
Attackers can cause a crash in SSH servers when the server has been configured
by passing a Signer to ServerConfig.AddHostKey such that
1) the Signer passed to AddHostKey does not implement AlgorithmSigner, and
2) the Signer passed to AddHostKey returns a key of type “ssh-rsa” from its
PublicKey method.
Servers that only use Signer implementations provided by the ssh package are
unaffected.
published: 2022-04-25T20:38:40Z
cves:
- CVE-2022-27191
ghsas:
- GHSA-8c26-wmh5-6g9v
references:
- fix: https://go.dev/cl/392355
- fix: https://go.googlesource.com/crypto/+/1baeb1ce4c0b006eff0f294c47cb7617598dfb3d
- web: https://groups.google.com/g/golang-announce
- web: https://groups.google.com/g/golang-announce/c/-cp44ypCT5s
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2766.yaml
|
id: GO-2024-2766
modules:
- module: github.com/containers/libpod
vulnerable_at: 1.9.3
- module: github.com/containers/libpod/v2
versions:
- fixed: 2.0.5
vulnerable_at: 2.0.4
summary: Information disclosure in podman in github.com/containers/libpod
cves:
- CVE-2020-14370
ghsas:
- GHSA-c3wv-qmjj-45r6
references:
- advisory: https://github.com/advisories/GHSA-c3wv-qmjj-45r6
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-14370
- web: https://bugzilla.redhat.com/show_bug.cgi?id=1874268
- web: https://github.com/containers/podman/commit/a7e864e6e7de894d4edde4fff00e53dc6a0b5074
- web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G6BPCZX4ASKNONL3MSCK564IVXNYSKLP
- web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y74V7HGQBNLT6XECCSNZNFZIB7G7XSAR
- web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4Y2FSGQWP4AFT5AZ6UBN6RKHVXUBRFV
source:
id: GHSA-c3wv-qmjj-45r6
created: 2024-06-26T14:03:17.391801-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2731.yaml
|
id: GO-2024-2731
modules:
- module: github.com/evmos/evmos
vulnerable_at: 1.1.3
- module: github.com/evmos/evmos/v2
vulnerable_at: 2.0.2
- module: github.com/evmos/evmos/v3
vulnerable_at: 3.0.3
- module: github.com/evmos/evmos/v4
vulnerable_at: 4.0.2
- module: github.com/evmos/evmos/v5
vulnerable_at: 5.0.1
- module: github.com/evmos/evmos/v6
vulnerable_at: 6.0.4
- module: github.com/evmos/evmos/v7
vulnerable_at: 7.0.0
- module: github.com/evmos/evmos/v8
vulnerable_at: 8.2.3
- module: github.com/evmos/evmos/v9
vulnerable_at: 9.1.0
- module: github.com/evmos/evmos/v10
vulnerable_at: 10.0.1
- module: github.com/evmos/evmos/v11
vulnerable_at: 11.0.2
- module: github.com/evmos/evmos/v12
vulnerable_at: 12.1.6
- module: github.com/evmos/evmos/v13
unsupported_versions:
- last_affected: 13.0.2
vulnerable_at: 13.0.2
summary: Evmos vulnerable to unauthorized account creation with vesting module in github.com/evmos/evmos
ghsas:
- GHSA-m99c-q26r-m7m7
references:
- advisory: https://github.com/evmos/evmos/security/advisories/GHSA-m99c-q26r-m7m7
source:
id: GHSA-m99c-q26r-m7m7
created: 2024-06-26T14:01:10.717273-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2537.yaml
|
id: GO-2024-2537
modules:
- module: github.com/rancher/rancher
non_go_versions:
- introduced: 2.6.0
- fixed: 2.6.14
- introduced: 2.7.0
- fixed: 2.7.10
- introduced: 2.8.0
- fixed: 2.8.2
vulnerable_at: 1.6.30
summary: Rancher 'Audit Log' leaks sensitive information in github.com/rancher/rancher
cves:
- CVE-2023-22649
ghsas:
- GHSA-xfj7-qf8w-2gcr
references:
- advisory: https://github.com/rancher/rancher/security/advisories/GHSA-xfj7-qf8w-2gcr
source:
id: GHSA-xfj7-qf8w-2gcr
created: 2024-06-14T11:40:59.93657-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1114.yaml
|
id: GO-2022-1114
modules:
- module: github.com/duke-git/lancet
versions:
- fixed: 1.3.4
vulnerable_at: 1.3.3
packages:
- package: github.com/duke-git/lancet/fileutil
symbols:
- UnZip
- module: github.com/duke-git/lancet/v2
versions:
- introduced: 2.0.0
- fixed: 2.1.10
vulnerable_at: 2.1.9
packages:
- package: github.com/duke-git/lancet/v2/fileutil
symbols:
- UnZip
summary: ZipSlip when unzipping files in github.com/duke-git/lancet
description: A ZipSlip vulnerability exists when using the fileutil package to unzip files.
cves:
- CVE-2022-41920
ghsas:
- GHSA-pp3f-xrw5-q5j4
references:
- report: https://github.com/duke-git/lancet/issues/62
- fix: https://github.com/duke-git/lancet/commit/f133b32faa05eb93e66175d01827afa4b7094572
- fix: https://github.com/duke-git/lancet/commit/f869a0a67098e92d24ddd913e188b32404fa72c9
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0085.yaml
|
id: GO-2021-0085
modules:
- module: github.com/opencontainers/runc
versions:
- fixed: 1.0.0-rc8.0.20190930145003-cad42f6e0932
vulnerable_at: 1.0.0-rc8
packages:
- package: github.com/opencontainers/runc/libcontainer/apparmor
symbols:
- ApplyProfile
- package: github.com/opencontainers/runc/libcontainer/utils
symbols:
- CloseExecFrom
- module: github.com/opencontainers/selinux
versions:
- fixed: 1.3.1-0.20190929122143-5215b1806f52
vulnerable_at: 1.3.0
packages:
- package: github.com/opencontainers/selinux/go-selinux
symbols:
- readCon
- writeCon
skip_fix: 'TODO: revisit this reason (readCon and writeCon: func not found)'
summary: Authorization bypass in github.com/opencontainers/runc
description: |-
AppArmor restrictions may be bypassed due to improper validation of mount
targets, allowing a malicious image to mount volumes over e.g. /proc.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2019-16884
ghsas:
- GHSA-fgv8-vj5c-2ppq
credits:
- Leopold Schabel
references:
- fix: https://github.com/opencontainers/runc/pull/2130
- fix: https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4
- fix: https://github.com/opencontainers/selinux/commit/03b517dc4fd57245b1cf506e8ba7b817b6d309da
- web: https://github.com/opencontainers/runc/issues/2128
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2385.yaml
|
id: GO-2023-2385
modules:
- module: github.com/pubnub/go
vulnerable_at: 4.10.0+incompatible
packages:
- package: github.com/pubnub/go/utils
symbols:
- EncryptString
- DecryptString
- EncryptFile
- DecryptFile
- generateIV
- unpadPKCS7
- padWithPKCS7
- EncryptCipherKey
- aesCipher
derived_symbols:
- SerializeAndEncrypt
- SerializeEncryptAndSerialize
excluded_symbols:
- TestComplexClassDecryption
- TestComplexClassEncryption
- module: github.com/pubnub/go/v5
vulnerable_at: 5.0.3
packages:
- package: github.com/pubnub/go/v5/utils
symbols:
- EncryptString
- DecryptString
- EncryptFile
- DecryptFile
- generateIV
- unpadPKCS7
- padWithPKCS7
- EncryptCipherKey
- aesCipher
derived_symbols:
- SerializeAndEncrypt
- SerializeEncryptAndSerialize
excluded_symbols:
- TestComplexClassDecryption
- TestComplexClassEncryption
- module: github.com/pubnub/go/v6
vulnerable_at: 6.1.0
packages:
- package: github.com/pubnub/go/v6/utils
symbols:
- EncryptString
- DecryptString
- EncryptFile
- DecryptFile
- generateIV
- unpadPKCS7
- padWithPKCS7
- EncryptCipherKey
- aesCipher
derived_symbols:
- SerializeAndEncrypt
- SerializeEncryptAndSerialize
excluded_symbols:
- TestComplexClassDecryption
- TestComplexClassEncryption
- module: github.com/pubnub/go/v7
vulnerable_at: 7.1.2
packages:
- package: github.com/pubnub/go/v7/utils
symbols:
- EncryptString
- DecryptString
- EncryptFile
- DecryptFile
- generateIV
- unpadPKCS7
- padWithPKCS7
- EncryptCipherKey
- aesCipher
derived_symbols:
- SerializeAndEncrypt
- SerializeEncryptAndSerialize
excluded_symbols:
- TestComplexClassDecryption
- TestComplexClassEncryption
- module: github.com/pubnub/go/v7
versions:
- introduced: 7.2.0
vulnerable_at: 7.2.0
packages:
- package: github.com/pubnub/go/v7/crypto
symbols:
- NewLegacyCryptor
- legacyCryptor.Encrypt
- legacyCryptor.Decrypt
- legacyCryptor.EncryptStream
- legacyCryptor.DecryptStream
- EncryptCipherKey
- legacyAesCipher
derived_symbols:
- NewAesCbcCryptoModule
- NewLegacyCryptoModule
- defaultExtendedCryptor.DecryptStream
- defaultExtendedCryptor.EncryptStream
- module.Decrypt
- module.DecryptStream
- module.Encrypt
- module.EncryptStream
summary: Insufficient entropy in AES-256-CBC in github.com/pubnub/go
description: |-
There is insufficient entropy in the implementation of the AES-256-CBC
cryptographic algorithm. The provided encrypt functions are less secure when hex
encoding and trimming are applied, leaving half of the bits in the key always
the same for every encoded message or file.
Users are encouraged to migrate to the new crypto package introduced in v7.2.0.
cves:
- CVE-2023-26154
ghsas:
- GHSA-5844-q3fc-56rh
references:
- advisory: https://github.com/advisories/GHSA-5844-q3fc-56rh
- fix: https://github.com/pubnub/go/commit/428517fef5b901db7275d9f5a75eda89a4c28e08
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0434.yaml
|
id: GO-2022-0434
modules:
- module: std
versions:
- introduced: 1.18.0-0
- fixed: 1.18.1
vulnerable_at: 1.18.0
packages:
- package: crypto/x509
goos:
- darwin
symbols:
- Certificate.Verify
summary: Panic during certificate parsing on Darwin in crypto/x509
description: |-
Verifying certificate chains containing certificates which are not compliant
with RFC 5280 causes Certificate.Verify to panic on macOS.
These chains can be delivered through TLS and can cause a crypto/tls or net/http
client to crash.
published: 2022-05-23T21:59:00Z
cves:
- CVE-2022-27536
credits:
- Tailscale
references:
- fix: https://go.dev/cl/393655
- fix: https://go.googlesource.com/go/+/0fca8a8f25cf4636fd980e72ba0bded4230922de
- report: https://go.dev/issue/51759
- web: https://groups.google.com/g/golang-announce/c/oecdBNLOml8
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2468.yaml
|
id: GO-2024-2468
modules:
- module: github.com/snapcore/snapd
non_go_versions:
- fixed: 2.57.6
vulnerable_at: 0.0.0-20240604014309-05c117cc187f
summary: snapd Race Condition vulnerability in github.com/snapcore/snapd
cves:
- CVE-2022-3328
ghsas:
- GHSA-cjqf-877p-7m3f
references:
- advisory: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3328
- advisory: https://github.com/advisories/GHSA-cjqf-877p-7m3f
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-3328
- fix: https://github.com/snapcore/snapd/commit/21ebc51f00b8a1417888faa2e83a372fd29d0f5e
- fix: https://github.com/snapcore/snapd/commit/6226cdc57052f4b7057d92f2e549aa169e35cd2d
- fix: https://github.com/snapcore/snapd/pull/12380
- web: https://ubuntu.com/security/notices/USN-5753-1
source:
id: GHSA-cjqf-877p-7m3f
created: 2024-06-04T15:37:54.887928-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2579.yaml
|
id: GO-2024-2579
modules:
- module: github.com/apache/incubator-answer
versions:
- fixed: 1.2.5
vulnerable_at: 1.2.5-RC2
summary: Apache Answer Unrestricted Upload of File with Dangerous Type vulnerability in github.com/apache/incubator-answer
cves:
- CVE-2024-22393
ghsas:
- GHSA-rmqp-mvv2-54c6
references:
- advisory: https://github.com/advisories/GHSA-rmqp-mvv2-54c6
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-22393
- web: http://www.openwall.com/lists/oss-security/2024/02/22/1
- web: https://lists.apache.org/thread/f58l6dr4r74hl6o71gn47kmn44vw12cv
source:
id: GHSA-rmqp-mvv2-54c6
created: 2024-05-17T16:15:05.172081-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0492.yaml
|
id: GO-2022-0492
modules:
- module: github.com/argoproj/argo-events
versions:
- fixed: 1.7.1
vulnerable_at: 1.7.0
packages:
- package: github.com/argoproj/argo-events/sensors/artifacts
symbols:
- NewGitReader
derived_symbols:
- GetArtifactReader
summary: Path traversal in github.com/argoproj/argo-events
description: |-
GitArtifactReader is vulnerable to directory traversal attacks.
The GitArtifactReader.Read function reads and returns the contents of a Git
repository file. A maliciously crafted repository can exploit this to cause Read
to read from arbitrary files on the filesystem.
published: 2022-07-15T23:30:03Z
cves:
- CVE-2022-25856
ghsas:
- GHSA-qpgx-64h2-gc3c
credits:
- Derek Wang
references:
- fix: https://github.com/argoproj/argo-events/pull/1965
- web: https://github.com/argoproj/argo-events/issues/1947
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1515.yaml
|
id: GO-2023-1515
modules:
- module: github.com/rancher/wrangler
versions:
- fixed: 0.7.4-security1
- introduced: 0.8.0
- fixed: 0.8.5-security1
- introduced: 0.8.6
- fixed: 0.8.11
- introduced: 1.0.0
- fixed: 1.0.1
vulnerable_at: 1.0.0
packages:
- package: github.com/rancher/wrangler/pkg/git
symbols:
- Git.Clone
- Git.fetchAndReset
- Git.reset
- Git.gitCmd
derived_symbols:
- Git.Ensure
- Git.Head
- Git.LsRemote
- Git.Update
summary: Denial of service when processing Git credentials in github.com/rancher/wrangler
description: |-
A denial of service (DoS) vulnerability exists in the Wrangler Git package.
Specially crafted Git credentials can result in a denial of service (DoS) attack
on an application that uses Wrangler due to the exhaustion of the available
memory and CPU resources.
This is caused by a lack of input validation of Git credentials before they are
used, which may lead to a denial of service in some cases. This issue can be
triggered when accessing both private and public Git repositories.
A workaround is to sanitize input passed to the Git package to remove potential
unsafe and ambiguous characters. Otherwise, the best course of action is to
update to a patched Wrangler version.
cves:
- CVE-2022-43756
ghsas:
- GHSA-8fcj-gf77-47mg
references:
- fix: https://github.com/rancher/wrangler/commit/341018c8fef3e12867c7cb2649bd2cecac75f287
- advisory: https://github.com/advisories/GHSA-8fcj-gf77-47mg
- web: https://github.com/rancher/rancher/security/policy
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1709.yaml
|
id: GO-2023-1709
modules:
- module: github.com/hashicorp/vault
versions:
- fixed: 1.11.9
- introduced: 1.12.0
- fixed: 1.12.5
- introduced: 1.13.0
- fixed: 1.13.1
vulnerable_at: 1.13.0
packages:
- package: github.com/hashicorp/vault/shamir
symbols:
- div
- mult
derived_symbols:
- Combine
- Split
summary: Cache-timing attacks in Shamir's secret sharing in github.com/hashicorp/vault
description: |-
HashiCorp Vault's implementation of Shamir's secret sharing uses precomputed
table lookups, and is vulnerable to cache-timing attacks.
An attacker with access to, and the ability to observe a large number of unseal
operations on the host through a side channel may reduce the search space of a
brute force effort to recover the Shamir shares.
cves:
- CVE-2023-25000
ghsas:
- GHSA-vq4h-9ghm-qmrr
credits:
- Giuseppe Cocomazzi
references:
- fix: https://github.com/hashicorp/vault/pull/19495
- web: https://discuss.hashicorp.com/t/hcsec-2023-10-vault-vulnerable-to-cache-timing-attacks-during-seal-and-unseal-operations/52078
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2824.yaml
|
id: GO-2024-2824
modules:
- module: std
versions:
- introduced: 1.22.0-0
- fixed: 1.22.3
vulnerable_at: 1.22.2
packages:
- package: net
symbols:
- extractExtendedRCode
derived_symbols:
- Dial
- DialTimeout
- Dialer.Dial
- Dialer.DialContext
- Listen
- ListenConfig.Listen
- ListenConfig.ListenPacket
- ListenPacket
- LookupAddr
- LookupCNAME
- LookupHost
- LookupIP
- LookupMX
- LookupNS
- LookupSRV
- LookupTXT
- ResolveIPAddr
- ResolveTCPAddr
- ResolveUDPAddr
- Resolver.LookupAddr
- Resolver.LookupCNAME
- Resolver.LookupHost
- Resolver.LookupIP
- Resolver.LookupIPAddr
- Resolver.LookupMX
- Resolver.LookupNS
- Resolver.LookupNetIP
- Resolver.LookupSRV
- Resolver.LookupTXT
summary: Malformed DNS message can cause infinite loop in net
description: |-
A malformed DNS message in response to a query can cause the Lookup functions to
get stuck in an infinite loop.
credits:
- '@long-name-let-people-remember-you'
- Mateusz Poliwczak
references:
- report: https://go.dev/issue/66754
- fix: https://go.dev/cl/578375
- web: https://groups.google.com/g/golang-announce/c/wkkO4P9stm0
cve_metadata:
id: CVE-2024-24788
cwe: 'CWE 400: Uncontrolled Resource Consumption'
references:
- http://www.openwall.com/lists/oss-security/2024/05/08/3
- https://security.netapp.com/advisory/ntap-20240605-0002/
- https://security.netapp.com/advisory/ntap-20240614-0001/
source:
id: go-security-team
created: 2024-05-07T16:56:31.886878-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2380.yaml
|
id: GO-2023-2380
modules:
- module: github.com/ecies/go/v2
versions:
- fixed: 2.0.8
vulnerable_at: 2.0.7
packages:
- package: github.com/ecies/go/v2
symbols:
- PrivateKey.Encapsulate
- PrivateKey.ECDH
- PublicKey.Decapsulate
derived_symbols:
- Decrypt
- Encrypt
summary: Private key recovery via invalid curve point in github.com/ecies/go/v2
description: |-
An attacker may be able to recover private keys due to a bug in the ECDH
function.
The library does not check whether the provided public key is on the curve,
which means that an attacker can create a public key that is not on the curve
and use it to recover the private key.
A workaround is to manually check that the public key is valid by calling the
IsOnCurve function from the secp256k1 libraries.
cves:
- CVE-2023-49292
ghsas:
- GHSA-8j98-cjfr-qx3h
references:
- advisory: https://github.com/ecies/go/security/advisories/GHSA-8j98-cjfr-qx3h
- fix: https://github.com/ecies/go/commit/c6e775163866d6ea5233eb8ec8530a9122101ebd
- web: https://github.com/ashutosh1206/Crypton/blob/master/Diffie-Hellman-Key-Exchange/Attack-Invalid-Curve-Point/README.md
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2431.yaml
|
id: GO-2024-2431
modules:
- module: github.com/cubefs/cubefs
non_go_versions:
- fixed: 3.3.1
vulnerable_at: 2.5.2+incompatible
summary: Insecure random string generator used for sensitive data in github.com/cubefs/cubefs
cves:
- CVE-2023-46740
ghsas:
- GHSA-4248-p65p-hcrm
references:
- advisory: https://github.com/cubefs/cubefs/security/advisories/GHSA-4248-p65p-hcrm
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-46740
- fix: https://github.com/cubefs/cubefs/commit/8555c6402794cabdf2cc025c8bea1576122c07ba
source:
id: GHSA-4248-p65p-hcrm
created: 2024-06-14T11:34:36.394692-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1045.yaml
|
id: GO-2022-1045
modules:
- module: github.com/sylabs/sif/v2
versions:
- fixed: 2.8.1
vulnerable_at: 2.8.0
packages:
- package: github.com/sylabs/sif/v2/pkg/integrity
symbols:
- signAndEncodeJSON
- verifyAndDecode
- newDigest
- digest.MarshalJSON
derived_symbols:
- Signer.Sign
- Verifier.Verify
- digest.UnmarshalJSON
summary: Improper validation of signature hash algorithms in github.com/sylabs/sif/v2
description: |-
The Singularity Image Format (SIF) reference implementation does not verify that
the hash algorithm(s) used are cryptographically secure when verifying digital
signatures.
cves:
- CVE-2022-39237
ghsas:
- GHSA-m5m3-46gj-wch8
references:
- advisory: https://github.com/sylabs/sif/security/advisories/GHSA-m5m3-46gj-wch8
- fix: https://github.com/sylabs/sif/commit/07fb86029a12e3210f6131e065570124605daeaa
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2528.yaml
|
id: GO-2024-2528
modules:
- module: go.etcd.io/etcd
vulnerable_at: 2.3.8+incompatible
- module: go.etcd.io/etcd/v3
non_go_versions:
- fixed: 3.3.23
- introduced: 3.4.0-rc.0
- fixed: 3.4.10
vulnerable_at: 3.5.14
summary: Etcd Gateway TLS endpoint validation only confirms TCP reachability in go.etcd.io/etcd
ghsas:
- GHSA-j86v-2vjr-fg8f
references:
- advisory: https://github.com/etcd-io/etcd/security/advisories/GHSA-j86v-2vjr-fg8f
source:
id: GHSA-j86v-2vjr-fg8f
created: 2024-06-26T16:10:23.766937-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0247.yaml
|
id: GO-2022-0247
modules:
- module: cmd
versions:
- fixed: 1.16.9
- introduced: 1.17.0-0
- fixed: 1.17.2
vulnerable_at: 1.17.1
packages:
- package: cmd/link
goos:
- js
goarch:
- wasm
symbols:
- Link.address
skip_fix: fix does not work with Go <1.18
summary: Buffer overflow in WASM modules in misc/wasm and cmd/link
description: |-
When invoking functions from WASM modules, built using GOARCH=wasm GOOS=js,
passing very large arguments can cause portions of the module to be overwritten
with data from the arguments due to a buffer overflow error.
If using wasm_exec.js to execute WASM modules, users will need to replace their
copy (as described in https://golang.org/wiki/WebAssembly#getting-started) after
rebuilding any modules.
published: 2022-05-24T20:14:28Z
cves:
- CVE-2021-38297
credits:
- Ben Lubar
references:
- fix: https://go.dev/cl/354571
- fix: https://go.googlesource.com/go/+/77f2750f4398990eed972186706f160631d7dae4
- report: https://go.dev/issue/48797
- web: https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0051.yaml
|
id: GO-2021-0051
modules:
- module: github.com/labstack/echo/v4
versions:
- fixed: 4.1.18-0.20201215153152-4422e3b66b9f
vulnerable_at: 4.1.17
packages:
- package: github.com/labstack/echo/v4
goos:
- windows
symbols:
- common.static
derived_symbols:
- Echo.Static
- Group.Static
summary: Directory traversal on Windows in github.com/labstack/echo/v4
description: |-
Due to improper sanitization of user input on Windows, the static file handler
allows for directory traversal, allowing an attacker to read files outside of
the target directory that the server has permission to read.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-j453-hm5x-c46w
credits:
- '@little-cui (Apache ServiceComb)'
references:
- fix: https://github.com/labstack/echo/pull/1718
- fix: https://github.com/labstack/echo/commit/4422e3b66b9fd498ed1ae1d0242d660d0ed3faaa
cve_metadata:
id: CVE-2020-36565
cwe: 'CWE 22: Improper Limitation of a Pathname to a Restricted Directory (''Path Traversal'')'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0998.yaml
|
id: GO-2022-0998
modules:
- module: github.com/sigstore/cosign
versions:
- fixed: 1.12.0
vulnerable_at: 1.11.1
packages:
- package: github.com/sigstore/cosign/cmd/cosign/cli/verify
symbols:
- VerifyBlobCmd
- verifySigByUUID
- signatures
- verifyRekorEntry
- verifyRekorBundle
derived_symbols:
- VerifyAttestationCommand.Exec
- VerifyCommand.Exec
- package: github.com/sigstore/cosign/pkg/cosign
symbols:
- VerifySET
derived_symbols:
- TLogUpload
- TLogUploadInTotoAttestation
- VerifyBundle
- VerifyImageAttestations
- VerifyImageSignature
- VerifyImageSignatures
- VerifyLocalImageAttestations
- VerifyLocalImageSignatures
- VerifyTLogEntry
summary: Improper blob verification in github.com/sigstore/cosign
cves:
- CVE-2022-36056
ghsas:
- GHSA-8gw7-4j42-w388
references:
- advisory: https://github.com/sigstore/cosign/security/advisories/GHSA-8gw7-4j42-w388
- fix: https://github.com/sigstore/cosign/commit/80b79ed8b4d28ccbce3d279fd273606b5cddcc25
- web: https://github.com/sigstore/cosign/releases/tag/v1.12.0
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2748.yaml
|
id: GO-2024-2748
modules:
- module: k8s.io/apimachinery
versions:
- fixed: 0.16.13
- introduced: 0.17.0
- fixed: 0.17.9
- introduced: 0.18.0
- fixed: 0.18.7-rc.0
vulnerable_at: 0.18.6
packages:
- package: k8s.io/apimachinery/pkg/util/net
symbols:
- ConnectWithRedirects
- package: k8s.io/apimachinery/pkg/util/proxy
symbols:
- UpgradeAwareHandler.tryUpgrade
derived_symbols:
- UpgradeAwareHandler.ServeHTTP
- module: k8s.io/kubernetes
versions:
- fixed: 1.16.13
- introduced: 1.17.0
- fixed: 1.17.9
- introduced: 1.18.0
- fixed: 1.18.7
vulnerable_at: 0.18.6
summary: Privilege Escalation in Kubernetes in k8s.io/apimachinery
description: |-
The Kubernetes kube-apiserver is vulnerable to an unvalidated redirect on
proxied upgrade requests that could allow an attacker to escalate privileges
from a node compromise to a full cluster compromise.
cves:
- CVE-2020-8559
ghsas:
- GHSA-33c5-9fx5-fvjm
references:
- advisory: https://github.com/advisories/GHSA-33c5-9fx5-fvjm
- web: https://bugzilla.redhat.com/show_bug.cgi?id=1851422
- web: https://github.com/kubernetes/kubernetes/issues/92914
- web: https://github.com/kubernetes/kubernetes/pull/92941
- web: https://github.com/tdwyer/CVE-2020-8559
- web: https://groups.google.com/d/msg/kubernetes-security-announce/JAIGG5yNROs/19nHQ5wkBwAJ
- web: https://groups.google.com/g/kubernetes-security-announce/c/JAIGG5yNROs
- web: https://security.netapp.com/advisory/ntap-20200810-0004
source:
id: GHSA-33c5-9fx5-fvjm
created: 2024-05-17T15:54:30.22341-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0425.yaml
|
id: GO-2022-0425
modules:
- module: github.com/flynn/noise
versions:
- fixed: 1.0.0
vulnerable_at: 0.0.0-20210422170017-fc2bb37e287b
packages:
- package: github.com/flynn/noise
symbols:
- CipherState.Encrypt
- CipherState.Decrypt
- symmetricState.EncryptAndHash
derived_symbols:
- HandshakeState.ReadMessage
- HandshakeState.WriteMessage
- symmetricState.DecryptAndHash
summary: Weak encryption and denial of service in github.com/flynn/noise
description: |-
The Noise protocol implementation suffers from weakened cryptographic security
after encrypting 2^64 messages, and a potential denial of service attack.
After 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function,
the nonce counter will wrap around, causing multiple messages to be encrypted
with the same key and nonce.
In a separate issue, the Decrypt function increments the nonce state even when
it fails to decrypt a message. If an attacker can provide an invalid input to
the Decrypt function, this will cause the nonce state to desynchronize between
the peers, resulting in a failure to encrypt all subsequent messages.
published: 2022-02-15T01:57:18Z
ghsas:
- GHSA-6cr6-fmvc-vw2p
- GHSA-g9mp-8g3h-3c5c
references:
- fix: https://github.com/flynn/noise/pull/44
cve_metadata:
id: CVE-2021-4239
cwe: 'CWE 400: Uncontrolled Resource Consumption'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0059.yaml
|
id: GO-2021-0059
modules:
- module: github.com/tidwall/gjson
versions:
- fixed: 1.6.4
vulnerable_at: 1.6.3
packages:
- package: github.com/tidwall/gjson
symbols:
- squash
derived_symbols:
- Get
- GetBytes
- GetMany
- GetManyBytes
- Result.Array
- Result.Get
- Result.Map
- Result.Value
summary: Panic due to improper input validation in Get in github.com/tidwall/gjson
description: |-
Due to improper bounds checking, maliciously crafted JSON objects can cause an
out-of-bounds panic. If parsing user input, this may be used as a denial of
service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-35380
ghsas:
- GHSA-w942-gw6m-p62c
credits:
- '@toptotu'
references:
- fix: https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc
- web: https://github.com/tidwall/gjson/issues/192
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2831.yaml
|
id: GO-2024-2831
modules:
- module: github.com/spacemeshos/api/release/go
versions:
- fixed: 1.37.1
vulnerable_at: 1.37.0
packages:
- package: github.com/spacemeshos/api/release/go/spacemesh/v1
- module: github.com/spacemeshos/go-spacemesh
versions:
- fixed: 1.5.2-hotfix1
vulnerable_at: 1.5.1
packages:
- package: github.com/spacemeshos/go-spacemesh/activation
symbols:
- Handler.HandleGossipAtx
- Handler.storeAtx
- Handler.SyntacticallyValidateDeps
- Handler.processATX
skip_fix: 'Nonstandard cgo library: github.com/spacemeshos/post@v0.12.6/internal/postrs/api.go'
- package: github.com/spacemeshos/go-spacemesh/events
symbols:
- ToMalfeasancePB
derived_symbols:
- CloseEventReporter
- EmitAtxPublished
- EmitBeacon
- EmitEligibilities
- EmitInitComplete
- EmitInitFailure
- EmitInitStart
- EmitInvalidPostProof
- EmitOwnMalfeasanceProof
- EmitPoetWaitProof
- EmitPoetWaitRound
- EmitPostComplete
- EmitPostFailure
- EmitPostServiceStarted
- EmitPostServiceStopped
- EmitPostStart
- EmitProposal
- InitializeReporter
- LayerUpdate.Field
- ReportAccountUpdate
- ReportError
- ReportLayerUpdate
- ReportMalfeasance
- ReportNewActivation
- ReportNewTx
- ReportNodeStatusUpdate
- ReportProposal
- ReportResult
- ReportRewardReceived
- ReportTxWithValidity
- SubcribeProposals
- Subscribe
- SubscribeAccount
- SubscribeActivations
- SubscribeErrors
- SubscribeLayers
- SubscribeMalfeasance
- SubscribeMatched
- SubscribeRewards
- SubscribeStatus
- SubscribeToLayers
- SubscribeTxs
- SubscribeUserEvents
- package: github.com/spacemeshos/go-spacemesh/malfeasance
symbols:
- Validate
- Handler.HandleSyncedMalfeasanceProof
skip_fix: 'Nonstandard cgo library: github.com/spacemeshos/post@v0.12.6/internal/postrs/api.go'
- package: github.com/spacemeshos/go-spacemesh/malfeasance/wire
symbols:
- MalfeasanceInfo
- MalfeasanceProof.MarshalLogObject
- Proof.DecodeScale
derived_symbols:
- AtxProof.DecodeScale
- AtxProof.MarshalLogObject
- AtxProofMsg.DecodeScale
- AtxProofMsg.SignedBytes
- BallotProof.DecodeScale
- BallotProof.MarshalLogObject
- BallotProofMsg.DecodeScale
- BallotProofMsg.SignedBytes
- HareMetadata.DecodeScale
- HareMetadata.ToBytes
- HareProof.DecodeScale
- HareProof.MarshalLogObject
- HareProofMsg.DecodeScale
- HareProofMsg.SignedBytes
- InvalidPostIndexProof.DecodeScale
- InvalidPostIndexProof.EncodeScale
- MalfeasanceGossip.DecodeScale
- MalfeasanceGossip.EncodeScale
- MalfeasanceProof.DecodeScale
- MalfeasanceProof.EncodeScale
- Proof.EncodeScale
- package: github.com/spacemeshos/go-spacemesh/node
symbols:
- App.setupDBs
- App.verifyDB
skip_fix: 'Nonstandard cgo library: github.com/spacemeshos/post@v0.12.6/internal/postrs/api.go'
- package: github.com/spacemeshos/go-spacemesh/sql/atxs
symbols:
- AddGettingNonce
- IterateIDsByEpoch
derived_symbols:
- Add
summary: ATX protocol validation problem in github.com/spacemeshos/go-spacemesh
description: |-
Nodes can publish ATXs which reference the incorrect previous ATX of
the Smesher that created the ATX. ATXs are expected to form a single chain from
the newest to the first ATX ever published by an identity. Allowing Smeshers to
reference an earlier (but not the latest) ATX as previous breaks this protocol
rule.
cves:
- CVE-2024-34360
ghsas:
- GHSA-jcqq-g64v-gcm7
references:
- advisory: https://github.com/spacemeshos/go-spacemesh/security/advisories/GHSA-jcqq-g64v-gcm7
- fix: https://github.com/spacemeshos/api/commit/1d5bd972bbe225d024c3e0ae5214ddb6b481716e
- fix: https://github.com/spacemeshos/go-spacemesh/commit/9aff88d54be809ac43d60e8a8b4d65359c356b87
- web: https://spacemesh.io/blog/spacemesh-white-paper-1
source:
id: GHSA-jcqq-g64v-gcm7
created: 2024-05-11T21:02:32.457027-07:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1086.yaml
|
id: GO-2022-1086
modules:
- module: github.com/zalando/skipper
versions:
- fixed: 0.13.237
vulnerable_at: 0.13.236
packages:
- package: github.com/zalando/skipper/proxy
symbols:
- mapRequest
- proxyFromHeader
- forwardToProxy
derived_symbols:
- Proxy.ServeHTTP
- context.Loopback
skip_fix: 'TODO: revisit this reason (net/redisclient: r.ring.SetAddrs undefined)'
summary: Server-side request forger via X-Skipper-Proxy in github.com/zalando/skipper
description: |-
An attacker can access the internal metadata server or other unauthenticated
URLs by adding a specific header (X-Skipper-Proxy) to the http request.
cves:
- CVE-2022-38580
ghsas:
- GHSA-f2rj-m42r-6jm2
references:
- advisory: https://github.com/zalando/skipper/security/advisories/GHSA-f2rj-m42r-6jm2
- fix: https://github.com/zalando/skipper/pull/2058
- web: https://github.com/zalando/skipper/releases/tag/v0.13.237
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2541.yaml
|
id: GO-2024-2541
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 9.1.0+incompatible
- fixed: 9.1.5+incompatible
- introduced: 9.2.0+incompatible
- fixed: 9.2.4+incompatible
vulnerable_at: 9.2.4-rc1+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- fixed: 8.1.8
vulnerable_at: 8.0.0-20240626184126-817e18414e41
summary: Mattermost vulnerable to denial of service via large number of emoji reactions in github.com/mattermost/mattermost-server
cves:
- CVE-2024-1402
ghsas:
- GHSA-32h7-7j94-8fc2
unknown_aliases:
- BIT-mattermost-2024-1402
- CGA-xjf7-9r4q-527v
references:
- advisory: https://github.com/advisories/GHSA-32h7-7j94-8fc2
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1402
- web: https://github.com/mattermost/mattermost/commit/64cb0ca8af2dbda1afcddd1604460591a4799b81
- web: https://github.com/mattermost/mattermost/commit/6d2440de9fd774b67e65e3aac4ab8b6ef9aba2d8
- web: https://github.com/mattermost/mattermost/commit/81190e2da128a6985914ea7023a69ac400513fc4
- web: https://mattermost.com/security-updates
source:
id: GHSA-32h7-7j94-8fc2
created: 2024-06-26T16:13:23.271388-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1904.yaml
|
id: GO-2023-1904
modules:
- module: github.com/bnb-chain/tss-lib
versions:
- fixed: 1.3.6-0.20230324145555-bb6fb30bd3eb
vulnerable_at: 1.3.5
packages:
- package: github.com/bnb-chain/tss-lib/common
symbols:
- SHA512_256
- SHA512_256i
- module: github.com/binance-chain/tss-lib
vulnerable_at: 1.3.0
packages:
- package: github.com/binance-chain/tss-lib/common
symbols:
- SHA512_256
- SHA512_256i
summary: Collision of hash values in github.com/bnb-chain/tss-lib
description: Collision of hash values in github.com/bnb-chain/tss-lib.
cves:
- CVE-2022-47931
ghsas:
- GHSA-cvcx-g7wh-x8rf
references:
- advisory: https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b
- fix: https://github.com/bnb-chain/tss-lib/pull/233
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2650.yaml
|
id: GO-2024-2650
modules:
- module: github.com/go-vela/sdk-go
versions:
- fixed: 0.23.2
vulnerable_at: 0.23.1
summary: Golang SDK for Vela Insecure Variable Substitution in github.com/go-vela/sdk-go
ghsas:
- GHSA-v8mx-hp2q-gw85
references:
- advisory: https://github.com/go-vela/sdk-go/security/advisories/GHSA-v8mx-hp2q-gw85
- fix: https://github.com/go-vela/sdk-go/commit/e3a34719badf37928e60f4402abe51f8b50055e1
source:
id: GHSA-v8mx-hp2q-gw85
created: 2024-06-04T15:37:27.356345-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0083.yaml
|
id: GO-2021-0083
modules:
- module: github.com/hybridgroup/gobot
versions:
- fixed: 1.12.1-0.20190521122906-c1aa4f867846
vulnerable_at: 1.12.1-0.20190521122836-07d9e09b1ea5
packages:
- package: github.com/hybridgroup/gobot/platforms/mqtt
symbols:
- Adaptor.newTLSConfig
derived_symbols:
- Adaptor.Connect
summary: Improper certificate validation in github.com/hybridgroup/gobot
description: |-
TLS certificate verification is skipped when connecting to a MQTT server. This
allows an attacker who can MITM the connection to read, or forge, messages
passed between the client and server.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2019-12496
ghsas:
- GHSA-vfxc-r2gx-v2vq
references:
- fix: https://github.com/hybridgroup/gobot/commit/c1aa4f867846da4669ecf3bc3318bd96b7ee6f3f
- web: https://github.com/hybridgroup/gobot/releases/tag/v1.13.0
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2003.yaml
|
id: GO-2023-2003
modules:
- module: github.com/supranational/blst
versions:
- introduced: 0.3.0
- fixed: 0.3.11
vulnerable_at: 0.3.10
packages:
- package: github.com/supranational/blst/bindings/go
summary: Group signature validation bypass in github.com/supranational/blst
description: |-
When complemented with a check for infinity, blst skips performing a signature
group-check. Formally speaking, infinity is the identity element of the elliptic
curve group and as such it is a member of the group, so the group-check should
be performed. The fix performs the check even in the presence of infinity.
ghsas:
- GHSA-8c37-7qx3-4c4p
credits:
- Yunjong Jeong (@blukat29)
references:
- fix: https://github.com/supranational/blst/commit/fb91221c91c82f65bfc7f243256308977a06d48b
- web: https://github.com/supranational/blst/releases/tag/v0.3.11
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2133.yaml
|
id: GO-2023-2133
modules:
- module: github.com/nats-io/nats-server/v2
versions:
- introduced: 2.2.0
- fixed: 2.9.23
- introduced: 2.10.0
- fixed: 2.10.2
vulnerable_at: 2.10.1
packages:
- package: github.com/nats-io/nats-server/v2/server
symbols:
- Options.processConfigFileLine
- Server.configureAccounts
derived_symbols:
- ConfigureOptions
- New
- NewServer
- Options.ProcessConfigFile
- ProcessConfigFile
- Run
- Server.EnableJetStream
- Server.Reload
- Server.ReloadOptions
- Server.SetDefaultSystemAccount
- Server.SetSystemAccount
- Server.Start
summary: Authorization bypass in github.com/nats-io/nats-server/v2
description: |-
Without any authorization rules in the nats-server, users can connect without
authentication.
Before nats-server 2.2.0, all authentication and authorization rules for a
nats-server lived in an "authorization" block, defining users. With nats-server
2.2.0 all users live inside accounts. When using the authorization block, whose
syntax predates this, those users will be placed into the implicit global
account, "$G". Users inside accounts go into the newer "accounts" block.
If an "accounts" block is defined, in simple deployment scenarios this is often
used only to enable client access to the system account. When the only account
added is the system account "$SYS", the nats-server would create an implicit
user in "$G" and set it as the "no_auth_user" account, enabling the same
"without authentication" logic as without any rules.
This preserved the ability to connect simply, and then add one authenticated
login for system access.
But with an "authorization" block, this is wrong. Users exist in the global
account, with login rules. And in simple testing, they might still connect fine
without administrators seeing that authentication has been disabled.
In the fixed versions, using an "authorization" block will inhibit the implicit
creation of a "$G" user and setting it as the "no_auth_user" target. In unfixed
versions, just creating a second account, with no users, will also inhibit this
behavior.
cves:
- CVE-2023-47090
ghsas:
- GHSA-fr2g-9hjm-wr23
credits:
- Alex Herrington
references:
- fix: https://github.com/nats-io/nats-server/pull/4605
- fix: https://github.com/nats-io/nats-server/commit/fa5b7afcb64e7e887e49afdd032358802b5c4478
- advisory: https://advisories.nats.io/CVE/secnote-2023-01.txt
- report: https://github.com/nats-io/nats-server/discussions/4535
- web: https://github.com/nats-io/nats-server/releases/tag/v2.10.2
- web: https://github.com/nats-io/nats-server/releases/tag/v2.9.23
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2763.yaml
|
id: GO-2024-2763
modules:
- module: github.com/heketi/heketi
versions:
- fixed: 5.0.1+incompatible
vulnerable_at: 5.0.0+incompatible
summary: Heketi Arbitrary Code Execution in github.com/heketi/heketi
cves:
- CVE-2017-15103
ghsas:
- GHSA-6g56-v9qg-jp92
references:
- advisory: https://github.com/advisories/GHSA-6g56-v9qg-jp92
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2017-15103
- fix: https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00
- web: https://access.redhat.com/errata/RHSA-2017:3481
- web: https://access.redhat.com/security/cve/CVE-2017-15103
- web: https://bugzilla.redhat.com/show_bug.cgi?id=1510147
- web: https://github.com/heketi/heketi/releases/tag/v5.0.1
source:
id: GHSA-6g56-v9qg-jp92
created: 2024-05-17T16:12:01.544224-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2931.yaml
|
id: GO-2024-2931
modules:
- module: github.com/rancher/rancher
non_go_versions:
- introduced: 2.7.0
- fixed: 2.7.14
- introduced: 2.8.0
- fixed: 2.8.5
vulnerable_at: 1.6.30
summary: |-
Rancher does not automatically clean up a user deleted or disabled from the
configured Authentication Provider in github.com/rancher/rancher
cves:
- CVE-2023-22650
ghsas:
- GHSA-9ghh-mmcq-8phc
references:
- advisory: https://github.com/rancher/rancher/security/advisories/GHSA-9ghh-mmcq-8phc
source:
id: GHSA-9ghh-mmcq-8phc
created: 2024-06-27T15:54:12.45213-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0090.yaml
|
id: GO-2021-0090
modules:
- module: github.com/tendermint/tendermint
versions:
- introduced: 0.33.0
- fixed: 0.34.0-dev1.0.20200702134149-480b995a3172
vulnerable_at: 0.33.0
packages:
- package: github.com/tendermint/tendermint/types
symbols:
- VoteSet.MakeCommit
derived_symbols:
- MakeCommit
summary: Denial of service in github.com/tendermint/tendermint
description: |-
Proposed commits may contain signatures for blocks not contained within the
commit. Instead of skipping these signatures, they cause failure during
verification. A malicious proposer can use this to force consensus failures.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-15091
ghsas:
- GHSA-6jqj-f58p-mrw3
credits:
- Neeraj Murarka
references:
- fix: https://github.com/tendermint/tendermint/pull/5426
- fix: https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340
- web: https://github.com/tendermint/tendermint/issues/4926
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2741.yaml
|
id: GO-2024-2741
modules:
- module: github.com/owncast/owncast
versions:
- fixed: 0.1.3
vulnerable_at: 0.1.2
summary: Owncast vulnerable to arbitrary file deletion in emoji.go (GHSL-2023-277) in github.com/owncast/owncast
cves:
- CVE-2024-31450
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31450
- fix: https://github.com/owncast/owncast/commit/1b14800c7d7f54be14ed4d130bfe7f480645076e
- web: https://github.com/owncast/owncast/blob/v0.1.2/controllers/admin/emoji.go#L63
- web: https://github.com/owncast/owncast/releases/tag/v0.1.3
- web: https://securitylab.github.com/advisories/GHSL-2023-277_Owncast/
source:
id: CVE-2024-31450
created: 2024-05-17T16:12:46.896265-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0427.yaml
|
id: GO-2022-0427
modules:
- module: github.com/swaggo/http-swagger
versions:
- fixed: 1.2.6
vulnerable_at: 1.2.5
packages:
- package: github.com/swaggo/http-swagger
summary: Unprotected file upload in github.com/swaggo/http-swagger
description: |-
The httpSwagger package's HTTP handler provides WebDAV read/write access to an
in-memory filesystem. An attacker can exploit this to cause memory exhaustion by
uploading many files, XSS attacks by uploading malicious files, or other
unexpected behaviors.
cves:
- CVE-2022-24863
- CVE-2024-25712
ghsas:
- GHSA-49w7-5r33-jm9m
- GHSA-xg75-q3q5-cqmv
references:
- web: https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html
- fix: https://github.com/swaggo/http-swagger/pull/62
- report: https://github.com/swaggo/http-swagger/issues/61
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2816.yaml
|
id: GO-2024-2816
modules:
- module: kubevirt.io/kubevirt
unsupported_versions:
- last_affected: 1.2.0
vulnerable_at: 1.2.1
summary: kubevirt allows a local attacker to execute arbitrary code via a crafted command in kubevirt.io/kubevirt
cves:
- CVE-2024-33394
ghsas:
- GHSA-4q63-mr2m-57hf
references:
- advisory: https://github.com/advisories/GHSA-4q63-mr2m-57hf
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-33394
- web: https://gist.github.com/HouqiyuA/1b75e23ece7ad98490aec1c887bdf49b
source:
id: GHSA-4q63-mr2m-57hf
created: 2024-06-04T14:27:47.602792-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2095.yaml
|
id: GO-2023-2095
modules:
- module: cmd
versions:
- fixed: 1.20.9
- introduced: 1.21.0-0
- fixed: 1.21.2
vulnerable_at: 1.21.1
packages:
- package: cmd/go
summary: Arbitrary code execution during build via line directives in cmd/go
description: |-
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_"
directives, allowing blocked linker and compiler flags to be passed during
compilation. This can result in unexpected execution of arbitrary code when
running "go build". The line directive requires the absolute path of the file in
which the directive lives, which makes exploiting this issue significantly more
complex.
references:
- report: https://go.dev/issue/63211
- fix: https://go.dev/cl/533215
- web: https://groups.google.com/g/golang-announce/c/XBa1oHDevAo
cve_metadata:
id: CVE-2023-39323
cwe: 'CWE 94: Improper Control of Generation of Code (''Code Injection'')'
references:
- https://security.netapp.com/advisory/ntap-20231020-0001/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2574.yaml
|
id: GO-2024-2574
modules:
- module: github.com/gofiber/fiber/v2
versions:
- fixed: 2.52.1
vulnerable_at: 2.52.0
packages:
- package: github.com/gofiber/fiber/v2/middleware/cors
symbols:
- New
- matchSubdomain
summary: |-
Insecure CORS Configuration allowing wildcard origin with credentials in
github.com/gofiber/fiber/v2
description: |-
The CORS middleware allows for insecure configurations that could potentially
expose the application to multiple CORS-related vulnerabilities. Specifically,
it allows setting the Access-Control-Allow-Origin header to a wildcard ("*")
while also having the Access-Control-Allow-Credentials set to true, which goes
against recommended security best practices.
cves:
- CVE-2024-25124
ghsas:
- GHSA-fmg4-x8pw-hjhg
references:
- advisory: https://github.com/gofiber/fiber/security/advisories/GHSA-fmg4-x8pw-hjhg
- fix: https://github.com/gofiber/fiber/commit/f0cd3b44b086544a37886232d0530601f2406c23
- web: http://blog.portswigger.net/2016/10/exploiting-cors-misconfigurations-for.html
- web: https://codeql.github.com/codeql-query-help/javascript/js-cors-misconfiguration-for-credentials
- web: https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS/Errors/CORSNotSupportingCredentials
- web: https://fetch.spec.whatwg.org/#cors-protocol-and-credentials
- web: https://github.com/gofiber/fiber/releases/tag/v2.52.1
- web: https://saturncloud.io/blog/cors-cannot-use-wildcard-in-accesscontrolalloworigin-when-credentials-flag-is-true
source:
id: GHSA-fmg4-x8pw-hjhg
created: 2024-05-17T15:29:50.096863-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2646.yaml
|
id: GO-2024-2646
modules:
- module: github.com/argoproj/argo-cd
versions:
- introduced: 1.0.0
vulnerable_at: 1.8.6
- module: github.com/argoproj/argo-cd/v2
versions:
- introduced: 2.0.0
- fixed: 2.8.12
- introduced: 2.9.0
- fixed: 2.9.8
- introduced: 2.10.0
- fixed: 2.10.3
vulnerable_at: 2.10.2
summary: |-
Cross-site scripting on application summary component in
github.com/argoproj/argo-cd/v2
description: |-
Due to the improper URL protocols filtering of links specified in the
link.argocd.argoproj.io annotations in the application summary component, an
attacker can achieve cross-site scripting with elevated permissions. A malicious
user to inject a javascript: link in the UI. When clicked by a victim user, the
script will execute with the victim's permissions (up to and including admin).
This vulnerability allows an attacker to perform arbitrary actions on behalf of
the victim via the API, such as creating, modifying, and deleting Kubernetes
resources.
cves:
- CVE-2024-28175
ghsas:
- GHSA-jwv5-8mqv-g387
unknown_aliases:
- BIT-argo-cd-2024-28175
credits:
- '@Ry0taK, @agaudreault, and @crenshaw-dev'
references:
- advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-jwv5-8mqv-g387
- fix: https://github.com/argoproj/argo-cd/commit/479b5544b57dc9ef767d49f7003f39602c480b71
notes:
- Fix is in typescript code.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2717.yaml
|
id: GO-2024-2717
modules:
- module: github.com/go-skynet/LocalAI
non_go_versions:
- fixed: 2.10.0
vulnerable_at: 1.40.0
summary: LocalAI Command Injection in audioToWav in github.com/go-skynet/LocalAI
cves:
- CVE-2024-2029
ghsas:
- GHSA-wx43-g55g-2jf4
references:
- advisory: https://github.com/advisories/GHSA-wx43-g55g-2jf4
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-2029
- web: https://github.com/mudler/localai/commit/31a4c9c9d3abc58de2bdc5305419181c8b33eb1c
- web: https://huntr.com/bounties/e092528a-ce3b-4e66-9b98-3f56d6b276b0
source:
id: GHSA-wx43-g55g-2jf4
created: 2024-06-04T15:30:38.950992-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2113.yaml
|
id: GO-2023-2113
modules:
- module: go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful
versions:
- fixed: 0.44.0
vulnerable_at: 0.43.0
packages:
- package: go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful/internal/semconvutil
symbols:
- httpConv.proto
derived_symbols:
- HTTPClientRequest
- HTTPServerRequest
- httpConv.ClientRequest
- httpConv.ServerRequest
- module: go.opentelemetry.io/contrib/instrumentation/github.com/gin-gonic/gin/otelgin
versions:
- fixed: 0.44.0
vulnerable_at: 0.43.0
packages:
- package: go.opentelemetry.io/contrib/instrumentation/github.com/gin-gonic/gin/otelgin/internal/semconvutil
symbols:
- httpConv.proto
derived_symbols:
- HTTPClientRequest
- HTTPServerRequest
- httpConv.ClientRequest
- httpConv.ServerRequest
- module: go.opentelemetry.io/contrib/instrumentation/github.com/gorilla/mux/otelmux
versions:
- fixed: 0.44.0
vulnerable_at: 0.43.0
packages:
- package: go.opentelemetry.io/contrib/instrumentation/github.com/gorilla/mux/otelmux/internal/semconvutil
symbols:
- httpConv.proto
derived_symbols:
- HTTPClientRequest
- HTTPServerRequest
- httpConv.ClientRequest
- httpConv.ServerRequest
- module: go.opentelemetry.io/contrib/instrumentation/github.com/labstack/echo/otelecho
versions:
- fixed: 0.44.0
vulnerable_at: 0.43.0
packages:
- package: go.opentelemetry.io/contrib/instrumentation/github.com/labstack/echo/otelecho/internal/semconvutil
symbols:
- httpConv.proto
derived_symbols:
- HTTPClientRequest
- HTTPServerRequest
- httpConv.ClientRequest
- httpConv.ServerRequest
- module: go.opentelemetry.io/contrib/instrumentation/gopkg.in/macaron.v1/otelmacaron
versions:
- fixed: 0.44.0
vulnerable_at: 0.43.0
packages:
- package: go.opentelemetry.io/contrib/instrumentation/gopkg.in/macaron.v1/otelmacaron/internal/semconvutil
symbols:
- httpConv.proto
derived_symbols:
- HTTPClientRequest
- HTTPServerRequest
- httpConv.ClientRequest
- httpConv.ServerRequest
- module: go.opentelemetry.io/contrib/instrumentation/net/http/httptrace/otelhttptrace
versions:
- fixed: 0.44.0
vulnerable_at: 0.43.0
packages:
- package: go.opentelemetry.io/contrib/instrumentation/net/http/httptrace/otelhttptrace/internal/semconvutil
symbols:
- httpConv.proto
derived_symbols:
- HTTPClientRequest
- HTTPServerRequest
- httpConv.ClientRequest
- httpConv.ServerRequest
- module: go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp
versions:
- fixed: 0.44.0
vulnerable_at: 0.43.0
packages:
- package: go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp
symbols:
- middleware.serveHTTP
summary: Memory exhaustion in go.opentelemetry.io/contrib/instrumentation
cves:
- CVE-2023-45142
ghsas:
- GHSA-rcjv-mgp8-qvmr
related:
- CVE-2022-21698
- CVE-2023-25151
- GHSA-5r5m-65gx-7vrh
- GHSA-cg3q-j54f-5p7p
references:
- advisory: https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-rcjv-mgp8-qvmr
- fix: https://github.com/open-telemetry/opentelemetry-go-contrib/pull/4277
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2818.yaml
|
id: GO-2024-2818
modules:
- module: github.com/btcsuite/btcd
versions:
- fixed: 0.24.0
vulnerable_at: 0.23.4
packages:
- package: github.com/btcsuite/btcd/blockchain
symbols:
- BlockChain.calcSequenceLock
derived_symbols:
- BlockChain.CalcSequenceLock
- BlockChain.CheckConnectBlockTemplate
- BlockChain.ProcessBlock
- ValidateTransactionScripts
- txValidator.Validate
- package: github.com/btcsuite/btcd/txscript
symbols:
- opcodeCheckSequenceVerify
derived_symbols:
- Engine.Execute
- Engine.Step
summary: Consensus failures in github.com/btcsuite/btcd
description: |-
Incorrect implementation of the consensus rules outlined in BIP 68 and BIP 112
making btcd susceptible to consensus failures. Specifically, it uses the
transaction version as a signed integer when it is supposed to be treated as
unsigned. There can be a chain split and loss of funds.
cves:
- CVE-2024-34478
ghsas:
- GHSA-3jgf-r68h-xfqm
credits:
- Niklas Gögge
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-34478
- web: https://delvingbitcoin.org/t/disclosure-btcd-consensus-bugs-due-to-usage-of-signed-transaction-version/455
- web: https://github.com/btcsuite/btcd/blob/e4c88c3a3ecb1813529bf3dddc7a865bd418a6b8/blockchain/chain.go#L383C1-L392C3
- web: https://github.com/btcsuite/btcd/blob/e4c88c3a3ecb1813529bf3dddc7a865bd418a6b8/txscript/opcode.go#L1172C1-L1178C3
- fix: https://github.com/btcsuite/btcd/pull/1981
source:
id: GHSA-3jgf-r68h-xfqm
created: 2024-05-07T21:45:01.011365-07:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2669.yaml
|
id: GO-2024-2669
modules:
- module: github.com/hashicorp/nomad
versions:
- introduced: 1.2.11
- fixed: 1.4.11
- introduced: 1.5.0
- fixed: 1.5.7
vulnerable_at: 1.5.6
summary: API token secret ID leak to Sentinel in github.com/hashicorp/nomad
description: |-
A vulnerability exists in Nomad where the API caller's ACL token secret
ID is exposed to Sentinel policies.
cves:
- CVE-2023-3299
ghsas:
- GHSA-9jfx-84v9-2rr2
credits:
- anonymous4ACL24
references:
- report: https://github.com/hashicorp/nomad/issues/17907
- web: https://discuss.hashicorp.com/t/hcsec-2023-21-nomad-caller-acl-tokens-secret-id-is-exposed-to-sentinel/56271
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2048.yaml
|
id: GO-2023-2048
modules:
- module: github.com/cyphar/filepath-securejoin
versions:
- fixed: 0.2.4
vulnerable_at: 0.2.3
packages:
- package: github.com/cyphar/filepath-securejoin
goos:
- windows
symbols:
- SecureJoinVFS
derived_symbols:
- SecureJoin
summary: |-
Paths outside of the rootfs could be produced on Windows in
github.com/cyphar/filepath-securejoin
description: |-
Certain rootfs and path combinations result in generated paths that are outside
of the provided rootfs on Windows.
ghsas:
- GHSA-6xv5-86q9-7xr8
credits:
- '@pjbgf'
references:
- advisory: https://github.com/cyphar/filepath-securejoin/security/advisories/GHSA-6xv5-86q9-7xr8
- fix: https://github.com/cyphar/filepath-securejoin/commit/c121231e1276e11049547bee5ce68d5a2cfe2d9b
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0112.yaml
|
id: GO-2021-0112
modules:
- module: go.mongodb.org/mongo-driver
versions:
- fixed: 1.5.1
vulnerable_at: 1.5.0
packages:
- package: go.mongodb.org/mongo-driver/x/bsonx/bsoncore
symbols:
- AppendHeader
- AppendRegex
derived_symbols:
- AppendArrayElement
- AppendArrayElementStart
- AppendBinaryElement
- AppendBooleanElement
- AppendCodeWithScopeElement
- AppendDBPointerElement
- AppendDateTimeElement
- AppendDecimal128Element
- AppendDocumentElement
- AppendDocumentElementStart
- AppendDoubleElement
- AppendInt32Element
- AppendInt64Element
- AppendJavaScriptElement
- AppendMaxKeyElement
- AppendMinKeyElement
- AppendNullElement
- AppendObjectIDElement
- AppendRegexElement
- AppendStringElement
- AppendSymbolElement
- AppendTimeElement
- AppendTimestampElement
- AppendUndefinedElement
- AppendValueElement
- ArrayBuilder.AppendArray
- ArrayBuilder.AppendBinary
- ArrayBuilder.AppendBoolean
- ArrayBuilder.AppendCodeWithScope
- ArrayBuilder.AppendDBPointer
- ArrayBuilder.AppendDateTime
- ArrayBuilder.AppendDecimal128
- ArrayBuilder.AppendDocument
- ArrayBuilder.AppendDouble
- ArrayBuilder.AppendInt32
- ArrayBuilder.AppendInt64
- ArrayBuilder.AppendJavaScript
- ArrayBuilder.AppendMaxKey
- ArrayBuilder.AppendMinKey
- ArrayBuilder.AppendNull
- ArrayBuilder.AppendObjectID
- ArrayBuilder.AppendRegex
- ArrayBuilder.AppendString
- ArrayBuilder.AppendSymbol
- ArrayBuilder.AppendTimestamp
- ArrayBuilder.AppendUndefined
- ArrayBuilder.AppendValue
- ArrayBuilder.StartArray
- BuildArray
- BuildArrayElement
- BuildDocumentElement
- DocumentBuilder.AppendArray
- DocumentBuilder.AppendBinary
- DocumentBuilder.AppendBoolean
- DocumentBuilder.AppendCodeWithScope
- DocumentBuilder.AppendDBPointer
- DocumentBuilder.AppendDateTime
- DocumentBuilder.AppendDecimal128
- DocumentBuilder.AppendDocument
- DocumentBuilder.AppendDouble
- DocumentBuilder.AppendInt32
- DocumentBuilder.AppendInt64
- DocumentBuilder.AppendJavaScript
- DocumentBuilder.AppendMaxKey
- DocumentBuilder.AppendMinKey
- DocumentBuilder.AppendNull
- DocumentBuilder.AppendObjectID
- DocumentBuilder.AppendRegex
- DocumentBuilder.AppendString
- DocumentBuilder.AppendSymbol
- DocumentBuilder.AppendTimestamp
- DocumentBuilder.AppendUndefined
- DocumentBuilder.AppendValue
- DocumentBuilder.StartDocument
- package: go.mongodb.org/mongo-driver/bson/bsonrw
symbols:
- valueWriter.writeElementHeader
derived_symbols:
- Copier.AppendArrayBytes
- Copier.AppendDocumentBytes
- Copier.AppendValueBytes
- Copier.CopyArrayFromBytes
- Copier.CopyBytesToArrayWriter
- Copier.CopyBytesToDocumentWriter
- Copier.CopyDocument
- Copier.CopyDocumentFromBytes
- Copier.CopyDocumentToBytes
- Copier.CopyValue
- Copier.CopyValueFromBytes
- Copier.CopyValueToBytes
- CopyDocument
- valueWriter.WriteArray
- valueWriter.WriteBinary
- valueWriter.WriteBinaryWithSubtype
- valueWriter.WriteBoolean
- valueWriter.WriteCodeWithScope
- valueWriter.WriteDBPointer
- valueWriter.WriteDateTime
- valueWriter.WriteDecimal128
- valueWriter.WriteDocument
- valueWriter.WriteDouble
- valueWriter.WriteInt32
- valueWriter.WriteInt64
- valueWriter.WriteJavascript
- valueWriter.WriteMaxKey
- valueWriter.WriteMinKey
- valueWriter.WriteNull
- valueWriter.WriteObjectID
- valueWriter.WriteRegex
- valueWriter.WriteString
- valueWriter.WriteSymbol
- valueWriter.WriteTimestamp
- valueWriter.WriteUndefined
- valueWriter.WriteValueBytes
summary: Improper input validation in go.mongodb.org/mongo-driver
description: |-
Due to improper input sanitization when marshalling Go objects into BSON, a
maliciously constructed Go structure could allow an attacker to inject
additional fields into a MongoDB document. Users are affected if they use this
package to handle untrusted user input.
published: 2021-07-28T18:08:05Z
cves:
- CVE-2021-20329
ghsas:
- GHSA-f6mq-5m25-4r72
references:
- fix: https://github.com/mongodb/mongo-go-driver/pull/622
- fix: https://github.com/mongodb/mongo-go-driver/commit/2aca31d5986a9e1c65a92264736de9fdc3b9b4ca
- web: https://jira.mongodb.org/browse/GODRIVER-1923
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0244.yaml
|
id: GO-2022-0244
modules:
- module: github.com/satori/go.uuid
versions:
- introduced: 1.2.1-0.20180103161547-0ef6afb2f6cd
- fixed: 1.2.1-0.20180404165556-75cca531ea76
vulnerable_at: 1.2.1-0.20180103161547-0ef6afb2f6cd
packages:
- package: github.com/satori/go.uuid
symbols:
- rfc4122Generator.NewV4
- rfc4122Generator.getClockSequence
- rfc4122Generator.getHardwareAddr
derived_symbols:
- NewV1
- NewV2
- NewV4
- rfc4122Generator.NewV1
- rfc4122Generator.NewV2
summary: Insufficient randomness in UUIDs in github.com/satori/go.uuid
description: |-
Random data used to create UUIDs can contain zeros, resulting in predictable
UUIDs and possible collisions.
published: 2022-07-15T23:06:26Z
cves:
- CVE-2021-3538
ghsas:
- GHSA-33m6-q9v5-62r7
credits:
- '@josselin-c'
references:
- fix: https://github.com/satori/go.uuid/pull/75
- fix: https://github.com/satori/go.uuid/commit/75cca531ea763666bc46e531da3b4c3b95f64557
- report: https://github.com/satori/go.uuid/issues/73
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1295.yaml
|
id: GO-2023-1295
modules:
- module: github.com/square/squalor
versions:
- fixed: 0.0.0-20200306154055-f6f0a47cc344
vulnerable_at: 0.0.0-20190215211619-afa27bf1201c
packages:
- package: github.com/square/squalor
symbols:
- quoteName
- Table.loadColumns
- Table.loadKeys
derived_symbols:
- AliasedTableExpr.Serialize
- AndExpr.Serialize
- BinaryExpr.Serialize
- ColName.Serialize
- Columns.Serialize
- ComparisonExpr.Serialize
- DB.BindModel
- DB.Delete
- DB.DeleteContext
- DB.Exec
- DB.ExecContext
- DB.Get
- DB.GetContext
- DB.Insert
- DB.InsertContext
- DB.InsertIgnore
- DB.InsertIgnoreContext
- DB.MustBindModel
- DB.Query
- DB.QueryContext
- DB.QueryRow
- DB.QueryRowContext
- DB.Replace
- DB.ReplaceContext
- DB.Select
- DB.SelectContext
- DB.Update
- DB.UpdateContext
- DB.Upsert
- DB.UpsertContext
- Delete.Serialize
- FuncExpr.Serialize
- GroupBy.Serialize
- Insert.Serialize
- JoinTableExpr.Serialize
- Limit.Serialize
- LoadTable
- NonStarExpr.Serialize
- NotExpr.Serialize
- NullCheck.Serialize
- OnDup.Serialize
- OnJoinCond.Serialize
- OrExpr.Serialize
- Order.Serialize
- OrderBy.Serialize
- ParenBoolExpr.Serialize
- RangeCond.Serialize
- Select.Serialize
- SelectExprs.Serialize
- Serialize
- StandardLogger.Log
- StarExpr.Serialize
- TableExprs.Serialize
- TableName.Serialize
- TableNames.Serialize
- Tx.Delete
- Tx.DeleteContext
- Tx.Exec
- Tx.ExecContext
- Tx.Get
- Tx.GetContext
- Tx.Insert
- Tx.InsertContext
- Tx.InsertIgnore
- Tx.InsertIgnoreContext
- Tx.Query
- Tx.QueryContext
- Tx.QueryRow
- Tx.QueryRowContext
- Tx.Replace
- Tx.ReplaceContext
- Tx.Select
- Tx.SelectContext
- Tx.Update
- Tx.UpdateContext
- Tx.Upsert
- Tx.UpsertContext
- Update.Serialize
- UpdateExpr.Serialize
- UpdateExprs.Serialize
- UsingJoinCond.Serialize
- ValExprs.Serialize
- ValTuple.Serialize
- Values.Serialize
- Where.Serialize
summary: SQL injection in github.com/square/squalor
description: There is a potential for SQL injection in the table name parameter.
cves:
- CVE-2020-36645
ghsas:
- GHSA-3hc7-2xcc-7p8f
references:
- report: https://github.com/square/squalor/pull/76
- fix: https://github.com/square/squalor/pull/76/commits/033350b8596b397c6cefa066b1f2c83d35fc8c4a
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0227.yaml
|
id: GO-2021-0227
modules:
- module: golang.org/x/crypto
versions:
- fixed: 0.0.0-20201216223049-8b5274cf687f
vulnerable_at: 0.0.0-20201208171446-5f87f3452ae9
packages:
- package: golang.org/x/crypto/ssh
symbols:
- connection.serverAuthenticate
derived_symbols:
- NewServerConn
summary: Panic on crafted authentication request message in golang.org/x/crypto/ssh
description: |-
Clients can cause a panic in SSH servers. An attacker can craft an
authentication request message for the “gssapi-with-mic” method which will
cause NewServerConn to panic via a nil pointer dereference if
ServerConfig.GSSAPIWithMICConfig is nil.
published: 2022-02-17T17:35:32Z
cves:
- CVE-2020-29652
ghsas:
- GHSA-3vm4-22fp-5rfm
credits:
- Joern Schneewesiz (GitLab Security Research Team)
references:
- fix: https://go.dev/cl/278852
- fix: https://go.googlesource.com/crypto/+/8b5274cf687fd9316b4108863654cc57385531e8
- web: https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1821.yaml
|
id: GO-2023-1821
modules:
- module: github.com/cosmos/cosmos-sdk
vulnerable_at: 0.47.3
packages:
- package: github.com/cosmos/cosmos-sdk/x/crisis
summary: The x/crisis package does not cause chain halt in github.com/cosmos/cosmos-sdk
description: |-
If an invariant check fails on a Cosmos SDK network, and a transaction is sent
to the x/crisis package to halt the chain, the chain does not halt as originally
intended.
No patch will be released, as the package is planned to be deprecated and
replaced.
ghsas:
- GHSA-qfc5-6r3j-jj22
references:
- advisory: https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-qfc5-6r3j-jj22
- report: https://github.com/cosmos/cosmos-sdk/issues/15325
- report: https://github.com/cosmos/cosmos-sdk/issues/15706
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1118.yaml
|
id: GO-2022-1118
modules:
- module: github.com/codenotary/immudb
versions:
- fixed: 1.4.1
vulnerable_at: 1.4.0
packages:
- package: github.com/codenotary/immudb/pkg/client
symbols:
- NewImmuClient
- DefaultOptions
- immuClient.OpenSession
derived_symbols:
- NewClient
summary: Improper validation of UUIDs in github.com/codenotary/immudb
description: |-
A malicious server can trick a client into treating it as a different server by
changing the reported UUID.
immudb client SDKs use the server's UUID to distinguish between different server
instance so that the client can connect to different immudb instances and keep
the state for multiple servers. The SDK does not validate this UUID and accepts
any value reported by the server. A malicious server can therefore change the
reported UUID and trick the client into treating it as a different server.
cves:
- CVE-2022-39199
ghsas:
- GHSA-6cqj-6969-p57x
references:
- advisory: https://github.com/codenotary/immudb/security/advisories/GHSA-6cqj-6969-p57x
- fix: https://github.com/codenotary/immudb/commit/cade04756ff3f0a3b9e8d24149062744574adf5d
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0319.yaml
|
id: GO-2021-0319
modules:
- module: std
versions:
- fixed: 1.16.14
- introduced: 1.17.0-0
- fixed: 1.17.7
vulnerable_at: 1.17.6
packages:
- package: crypto/elliptic
symbols:
- CurveParams.IsOnCurve
- p384PointFromAffine
- p521PointFromAffine
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Incorrect computation for some invalid field elements in crypto/elliptic
description: |-
Some big.Int values that are not valid field elements (negative or overflowing)
might cause Curve.IsOnCurve to incorrectly return true. Operating on those
values may cause a panic or an invalid curve operation. Note that Unmarshal will
never return such values.
published: 2022-05-23T22:15:21Z
cves:
- CVE-2022-23806
credits:
- Guido Vranken
references:
- fix: https://go.dev/cl/382455
- fix: https://go.googlesource.com/go/+/7f9494c277a471f6f47f4af3036285c0b1419816
- web: https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ
- report: https://go.dev/issue/50974
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1148.yaml
|
id: GO-2022-1148
modules:
- module: github.com/libp2p/go-libp2p
versions:
- fixed: 0.18.0
vulnerable_at: 0.18.0-rc1
packages:
- package: github.com/libp2p/go-libp2p
symbols:
- New
derived_symbols:
- DefaultStaticRelays
- Muxer
- NewWithoutDefaults
- Security
- Transport
- package: github.com/libp2p/go-libp2p/config
symbols:
- MuxerConstructor
- makeMuxer
- TransportConstructor
- makeTransports
- makeArgumentConstructors
- makeConstructor
- SecurityConstructor
derived_symbols:
- Config.NewNode
- package: github.com/libp2p/go-libp2p/p2p/host/autonat
symbols:
- client.DialBack
- autoNATService.handleStream
derived_symbols:
- New
- package: github.com/libp2p/go-libp2p/p2p/host/basic
symbols:
- BasicHost.newStreamHandler
derived_symbols:
- NewHost
- package: github.com/libp2p/go-libp2p/p2p/protocol/circuitv1/relay
symbols:
- NewRelay
- package: github.com/libp2p/go-libp2p/p2p/protocol/circuitv2/client
symbols:
- Client.connectV1
- Client.connectV2
- Client.Dial
- package: github.com/libp2p/go-libp2p/p2p/protocol/circuitv2/relay
symbols:
- New
- Relay.Close
- Relay.handleStream
- Relay.handleConnect
- package: github.com/libp2p/go-libp2p/p2p/protocol/holepunch
symbols:
- Service.initiateHolePunch
- Service.incomingHolePunch
- Service.handleNewStream
derived_symbols:
- Service.DirectConnect
- netNotifiee.Connected
summary: Resource exhaustion in github.com/libp2p/go-libp2p
description: |-
go-libp2p is vulnerable to targeted resource exhaustion attacks.
These attacks target libp2p's connection, stream, peer, and memory management.
An attacker can cause the allocation of large amounts of memory ultimately
leading to the process getting killed by the host's operating system.
While a connection manager tasked with keeping the number of connections within
manageable limits has been part of go-libp2p, this component was designed to
handle the regular churn of peers, not a targeted resource exhaustion attack.
It's recommend to update to v0.21.0 onwards to get some useful functionality
that will help in production environments like better metrics around resource
usage, Grafana dashboards around resource usage, allow list support, and default
autoscaling limits.
cves:
- CVE-2022-23492
ghsas:
- GHSA-j7qp-mfxf-8xjw
references:
- advisory: https://github.com/libp2p/go-libp2p/security/advisories/GHSA-j7qp-mfxf-8xjw
- fix: https://github.com/libp2p/go-libp2p/commit/15d7dfbf54264ead8e6f49ca658d79c90635e2de
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2434.yaml
|
id: GO-2024-2434
modules:
- module: github.com/cubefs/cubefs
non_go_versions:
- fixed: 3.3.1
vulnerable_at: 2.5.2+incompatible
summary: CubeFS leaks users key in logs in github.com/cubefs/cubefs
cves:
- CVE-2023-46742
ghsas:
- GHSA-vwch-g97w-hfg2
references:
- advisory: https://github.com/cubefs/cubefs/security/advisories/GHSA-vwch-g97w-hfg2
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-46742
- fix: https://github.com/cubefs/cubefs/commit/8dccce6ac8dff3db44d7e9074094c7303a5ff5dd
source:
id: GHSA-vwch-g97w-hfg2
created: 2024-06-14T11:34:49.71851-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2485.yaml
|
id: GO-2024-2485
modules:
- module: github.com/hashicorp/vault
versions:
- introduced: 0.11.0
- fixed: 1.3.4
vulnerable_at: 1.3.3
summary: HashiCorp Vault Improper Privilege Management in github.com/hashicorp/vault
cves:
- CVE-2020-10661
ghsas:
- GHSA-j6vv-vv26-rh7c
unknown_aliases:
- BIT-vault-2020-10661
references:
- advisory: https://github.com/advisories/GHSA-j6vv-vv26-rh7c
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-10661
- fix: https://github.com/hashicorp/vault/commit/18485ee9d4352ac8e8396c580b5941ccf8e5b31a
- web: https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#134-march-19th-2020
- web: https://www.hashicorp.com/blog/category/vault
source:
id: GHSA-j6vv-vv26-rh7c
created: 2024-06-14T11:37:17.728135-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2488.yaml
|
id: GO-2024-2488
modules:
- module: github.com/hashicorp/vault
versions:
- introduced: 0.8.3
- fixed: 1.2.5
- introduced: 1.3.0
- fixed: 1.3.8
- introduced: 1.4.0
- fixed: 1.4.4
- introduced: 1.5.0
- fixed: 1.5.1
vulnerable_at: 1.5.0
summary: HashiCorp Vault Authentication bypass in github.com/hashicorp/vault
cves:
- CVE-2020-16251
ghsas:
- GHSA-4mp7-2m29-gqxf
unknown_aliases:
- BIT-vault-2020-16251
references:
- advisory: https://github.com/advisories/GHSA-4mp7-2m29-gqxf
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-16251
- web: http://packetstormsecurity.com/files/159479/Hashicorp-Vault-GCP-IAM-Integration-Authentication-Bypass.html
- web: https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#151
- web: https://www.hashicorp.com/blog/category/vault
source:
id: GHSA-4mp7-2m29-gqxf
created: 2024-06-14T11:37:32.985013-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2799.yaml
|
id: GO-2024-2799
modules:
- module: github.com/mcu-tools/mcuboot
unsupported_versions:
- cve_version_range: affected at <= 1.11.0
vulnerable_at: 1.10.0
summary: MCUboot Injection attack of unprotected TLV values in github.com/mcu-tools/mcuboot
cves:
- CVE-2024-32883
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32883
- web: https://github.com/mcu-tools/mcuboot/security/advisories/GHSA-m59c-q9gq-rh2j
source:
id: CVE-2024-32883
created: 2024-06-04T15:26:24.569-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0391.yaml
|
id: GO-2022-0391
modules:
- module: github.com/aws/aws-sdk-go
versions:
- fixed: 1.34.0
vulnerable_at: 1.30.0
packages:
- package: github.com/aws/aws-sdk-go/service/s3/s3crypto
symbols:
- encodeMeta
derived_symbols:
- DecryptionClient.GetObject
- DecryptionClient.GetObjectWithContext
- EncryptionClient.PutObject
- EncryptionClient.PutObjectWithContext
- S3LoadStrategy.Load
- S3SaveStrategy.Save
- defaultV2LoadStrategy.Load
- kmsKeyHandler.DecryptKey
- kmsKeyHandler.DecryptKeyWithContext
- kmsKeyHandler.GenerateCipherData
- kmsKeyHandler.GenerateCipherDataWithContext
summary: Exposure of unencrypted plaintext hash in github.com/aws/aws-sdk-go
description: |-
The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the
ciphertext as a metadata field. This hash can be used to brute force the
plaintext, if the hash is readable to the attacker.
AWS now blocks this metadata field, but older SDK versions still send it.
published: 2022-07-01T20:10:56Z
ghsas:
- GHSA-6jvc-q2x7-pchv
- GHSA-76wf-9vgp-pj7w
references:
- fix: https://github.com/aws/aws-sdk-go/commit/35fa6ddf45c061e0f08d3a3b5119f8f4da38f6d1
cve_metadata:
id: CVE-2022-2582
cwe: 'CWE 311: Missing Encryption of Sensitive Data'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0037.yaml
|
id: GO-2020-0037
modules:
- module: github.com/tendermint/tendermint
versions:
- fixed: 0.31.1
vulnerable_at: 0.31.0
packages:
- package: github.com/tendermint/tendermint/rpc/lib/client
symbols:
- makeHTTPClient
derived_symbols:
- NewJSONRPCClient
- NewURIClient
summary: Uncontrolled resource consumption in github.com/tendermint/tendermint
description: |-
Due to support of Gzip compression in request bodies, as well as a lack of
limiting response body sizes, a malicious server can cause a client to consume a
significant amount of system resources, which may be used as a denial of service
vector.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-3fm3-m23v-5r46
credits:
- '@guagualvcha'
references:
- fix: https://github.com/tendermint/tendermint/pull/3430
- fix: https://github.com/tendermint/tendermint/commit/03085c2da23b179c4a51f59a03cb40aa4e85a613
cve_metadata:
id: CVE-2019-25072
cwe: 'CWE-400: Uncontrolled Resource Consumption'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1860.yaml
|
id: GO-2023-1860
modules:
- module: github.com/cosmos/ibc-go/v7
versions:
- fixed: 7.0.1
vulnerable_at: 7.0.0
packages:
- package: github.com/cosmos/ibc-go/v7/modules/core/04-channel/keeper
symbols:
- Keeper.UnreceivedPackets
- package: github.com/cosmos/ibc-go/v7/modules/core/keeper
symbols:
- Keeper.RecvPacket
derived_symbols:
- Keeper.UnreceivedPackets
- module: github.com/cosmos/ibc-go/v6
versions:
- fixed: 6.1.1
vulnerable_at: 6.1.0
packages:
- package: github.com/cosmos/ibc-go/v6/modules/core/04-channel/keeper
symbols:
- Keeper.UnreceivedPackets
skip_fix: v6.1.0 does not build without replace directives
- package: github.com/cosmos/ibc-go/v6/modules/core/keeper
symbols:
- Keeper.RecvPacket
skip_fix: v6.1.0 does not build without replace directives
- module: github.com/cosmos/ibc-go/v5
versions:
- fixed: 5.2.1
- introduced: 5.3.0
- fixed: 5.3.1
vulnerable_at: 5.3.0
packages:
- package: github.com/cosmos/ibc-go/v5/modules/core/04-channel/keeper
symbols:
- Keeper.UnreceivedPackets
skip_fix: v5.3.0 does not build without replace directives
- package: github.com/cosmos/ibc-go/v5/modules/core/keeper
symbols:
- Keeper.RecvPacket
skip_fix: v5.3.0 does not build without replace directives
- module: github.com/cosmos/ibc-go/v4
versions:
- fixed: 4.1.3
- introduced: 4.2.0
- fixed: 4.2.2
- introduced: 4.3.0
- fixed: 4.3.1
- introduced: 4.4.0
- fixed: 4.4.1
vulnerable_at: 4.1.2
packages:
- package: github.com/cosmos/ibc-go/v4/modules/core/04-channel/keeper
symbols:
- Keeper.UnreceivedPackets
skip_fix: v4.1.2 does not build without replace directives
- package: github.com/cosmos/ibc-go/v4/modules/core/keeper
symbols:
- Keeper.RecvPacket
skip_fix: v4.1.2 does not build without replace directives
summary: IBC protocol "Huckleberry" vulnerability in github.com/cosmos/ibc-go
description: |-
The ibc-go module is affected by the Inter-Blockchain Communication (IBC)
protocol "Huckleberry" vulnerability.
references:
- advisory: https://forum.cosmos.network/t/ibc-security-advisory-huckleberry/10731
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0234.yaml
|
id: GO-2021-0234
modules:
- module: std
versions:
- fixed: 1.15.9
- introduced: 1.16.0-0
- fixed: 1.16.1
vulnerable_at: 1.16.0
packages:
- package: encoding/xml
symbols:
- Decoder.Token
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Infinite loop when decoding inputs in encoding/xml
description: |-
The Decode, DecodeElement, and Skip methods of an xml.Decoder provided by
xml.NewTokenDecoder may enter an infinite loop when operating on a custom
xml.TokenReader which returns an EOF in the middle of an open XML element.
published: 2022-02-17T17:34:24Z
cves:
- CVE-2021-27918
credits:
- Sam Whited
references:
- fix: https://go.dev/cl/300391
- fix: https://go.googlesource.com/go/+/d0b79e3513a29628f3599dc8860666b6eed75372
- report: https://go.dev/issue/44913
- web: https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2757.yaml
|
id: GO-2024-2757
modules:
- module: code.gitea.io/gitea
versions:
- introduced: 1.9.0
- fixed: 1.13.2
vulnerable_at: 1.13.1
summary: Buffer Overflow in gitea in code.gitea.io/gitea
cves:
- CVE-2021-3382
ghsas:
- GHSA-9f8c-pfvv-p4gm
unknown_aliases:
- BIT-gitea-2021-3382
references:
- advisory: https://github.com/advisories/GHSA-9f8c-pfvv-p4gm
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-3382
- web: https://github.com/go-gitea/gitea/pull/14390
source:
id: GHSA-9f8c-pfvv-p4gm
created: 2024-05-17T16:12:14.05802-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2743.yaml
|
id: GO-2024-2743
modules:
- module: github.com/apache/incubator-answer
versions:
- fixed: 1.3.0
vulnerable_at: 1.3.0-RC1
summary: XSS vulnerability via personal website in github.com/apache/incubator-answer
cves:
- CVE-2024-29217
ghsas:
- GHSA-cvqr-mwh6-2vc6
credits:
- Tsubasa Umeuchi
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-29217
- web: https://lists.apache.org/thread/nc0g1borr0d3wx25jm39pn7nyf268n0x
source:
id: GHSA-cvqr-mwh6-2vc6
created: 2024-04-22T13:43:40.133698-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0064.yaml
|
id: GO-2021-0064
modules:
- module: k8s.io/client-go
versions:
- fixed: 0.20.0-alpha.2
vulnerable_at: 0.20.0-alpha.1
packages:
- package: k8s.io/client-go/transport
symbols:
- requestInfo.toCurl
derived_symbols:
- basicAuthRoundTripper.RoundTrip
- bearerAuthRoundTripper.RoundTrip
- debuggingRoundTripper.RoundTrip
- impersonatingRoundTripper.RoundTrip
- userAgentRoundTripper.RoundTrip
summary: |-
Unauthorized credential disclosure via debug logs in k8s.io/kubernetes and
k8s.io/client-go
description: |-
Authorization tokens may be inappropriately logged if the verbosity level is set
to a debug level. This is due to an incomplete fix for CVE-2019-11250.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-8565
ghsas:
- GHSA-8cfg-vx93-jvxw
credits:
- '@sfowl'
references:
- fix: https://github.com/kubernetes/kubernetes/pull/95316
- fix: https://github.com/kubernetes/kubernetes/commit/e99df0e5a75eb6e86123b56d53e9b7ca0fd00419
- web: https://github.com/kubernetes/kubernetes/issues/95623
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2440.yaml
|
id: GO-2024-2440
modules:
- module: github.com/buildkite/elastic-ci-stack-for-aws
vulnerable_at: 4.5.0+incompatible
- module: github.com/buildkite/elastic-ci-stack-for-aws/v5
vulnerable_at: 5.22.5
- module: github.com/buildkite/elastic-ci-stack-for-aws/v6
versions:
- fixed: 6.7.1
vulnerable_at: 6.7.0
summary: |-
Buildkite Elastic CI for AWS time-of-check-time-of-use race condition
vulnerability in github.com/buildkite/elastic-ci-stack-for-aws
cves:
- CVE-2023-43741
ghsas:
- GHSA-r5hg-349q-mg2q
references:
- advisory: https://github.com/advisories/GHSA-r5hg-349q-mg2q
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-43741
- fix: https://github.com/buildkite/elastic-ci-stack-for-aws/commit/edad0b158ea10a6647bb1c84629d93f5c3d8770e
- web: https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0003.md
source:
id: GHSA-r5hg-349q-mg2q
created: 2024-06-26T16:12:24.457895-04:00
review_status: UNREVIEWED
unexcluded: NOT_IMPORTABLE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2843.yaml
|
id: GO-2024-2843
modules:
- module: github.com/grafana/grafana
non_go_versions:
- introduced: 8.0.0
- fixed: 8.5.15
- introduced: 9.0.0
- fixed: 9.2.4
vulnerable_at: 5.4.5+incompatible
summary: Grafana Email addresses and usernames can not be trusted in github.com/grafana/grafana
cves:
- CVE-2022-39306
ghsas:
- GHSA-2x6g-h2hg-rq84
unknown_aliases:
- BIT-grafana-2022-39306
references:
- advisory: https://github.com/grafana/grafana/security/advisories/GHSA-2x6g-h2hg-rq84
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-39306
- web: https://security.netapp.com/advisory/ntap-20221215-0004
source:
id: GHSA-2x6g-h2hg-rq84
created: 2024-06-04T14:27:39.956482-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2661.yaml
|
id: GO-2024-2661
modules:
- module: github.com/grafana/grafana
non_go_versions:
- fixed: 6.4.4
summary: Arbitrary file read in github.com/grafana/grafana
description: |-
An authenticated attacker that has privileges to modify the data source
configurations can read arbitrary files.
cves:
- CVE-2019-19499
ghsas:
- GHSA-4pwp-cx67-5cpx
references:
- fix: https://github.com/grafana/grafana/pull/20192
- web: https://github.com/grafana/grafana/blob/master/CHANGELOG.md#644-2019-11-06
- web: https://security.netapp.com/advisory/ntap-20200918-0003
- web: https://swarm.ptsecurity.com/grafana-6-4-3-arbitrary-file-read
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2584.yaml
|
id: GO-2024-2584
modules:
- module: github.com/cosmos/cosmos-sdk
versions:
- fixed: 0.47.10
- introduced: 0.50.0
vulnerable_at: 0.47.9
packages:
- package: github.com/cosmos/cosmos-sdk/x/auth/vesting
symbols:
- msgServer.CreatePeriodicVestingAccount
- package: github.com/cosmos/cosmos-sdk/x/staking/keeper
symbols:
- Keeper.SlashRedelegation
derived_symbols:
- Keeper.Slash
- Keeper.SlashWithInfractionReason
summary: Slashing evasion in github.com/cosmos/cosmos-sdk
ghsas:
- GHSA-86h5-xcpx-cfqc
references:
- advisory: https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-86h5-xcpx-cfqc
- fix: https://github.com/cosmos/cosmos-sdk/commit/7dbed2fc0c3ed7c285645e21cb1037d8810372ae
- fix: https://github.com/cosmos/cosmos-sdk/commit/d1b5b0c5ae2c51206cc1849e09e4d59986742cc3
notes:
- The GHSA says that 0.50.5 is a fixed version, but it currently doesn't exist.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2911.yaml
|
id: GO-2024-2911
modules:
- module: github.com/mostynb/go-grpc-compression
versions:
- introduced: 1.1.4
- fixed: 1.2.3
vulnerable_at: 1.2.2
summary: go-grpc-compression has a zstd decompression bombing vulnerability in github.com/mostynb/go-grpc-compression
ghsas:
- GHSA-87m9-rv8p-rgmg
unknown_aliases:
- CGA-55fv-r57p-8jr6
- CGA-5mr6-pxmv-g3rf
- CGA-9h9r-pfxh-82vp
- CGA-9p94-3p48-x4p9
- CGA-f77f-95vc-hx27
- CGA-fpq9-2vcx-mr9m
- CGA-jj45-rqfh-mhq4
- CGA-vxwm-jjvq-32cx
references:
- advisory: https://github.com/mostynb/go-grpc-compression/security/advisories/GHSA-87m9-rv8p-rgmg
- fix: https://github.com/mostynb/go-grpc-compression/commit/629c44d3acb9624993cc7de629f47d72109e2ce5
source:
id: GHSA-87m9-rv8p-rgmg
created: 2024-06-26T14:09:10.765895-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2785.yaml
|
id: GO-2024-2785
modules:
- module: github.com/coredns/coredns
versions:
- fixed: 1.11.2
vulnerable_at: 1.11.1
packages:
- package: github.com/coredns/coredns/plugin/cache
symbols:
- Cache.ServeDNS
- Cache.getIgnoreTTL
- Cache.exists
- key
- hash
- newPrefetchResponseWriter
- ResponseWriter.WriteMsg
derived_symbols:
- verifyStaleResponseWriter.WriteMsg
summary: CoreDNS may return invalid cache entries in github.com/coredns/coredns
description: |-
A flaw was found in coredns. This issue could lead to invalid cache entries
returning due to incorrectly implemented caching.
cves:
- CVE-2024-0874
ghsas:
- GHSA-m9w6-wp3h-vq8g
references:
- advisory: https://github.com/advisories/GHSA-m9w6-wp3h-vq8g
- fix: https://github.com/coredns/coredns/commit/997c7f953962d47c242273f0e41398fdfb5b0151
- fix: https://github.com/coredns/coredns/pull/6354
- report: https://github.com/coredns/coredns/issues/6186
- web: https://access.redhat.com/errata/RHSA-2024:0041
- web: https://access.redhat.com/security/cve/CVE-2024-0874
- web: https://bugzilla.redhat.com/show_bug.cgi?id=2219234
source:
id: GHSA-m9w6-wp3h-vq8g
created: 2024-07-01T16:15:04.682445-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2530.yaml
|
id: GO-2024-2530
modules:
- module: go.etcd.io/etcd
vulnerable_at: 2.3.8+incompatible
- module: go.etcd.io/etcd/v3
non_go_versions:
- fixed: 3.3.23
- introduced: 3.4.0-rc.0
- fixed: 3.4.10
vulnerable_at: 3.5.14
summary: |-
Etcd auth Inaccurate logging of authentication attempts for users with CN-based
auth only in go.etcd.io/etcd
ghsas:
- GHSA-vjg6-93fv-qv64
references:
- advisory: https://github.com/etcd-io/etcd/security/advisories/GHSA-vjg6-93fv-qv64
source:
id: GHSA-vjg6-93fv-qv64
created: 2024-06-26T16:05:38.246759-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2449.yaml
|
id: GO-2024-2449
modules:
- module: github.com/gravitational/teleport
non_go_versions:
- fixed: 12.4.31
- introduced: 13.0.0
- fixed: 13.4.13
- introduced: 14.0.0
- fixed: 14.2.4
vulnerable_at: 3.2.17+incompatible
summary: User-provided environment values allow execution on macOS agents in github.com/gravitational/teleport
ghsas:
- GHSA-vfxf-76hv-v4w4
references:
- advisory: https://github.com/gravitational/teleport/security/advisories/GHSA-vfxf-76hv-v4w4
- fix: https://github.com/gravitational/teleport/commit/fcc97de9f99dfec8696ecfd620672a26f29cf9ac
- fix: https://github.com/gravitational/teleport/pull/36132
source:
id: GHSA-vfxf-76hv-v4w4
created: 2024-06-14T11:35:44.744025-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1702.yaml
|
id: GO-2023-1702
modules:
- module: std
versions:
- fixed: 1.19.8
- introduced: 1.20.0-0
- fixed: 1.20.3
vulnerable_at: 1.20.2
packages:
- package: go/scanner
symbols:
- Scanner.updateLineInfo
derived_symbols:
- Scanner.Scan
summary: Infinite loop in parsing in go/scanner
description: |-
Calling any of the Parse functions on Go source code which contains //line
directives with very large line numbers can cause an infinite loop due to
integer overflow.
credits:
- Philippe Antoine (Catena cyber)
references:
- report: https://go.dev/issue/59180
- fix: https://go.dev/cl/482078
- web: https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
cve_metadata:
id: CVE-2023-24537
cwe: 'CWE-835: Loop with Unreachable Exit Condition (''Infinite Loop'')'
references:
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1752.yaml
|
id: GO-2023-1752
modules:
- module: std
versions:
- fixed: 1.19.9
- introduced: 1.20.0-0
- fixed: 1.20.4
vulnerable_at: 1.20.3
packages:
- package: html/template
symbols:
- nextJSCtx
derived_symbols:
- Template.Execute
- Template.ExecuteTemplate
summary: Improper handling of JavaScript whitespace in html/template
description: |-
Not all valid JavaScript whitespace characters are considered to be whitespace.
Templates containing whitespace characters outside of the character set
"\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions
may not be properly sanitized during execution.
credits:
- Juho Nurminen of Mattermost
references:
- report: https://go.dev/issue/59721
- fix: https://go.dev/cl/491616
- web: https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
cve_metadata:
id: CVE-2023-24540
cwe: 'CWE-74: Improper input validation'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1572.yaml
|
id: GO-2023-1572
modules:
- module: golang.org/x/image
versions:
- fixed: 0.5.0
vulnerable_at: 0.4.0
packages:
- package: golang.org/x/image/tiff
symbols:
- decoder.ifdUint
- newDecoder
- Decode
derived_symbols:
- DecodeConfig
summary: Denial of service via crafted TIFF image in golang.org/x/image/tiff
description: |-
An attacker can craft a malformed TIFF image which will consume a significant
amount of memory when passed to DecodeConfig. This could lead to a denial of
service.
ghsas:
- GHSA-qgc7-mgm3-q253
credits:
- Philippe Antoine (Catena cyber)
- OSS Fuzz
references:
- report: https://go.dev/issue/58003
- fix: https://go.dev/cl/468195
- web: https://groups.google.com/g/golang-announce/c/ag-FiyjlD5o
cve_metadata:
id: CVE-2022-41727
cwe: 'CWE-400: Uncontrolled Resource Consumption'
references:
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2492.yaml
|
id: GO-2024-2492
modules:
- module: github.com/moby/buildkit
versions:
- fixed: 0.12.5
vulnerable_at: 0.12.4
packages:
- package: github.com/moby/buildkit/solver/llbsolver
symbols:
- Solver.Solve
- llbBridge.loadResult
- loadSourcePolicy
- package: github.com/moby/buildkit/sourcepolicy
symbols:
- match
- package: github.com/moby/buildkit/control
symbols:
- Controller.Solve
- package: github.com/moby/buildkit/frontend/gateway/client
symbols:
- AttestationFromPB
- package: github.com/moby/buildkit/frontend/gateway
symbols:
- llbBridgeForwarder.Warn
- llbBridgeForwarder.Solve
- package: github.com/moby/buildkit/util/tracing/transform
symbols:
- spanEvents
- doubleArray
- arrayValues
- stringArray
- Attributes
- intArray
- links
- statusCode
- Spans
- boolArray
- package: github.com/moby/buildkit/exporter/containerimage/exptypes
symbols:
- ParsePlatforms
- package: github.com/moby/buildkit/exporter/containerimage
symbols:
- patchImageConfig
fix_links:
- https://github.com/moby/buildkit/commit/7718bd5c3dc8fc5cd246a30cc41766e7a53c043c
summary: Panic in github.com/moby/buildkit
description: |-
A malicious BuildKit client or frontend could craft a request that could lead to
a BuildKit daemon crashing with a panic.
cves:
- CVE-2024-23650
ghsas:
- GHSA-9p26-698r-w4hx
credits:
- '@cpuguy83'
references:
- fix: https://github.com/moby/buildkit/pull/4601
- fix: https://github.com/moby/buildkit/commit/e1924dc32da35bfb0bfdbb9d0fc7bca25e552330
- fix: https://github.com/moby/buildkit/commit/7718bd5c3dc8fc5cd246a30cc41766e7a53c043c
- fix: https://github.com/moby/buildkit/commit/96663dd35bf3787d7efb1ee7fd9ac7fe533582ae
- fix: https://github.com/moby/buildkit/commit/481d9c45f473c58537f39694a38d7995cc656987
- fix: https://github.com/moby/buildkit/commit/83edaef59d545b93e2750f1f85675a3764593fee
- web: https://github.com/moby/buildkit/releases/tag/v0.12.5
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1494.yaml
|
id: GO-2023-1494
modules:
- module: github.com/elgs/gosqljson
versions:
- fixed: 0.0.0-20220916234230-750f26ee23c7
vulnerable_at: 0.0.0-20140902115517-fa34a82f9316
packages:
- package: github.com/elgs/gosqljson
symbols:
- ExecDb
- QueryDbToArray
- QueryDbToMap
derived_symbols:
- QueryDbToArrayJson
- QueryDbToMapJson
summary: SQL injection in github.com/elgs/gosqljson
description: |-
There is a potential for SQL injection through manipulation of the sqlStatement
argument.
cves:
- CVE-2014-125064
ghsas:
- GHSA-g7mw-9pf9-p2pm
references:
- fix: https://github.com/elgs/gosqljson/commit/2740b331546cb88eb61771df4c07d389e9f0363a
review_status: REVIEWED
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.