repo_id
stringclasses
927 values
file_path
stringlengths
99
214
content
stringlengths
2
4.15M
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2797.yaml
id: GO-2024-2797 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 8.1.0+incompatible - fixed: 8.1.12+incompatible - introduced: 9.4.0+incompatible - fixed: 9.4.5+incompatible - introduced: 9.5.0+incompatible - fixed: 9.5.3+incompatible - introduced: 9.6.0-rc1+incompatible - fixed: 9.6.1+incompatible vulnerable_at: 9.6.1-rc3+incompatible summary: Mattermost's detailed error messages reveal the full file path in github.com/mattermost/mattermost-server cves: - CVE-2024-32046 ghsas: - GHSA-vx97-8q8q-qgq5 references: - advisory: https://github.com/advisories/GHSA-vx97-8q8q-qgq5 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32046 - web: https://github.com/mattermost/mattermost/commit/2a48b5b3428cae494452125401e4f72780543ac8 - web: https://github.com/mattermost/mattermost/commit/93738756ff79777c6e340c8de63a7b4b0f881d27 - web: https://github.com/mattermost/mattermost/commit/aa222c66b799c12e32eeb8eae6f555bf6140375b - web: https://github.com/mattermost/mattermost/commit/c84c25b20c8b8726a2f126ae9370a72498096172 - web: https://mattermost.com/security-updates source: id: GHSA-vx97-8q8q-qgq5 created: 2024-06-04T15:26:55.734035-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0963.yaml
id: GO-2022-0963 modules: - module: github.com/gagliardetto/binary versions: - fixed: 0.7.1 vulnerable_at: 0.7.0 packages: - package: github.com/gagliardetto/binary symbols: - Decoder.decodeBin - Decoder.decodeBorsh - Decoder.decodeCompactU16 - Decoder.ReadTypeID - Decoder.Discard - Decoder.ReadRustString - readNBytes - discardNBytes - Encoder.WriteFloat32 - Encoder.WriteFloat64 - Encoder.encodeBin - Encoder.encodeBorsh - Encoder.encodeCompactU16 derived_symbols: - BaseVariant.UnmarshalBinaryVariant - BinByteCount - BorshByteCount - CompactU16ByteCount - Decoder.Decode - Decoder.ReadInt64 - Decoder.ReadNBytes - Decoder.ReadUint64 - Encoder.Encode - Int64.UnmarshalWithDecoder - JSONFloat64.MarshalWithEncoder - MarshalBin - MarshalBorsh - MarshalCompactU16 - MustBinByteCount - MustBorshByteCount - MustCompactU16ByteCount - Uint64.UnmarshalWithDecoder - UnmarshalBin - UnmarshalBorsh - UnmarshalCompactU16 summary: Resource exhaustion in github.com/gagliardetto/binary description: |- A memory allocation vulnerability can be exploited to allocate arbitrarily large slices, which can exhaust available memory or crash the program. When parsing data from untrusted sources of input (e.g. the blockchain), the length of the slice to allocate is read directly from the data itself without any checks, which could lead to an allocation of excessive memory. published: 2022-09-02T18:37:03Z cves: - CVE-2022-36078 ghsas: - GHSA-4p6f-m4f9-ch88 references: - advisory: https://github.com/gagliardetto/binary/security/advisories/GHSA-4p6f-m4f9-ch88 - fix: https://github.com/gagliardetto/binary/pull/7 - web: https://github.com/gagliardetto/binary/releases/tag/v0.7.1 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0569.yaml
id: GO-2022-0569 modules: - module: github.com/astaxie/beego vulnerable_at: 1.12.3 packages: - package: github.com/astaxie/beego symbols: - Tree.Match derived_symbols: - App.Run - ControllerRegister.FindPolicy - ControllerRegister.FindRouter - ControllerRegister.ServeHTTP - FilterRouter.ValidRouter - InitBeegoBeforeTest - Run - RunWithMiddleWares - TestBeegoInit - adminApp.Run - module: github.com/beego/beego versions: - fixed: 1.12.11 vulnerable_at: 1.12.10 packages: - package: github.com/beego/beego symbols: - Tree.Match derived_symbols: - App.Run - ControllerRegister.FindPolicy - ControllerRegister.FindRouter - ControllerRegister.ServeHTTP - FilterRouter.ValidRouter - InitBeegoBeforeTest - Run - RunWithMiddleWares - TestBeegoInit - adminApp.Run - module: github.com/beego/beego/v2 versions: - introduced: 2.0.0 - fixed: 2.0.4 vulnerable_at: 2.0.3 packages: - package: github.com/beego/beego/v2/server/web symbols: - Tree.Match derived_symbols: - AddNamespace - AddViewPath - Any - AutoPrefix - AutoRouter - BuildTemplate - Compare - CompareNot - Controller.Abort - Controller.Bind - Controller.BindForm - Controller.BindJSON - Controller.BindProtobuf - Controller.BindXML - Controller.BindYAML - Controller.CheckXSRFCookie - Controller.CustomAbort - Controller.Delete - Controller.DestroySession - Controller.Get - Controller.GetBool - Controller.GetFile - Controller.GetFloat - Controller.GetInt - Controller.GetInt16 - Controller.GetInt32 - Controller.GetInt64 - Controller.GetInt8 - Controller.GetSecureCookie - Controller.GetString - Controller.GetStrings - Controller.GetUint16 - Controller.GetUint32 - Controller.GetUint64 - Controller.GetUint8 - Controller.Head - Controller.Input - Controller.IsAjax - Controller.JSONResp - Controller.Options - Controller.ParseForm - Controller.Patch - Controller.Post - Controller.Put - Controller.Redirect - Controller.Render - Controller.RenderBytes - Controller.RenderString - Controller.Resp - Controller.SaveToFile - Controller.SaveToFileWithBuffer - Controller.ServeFormatted - Controller.ServeJSON - Controller.ServeJSONP - Controller.ServeXML - Controller.ServeYAML - Controller.SessionRegenerateID - Controller.SetData - Controller.SetSecureCookie - Controller.Trace - Controller.URLFor - Controller.XMLResp - Controller.XSRFFormHTML - Controller.XSRFToken - Controller.YamlResp - ControllerRegister.Add - ControllerRegister.AddAuto - ControllerRegister.AddAutoPrefix - ControllerRegister.AddMethod - ControllerRegister.AddRouterMethod - ControllerRegister.Any - ControllerRegister.CtrlAny - ControllerRegister.CtrlDelete - ControllerRegister.CtrlGet - ControllerRegister.CtrlHead - ControllerRegister.CtrlOptions - ControllerRegister.CtrlPatch - ControllerRegister.CtrlPost - ControllerRegister.CtrlPut - ControllerRegister.Delete - ControllerRegister.FindPolicy - ControllerRegister.FindRouter - ControllerRegister.Get - ControllerRegister.GetContext - ControllerRegister.Handler - ControllerRegister.Head - ControllerRegister.Include - ControllerRegister.Init - ControllerRegister.InsertFilter - ControllerRegister.Options - ControllerRegister.Patch - ControllerRegister.Post - ControllerRegister.Put - ControllerRegister.ServeHTTP - ControllerRegister.URLFor - CtrlAny - CtrlDelete - CtrlGet - CtrlHead - CtrlOptions - CtrlPatch - CtrlPost - CtrlPut - Date - DateFormat - DateParse - Delete - Exception - ExecuteTemplate - ExecuteViewPathTemplate - FileSystem.Open - FilterRouter.ValidRouter - FlashData.Error - FlashData.Notice - FlashData.Set - FlashData.Store - FlashData.Success - FlashData.Warning - Get - GetConfig - HTML2str - Handler - Head - Htmlquote - Htmlunquote - HttpServer.Any - HttpServer.AutoPrefix - HttpServer.AutoRouter - HttpServer.CtrlAny - HttpServer.CtrlDelete - HttpServer.CtrlGet - HttpServer.CtrlHead - HttpServer.CtrlOptions - HttpServer.CtrlPatch - HttpServer.CtrlPost - HttpServer.CtrlPut - HttpServer.Delete - HttpServer.Get - HttpServer.Handler - HttpServer.Head - HttpServer.Include - HttpServer.InsertFilter - HttpServer.LogAccess - HttpServer.Options - HttpServer.Patch - HttpServer.Post - HttpServer.PrintTree - HttpServer.Put - HttpServer.RESTRouter - HttpServer.Router - HttpServer.RouterWithOpts - HttpServer.Run - Include - InitBeegoBeforeTest - InsertFilter - LoadAppConfig - LogAccess - MapGet - Namespace.Any - Namespace.AutoPrefix - Namespace.AutoRouter - Namespace.Cond - Namespace.CtrlAny - Namespace.CtrlDelete - Namespace.CtrlGet - Namespace.CtrlHead - Namespace.CtrlOptions - Namespace.CtrlPatch - Namespace.CtrlPost - Namespace.CtrlPut - Namespace.Delete - Namespace.Filter - Namespace.Get - Namespace.Handler - Namespace.Head - Namespace.Include - Namespace.Namespace - Namespace.Options - Namespace.Patch - Namespace.Post - Namespace.Put - Namespace.Router - NewControllerRegister - NewControllerRegisterWithCfg - NewHttpServerWithCfg - NewHttpSever - NewNamespace - NotNil - Options - ParseForm - Patch - Policy - Post - PrintTree - Put - RESTRouter - ReadFromRequest - RenderForm - Router - RouterWithOpts - Run - RunWithMiddleWares - TestBeegoInit - Tree.AddRouter - Tree.AddTree - URLFor - URLMap.GetMap - URLMap.GetMapData - Walk - adminApp.Run - adminController.AdminIndex - adminController.Healthcheck - adminController.ListConf - adminController.ProfIndex - adminController.PrometheusMetrics - adminController.QpsIndex - adminController.TaskStatus - beegoAppConfig.Bool - beegoAppConfig.DefaultBool - beegoAppConfig.SaveConfigFile - beegoAppConfig.Unmarshaler summary: Path traversal in github.com/beego/beego and beego/v2 description: |- The leafInfo.match() function uses path.join() to deal with wildcard values which can lead to cross directory risk. published: 2022-08-23T13:24:17Z cves: - CVE-2022-31836 ghsas: - GHSA-95f9-94vc-665h references: - fix: https://github.com/beego/beego/pull/5025 - fix: https://github.com/beego/beego/pull/5025/commits/ea5ae58d40589d249cf577a053e490509de2bf57 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2588.yaml
id: GO-2024-2588 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 9.0.0+incompatible - fixed: 9.4.2+incompatible vulnerable_at: 9.4.2-rc2+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - fixed: 8.1.9 vulnerable_at: 8.0.0-20240626184126-817e18414e41 summary: Mattermost race condition in github.com/mattermost/mattermost-server cves: - CVE-2024-1949 ghsas: - GHSA-3g35-v53r-gpxc unknown_aliases: - CGA-jmr7-jr2v-rjcq references: - advisory: https://github.com/advisories/GHSA-3g35-v53r-gpxc - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1949 - web: https://mattermost.com/security-updates source: id: GHSA-3g35-v53r-gpxc created: 2024-06-26T16:10:37.990276-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1867.yaml
id: GO-2023-1867 modules: - module: github.com/bnb-chain/tss-lib vulnerable_at: 1.3.5 packages: - package: github.com/bnb-chain/tss-lib/common - module: github.com/binance-chain/tss-lib vulnerable_at: 1.3.0 packages: - package: github.com/binance-chain/tss-lib/common summary: Replay attacks involving proofs in github.com/bnb-chain/tss-lib description: Replay attacks involving proofs in github.com/bnb-chain/tss-lib. cves: - CVE-2022-47930 references: - advisory: https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2556.yaml
id: GO-2024-2556 modules: - module: github.com/elastic/apm-server non_go_versions: - fixed: 8.12.1 vulnerable_at: 6.8.23+incompatible summary: APM Server vulnerable to Insertion of Sensitive Information into Log File in github.com/elastic/apm-server cves: - CVE-2024-23448 ghsas: - GHSA-8r33-q5j5-rh7g references: - advisory: https://github.com/advisories/GHSA-8r33-q5j5-rh7g - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23448 - web: https://discuss.elastic.co/t/apm-server-8-12-1-security-update-esa-2024-03/352688 - web: https://www.elastic.co/community/security source: id: GHSA-8r33-q5j5-rh7g created: 2024-06-14T11:41:38.704445-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0039.yaml
id: GO-2020-0039 modules: - module: gopkg.in/macaron.v1 versions: - fixed: 1.3.7 vulnerable_at: 1.3.6 packages: - package: gopkg.in/macaron.v1 symbols: - staticHandler derived_symbols: - Context.Next - LoggerInvoker.Invoke - Macaron.Run - Macaron.ServeHTTP - Router.ServeHTTP summary: Open redirect in gopkg.in/macaron.v1 description: |- Due to improper request sanitization, a specifically crafted URL can cause the static file handler to redirect to an attacker chosen URL, allowing for open redirect attacks. published: 2021-04-14T20:04:52Z cves: - CVE-2020-12666 ghsas: - GHSA-733f-44f3-3frw credits: - '@ev0A' references: - fix: https://github.com/go-macaron/macaron/pull/199 - fix: https://github.com/go-macaron/macaron/commit/addc7461c3a90a040e79aa75bfd245107a210245 - web: https://github.com/go-macaron/macaron/issues/198 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2744.yaml
id: GO-2024-2744 modules: - module: github.com/authelia/authelia/v4 versions: - introduced: 4.37.0 - fixed: 4.38.0 vulnerable_at: 4.37.5 summary: Access control change may take longer than expected in github.com/authelia/authelia/v4 description: |- If the file authentication backend is being used, the ewatch option is set to true, the refresh interval is configured to a non-disabled value, and an administrator changes a user's groups, then that user may be able to access resources that their previous groups had access to. ghsas: - GHSA-x883-2vmg-xwf7 references: - advisory: https://github.com/authelia/authelia/security/advisories/GHSA-x883-2vmg-xwf7 - web: https://github.com/authelia/authelia/blob/v4.37.5/internal/handlers/handler_verify.go#L376-L394 source: id: GHSA-x883-2vmg-xwf7 created: 2024-04-22T14:02:49.727107-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2734.yaml
id: GO-2024-2734 modules: - module: github.com/1Panel-dev/1Panel non_go_versions: - fixed: 1.10.3 vulnerable_at: 1.9.6 summary: |- 1Panel's password verification is suspected to have a timing attack vulnerability in github.com/1Panel-dev/1Panel cves: - CVE-2024-30257 ghsas: - GHSA-6m9h-2pr2-9j8f references: - advisory: https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-30257 - web: https://github.com/1Panel-dev/1Panel/blob/dev/backend/app/service/auth.go#L81C5-L81C26 source: id: GHSA-6m9h-2pr2-9j8f created: 2024-06-04T15:30:09.964726-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2848.yaml
id: GO-2024-2848 modules: - module: github.com/grafana/grafana non_go_versions: - fixed: 8.5.14 - introduced: 9.0.0 - fixed: 9.1.8 vulnerable_at: 5.4.5+incompatible summary: Grafana when using email as a username can block other users from signing in in github.com/grafana/grafana cves: - CVE-2022-39229 ghsas: - GHSA-gj7m-853r-289r unknown_aliases: - BIT-grafana-2022-39229 references: - advisory: https://github.com/grafana/grafana/security/advisories/GHSA-gj7m-853r-289r - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-39229 - fix: https://github.com/grafana/grafana/commit/5644758f0c5ae9955a4e5480d71f9bef57fdce35 - web: https://github.com/grafana/grafana/releases/tag/v9.1.8 source: id: GHSA-gj7m-853r-289r created: 2024-06-04T14:27:27.572132-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2803.yaml
id: GO-2024-2803 modules: - module: github.com/navidrome/navidrome versions: - fixed: 0.52.0 vulnerable_at: 0.51.1 summary: Navidrome Parameter Tampering vulnerability in github.com/navidrome/navidrome cves: - CVE-2024-32963 ghsas: - GHSA-4jrx-5w4h-3gpm references: - advisory: https://github.com/navidrome/navidrome/security/advisories/GHSA-4jrx-5w4h-3gpm - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32963 source: id: GHSA-4jrx-5w4h-3gpm created: 2024-05-17T16:10:05.196852-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0109.yaml
id: GO-2021-0109 modules: - module: github.com/ory/fosite versions: - fixed: 0.34.0 vulnerable_at: 0.33.0 packages: - package: github.com/ory/fosite/handler/oauth2 symbols: - TokenRevocationHandler.RevokeToken summary: Improper handling of token revocation in github.com/ory/fosite description: |- Due to improper error handling, an error with the underlying token storage may cause a user to believe a token has been successfully revoked when it is in fact still valid. An attackers ability to exploit this relies on an ability to trigger errors in the underlying storage. published: 2021-07-28T18:08:05Z cves: - CVE-2020-15223 ghsas: - GHSA-7mqr-2v3q-v2wm references: - fix: https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1027.yaml
id: GO-2022-1027 modules: - module: github.com/cloudwego/hertz versions: - fixed: 0.3.1 vulnerable_at: 0.3.0 packages: - package: github.com/cloudwego/hertz/pkg/protocol goos: - windows symbols: - normalizePath derived_symbols: - Cookie.SetPath - Cookie.SetPathBytes - NewRequest - ParseURI - Request.Host - Request.ParseURI - Request.Path - Request.QueryString - Request.SetHost - Request.SetQueryString - Request.URI - URI.Parse - URI.SetPath - URI.SetPathBytes - URI.Update - URI.UpdateBytes summary: Path traversal in github.com/cloudwego/hertz description: |- Improper path sanitization on Windows permits path traversal attacks. Static file serving with the Static or StaticFS functions allows an attacker to access files from outside the filesystem root. This vulnerability does not affect non-Windows systems. cves: - CVE-2022-40082 ghsas: - GHSA-c9qr-f6c8-rgxf references: - web: https://github.com/cloudwego/hertz/issues/228 - fix: https://github.com/cloudwego/hertz/pull/229 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2883.yaml
id: GO-2024-2883 modules: - module: github.com/rs/cors versions: - introduced: 1.9.0 - fixed: 1.11.0 vulnerable_at: 1.10.1 packages: - package: github.com/rs/cors symbols: - Cors.handlePreflight - Cors.areHeadersAllowed - New - splitHeaderValues derived_symbols: - AllowAll - Cors.HandlerFunc - Cors.ServeHTTP - Default summary: Denial of service via malicious preflight requests in github.com/rs/cors description: |- Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service. ghsas: - GHSA-mh55-gqvf-xfwm credits: - '@jub0bs' references: - fix: https://github.com/rs/cors/pull/171 - report: https://github.com/rs/cors/issues/170 source: id: go-security-team created: 2024-07-02T11:27:50.335482-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0063.yaml
id: GO-2021-0063 modules: - module: github.com/ethereum/go-ethereum versions: - fixed: 1.9.25 vulnerable_at: 1.9.24 packages: - package: github.com/ethereum/go-ethereum/les symbols: - serverHandler.handleMsg derived_symbols: - PrivateLightServerAPI.Benchmark summary: |- Nil pointer dereference via malicious RPC message in github.com/ethereum/go-ethereum description: |- Due to a nil pointer dereference, a maliciously crafted RPC message can cause a panic. If handling RPC messages from untrusted clients, this may be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2020-26264 ghsas: - GHSA-r33q-22hv-j29q credits: - '@zsfelfoldi' references: - fix: https://github.com/ethereum/go-ethereum/pull/21896 - fix: https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2074.yaml
id: GO-2023-2074 modules: - module: github.com/gomarkdown/markdown versions: - fixed: 0.0.0-20230922105210-14b16010c2ee vulnerable_at: 0.0.0-20230916125811-7478c230c7cd packages: - package: github.com/gomarkdown/markdown/parser symbols: - Parser.isPrefixHeading - citation derived_symbols: - Parser.Block - Parser.Inline - Parser.Parse summary: |- Parser out-of-bounds read caused by a malformed markdown input in github.com/gomarkdown/markdown cves: - CVE-2023-42821 ghsas: - GHSA-m9xq-6h2j-65r2 references: - advisory: https://github.com/gomarkdown/markdown/security/advisories/GHSA-m9xq-6h2j-65r2 - fix: https://github.com/gomarkdown/markdown/commit/14b16010c2ee7ff33a940a541d993bd043a88940 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1026.yaml
id: GO-2022-1026 modules: - module: github.com/peterzen/goresolver vulnerable_at: 1.0.2 packages: - package: github.com/peterzen/goresolver summary: |- Incorrect validation of root DNSSEC public keys in github.com/peterzen/goresolver description: |- DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. Root DNSSEC public keys are not validated, permitting an attacker to present a self-signed root key and delegation chain. ghsas: - GHSA-jr65-gpj5-cw74 references: - report: https://github.com/peterzen/goresolver/issues/5#issuecomment-1150214257 cve_metadata: id: CVE-2022-3347 cwe: 'CWE 295: Improper Certificate Validation' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2605.yaml
id: GO-2024-2605 modules: - module: github.com/jackc/pgx/v4 versions: - fixed: 4.18.2 vulnerable_at: 4.18.1 packages: - package: github.com/jackc/pgx/v4/internal/sanitize symbols: - Query.Sanitize derived_symbols: - SanitizeSQL summary: SQL injection in github.com/jackc/pgx/v4 description: |- SQL injection is possible when the database uses the non-default simple protocol, a minus sign directly precedes a numeric placeholder followed by a string placeholder on the same line, and both parameter values are user-controlled. cves: - CVE-2024-27289 ghsas: - GHSA-m7wr-2xf7-cm9p credits: - paul-gerste-sonarsource references: - advisory: https://github.com/jackc/pgx/security/advisories/GHSA-m7wr-2xf7-cm9p - fix: https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2961.yaml
id: GO-2024-2961 modules: - module: golang.org/x/crypto versions: - fixed: 0.0.0-20220525230936-793ad666bf5e vulnerable_at: 0.0.0-20220518034528-6f7dac969898 packages: - package: golang.org/x/crypto/acme/autocert goos: - windows symbols: - DirCache.Get - DirCache.Put - DirCache.Delete derived_symbols: - HostWhitelist - Manager.GetCertificate - Manager.Listener - NewListener - listener.Accept - listener.Close summary: Limited directory traversal vulnerability on Windows in golang.org/x/crypto description: |- httpTokenCacheKey uses path.Base to extract the expected HTTP-01 token value to lookup in the DirCache implementation. On Windows, path.Base acts differently to filepath.Base, since Windows uses a different path separator (\ vs. /), allowing a user to provide a relative path, i.e. .well-known/acme-challenge/..\..\asd becomes ..\..\asd. The extracted path is then suffixed with +http-01, joined with the cache directory, and opened. Since the controlled path is suffixed with +http-01 before opening, the impact of this is significantly limited, since it only allows reading arbitrary files on the system if and only if they have this suffix. credits: - Juho Nurminen of Mattermost references: - fix: https://go.dev/cl/408694 - report: https://go.dev/issue/53082 cve_metadata: id: CVE-2022-30636 cwe: 'CWE 22: Improper Limitation of a Pathname to a Restricted Directory (''Path Traversal'')' source: id: go-security-team created: 2024-07-02T12:55:35.249465-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0197.yaml
id: GO-2022-0197 modules: - module: golang.org/x/net versions: - fixed: 0.0.0-20190125002852-4b62a64f59f7 vulnerable_at: 0.0.0-20190119204137-ed066c81e75e packages: - package: golang.org/x/net/html symbols: - nodeStack.contains derived_symbols: - Parse - ParseFragment summary: Panic when parsing certain inputs in golang.org/x/net/html description: |- The Parse function can panic on some invalid inputs. For example, the Parse function panics on the input "<svg><template><desc><t><svg></template>". published: 2022-07-01T20:15:19Z cves: - CVE-2018-17847 - CVE-2018-17848 ghsas: - GHSA-4r78-hx75-jjj2 - GHSA-mv93-wvcp-7m7r credits: - '@tr3ee' references: - fix: https://go.dev/cl/159397 - fix: https://go.googlesource.com/net/+/4b62a64f59f73840b9ab79204c94fee61cd1ba2c - report: https://go.dev/issue/27846 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0238.yaml
id: GO-2021-0238 modules: - module: golang.org/x/net versions: - fixed: 0.0.0-20210520170846-37e1c6afe023 vulnerable_at: 0.0.0-20210510120150-4163338589ed packages: - package: golang.org/x/net/html symbols: - inHeadIM derived_symbols: - Parse - ParseFragment - ParseFragmentWithOptions - ParseWithOptions summary: Infinite loop when parsing inputs in golang.org/x/net/html description: |- An attacker can craft an input to ParseFragment that causes it to enter an infinite loop and never return. published: 2022-02-17T17:33:43Z cves: - CVE-2021-33194 ghsas: - GHSA-83g2-8m93-v3w7 credits: - OSS-Fuzz (discovery) - Andrew Thornton (reporter) references: - fix: https://go.dev/cl/311090 - fix: https://go.googlesource.com/net/+/37e1c6afe02340126705deced573a85ab75209d7 - report: https://go.dev/issue/46288 - web: https://groups.google.com/g/golang-announce/c/wPunbCPkWUg review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1989.yaml
id: GO-2023-1989 modules: - module: golang.org/x/image versions: - fixed: 0.10.0 vulnerable_at: 0.9.0 packages: - package: golang.org/x/image/tiff symbols: - newDecoder derived_symbols: - Decode - DecodeConfig summary: Excessive resource consumption in golang.org/x/image/tiff description: |- The TIFF decoder does not place a limit on the size of compressed tile data. A maliciously-crafted image can exploit this to cause a small image (both in terms of pixel width/height, and encoded size) to make the decoder decode large amounts of compressed data, consuming excessive memory and CPU. ghsas: - GHSA-x92r-3vfx-4cv3 credits: - Philippe Antoine (Catena cyber) references: - report: https://go.dev/issue/61582 - fix: https://go.dev/cl/514897 cve_metadata: id: CVE-2023-29408 cwe: 'CWE-770: Allocation of Resources Without Limits or Throttling' references: - https://security.netapp.com/advisory/ntap-20230831-0009/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0537.yaml
id: GO-2022-0537 modules: - module: std versions: - fixed: 1.17.13 - introduced: 1.18.0-0 - fixed: 1.18.5 vulnerable_at: 1.18.4 packages: - package: math/big symbols: - Float.GobDecode - Rat.GobDecode summary: Panic when decoding Float and Rat types in math/big description: |- Decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service. published: 2022-08-01T22:21:06Z credits: - '@catenacyber' references: - fix: https://go.dev/cl/417774 - fix: https://go.googlesource.com/go/+/055113ef364337607e3e72ed7d48df67fde6fc66 - report: https://go.dev/issue/53871 - web: https://groups.google.com/g/golang-announce/c/YqYYG87xB10 cve_metadata: id: CVE-2022-32189 cwe: 'CWE 400: Uncontrolled Resource Consumption' description: |- A too-short encoded message can cause a panic in Float.GobDecode and Rat GobDecode in math/big in Go before 1.17.13 and 1.18.5, potentially allowing a denial of service. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2153.yaml
id: GO-2023-2153 modules: - module: google.golang.org/grpc versions: - fixed: 1.56.3 - introduced: 1.57.0 - fixed: 1.57.1 - introduced: 1.58.0 - fixed: 1.58.3 vulnerable_at: 1.58.2 packages: - package: google.golang.org/grpc/internal/transport symbols: - NewServerTransport - package: google.golang.org/grpc symbols: - Server.initServerWorkers derived_symbols: - NewServer - Server.Serve summary: Denial of service from HTTP/2 Rapid Reset in google.golang.org/grpc description: |- An attacker can send HTTP/2 requests, cancel them, and send subsequent requests. This is valid by the HTTP/2 protocol, but would cause the gRPC-Go server to launch more concurrent method handlers than the configured maximum stream limit, grpc.MaxConcurrentStreams. This results in a denial of service due to resource consumption. ghsas: - GHSA-m425-mq94-257g related: - CVE-2023-44487 references: - web: https://github.com/grpc/grpc-go/pull/6703 - fix: https://github.com/grpc/grpc-go/commit/f2180b4d5403d2210b30b93098eb7da31c05c721 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2857.yaml
id: GO-2024-2857 modules: - module: github.com/grafana/grafana non_go_versions: - introduced: 8.0.0 - fixed: 8.3.10 - introduced: 8.4.0 - fixed: 8.4.10 - introduced: 8.5.0 - fixed: 8.5.9 - introduced: 9.0.0 - fixed: 9.0.3 vulnerable_at: 5.4.5+incompatible summary: Grafana Stored Cross-site Scripting in Unified Alerting in github.com/grafana/grafana cves: - CVE-2022-31097 ghsas: - GHSA-vw7q-p2qg-4m5f unknown_aliases: - BIT-grafana-2022-31097 references: - advisory: https://github.com/grafana/grafana/security/advisories/GHSA-vw7q-p2qg-4m5f - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-31097 - web: https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-5-9 - web: https://grafana.com/docs/grafana/latest/release-notes/release-notes-9-0-3 - web: https://grafana.com/docs/grafana/next/release-notes/release-notes-8-4-10 - web: https://security.netapp.com/advisory/ntap-20220901-0010 source: id: GHSA-vw7q-p2qg-4m5f created: 2024-06-04T14:26:57.952392-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0239.yaml
id: GO-2021-0239 modules: - module: std versions: - fixed: 1.15.13 - introduced: 1.16.0-0 - fixed: 1.16.5 vulnerable_at: 1.16.4 packages: - package: net symbols: - Resolver.LookupAddr - Resolver.LookupCNAME - Resolver.LookupMX - Resolver.LookupNS - Resolver.LookupSRV skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Improper sanitization when resolving values from DNS in net description: |- The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions and their respective methods on the Resolver type may return arbitrary values retrieved from DNS which do not follow the established RFC 1035 rules for domain names. If these names are used without further sanitization, for instance unsafely included in HTML, they may allow for injection of unexpected content. Note that LookupTXT may still return arbitrary values that could require sanitization before further use. published: 2022-02-17T17:33:35Z cves: - CVE-2021-33195 credits: - Philipp Jeitner - Haya Shulman from Fraunhofer SIT references: - fix: https://go.dev/cl/320949 - fix: https://go.googlesource.com/go/+/c89f1224a544cde464fcb86e78ebb0cc97eedba2 - web: https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI - report: https://go.dev/issue/46241 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1031.yaml
id: GO-2022-1031 modules: - module: github.com/labstack/echo/v4 versions: - fixed: 4.9.0 vulnerable_at: 4.8.0 packages: - package: github.com/labstack/echo/v4 symbols: - StaticDirectoryHandler derived_symbols: - Echo.Static - Echo.StaticFS - Group.Static - Group.StaticFS summary: Open redirect in github.com/labstack/echo/v4 description: |- Labstack Echo contains an open redirect vulnerability via the Static Handler component. This vulnerability can be leveraged by attackers to cause a Server-Side Request Forgery (SSRF). cves: - CVE-2022-40083 ghsas: - GHSA-crxj-hrmp-4rwf references: - report: https://github.com/labstack/echo/issues/2259 - fix: https://github.com/labstack/echo/pull/2260 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2863.yaml
id: GO-2024-2863 modules: - module: github.com/wolfi-dev/wolfictl versions: - fixed: 0.16.10 vulnerable_at: 0.16.9 summary: wolfictl leaks GitHub tokens to remote non-GitHub git servers in github.com/wolfi-dev/wolfictl cves: - CVE-2024-35183 ghsas: - GHSA-8fg7-hp93-qhvr references: - advisory: https://github.com/wolfi-dev/wolfictl/security/advisories/GHSA-8fg7-hp93-qhvr - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-35183 - fix: https://github.com/wolfi-dev/wolfictl/commit/0d06e1578300327c212dda26a5ab31d09352b9d0 - fix: https://github.com/wolfi-dev/wolfictl/commit/403e93569f46766b4e26e06cf9cd0cae5ee0c2a2 - web: https://github.com/wolfi-dev/wolfictl/blob/488b53823350caa706de3f01ec0eded9350c7da7/pkg/update/update.go#L143 - web: https://github.com/wolfi-dev/wolfictl/blob/4dd6c95abb4bc0f9306350a8601057bd7a92bded/pkg/update/deps/cleanup.go#L49 - web: https://github.com/wolfi-dev/wolfictl/blob/6d99909f7b1aa23f732d84dad054b02a61f530e6/pkg/git/git.go#L22 source: id: GHSA-8fg7-hp93-qhvr created: 2024-05-17T16:08:41.113015-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2804.yaml
id: GO-2024-2804 modules: - module: github.com/zitadel/zitadel non_go_versions: - fixed: 2.45.7 - introduced: 2.47.0 - fixed: 2.47.10 - introduced: 2.48.0 - fixed: 2.48.5 - introduced: 2.49.0 - fixed: 2.49.5 - introduced: 2.50.0 - fixed: 2.50.3 vulnerable_at: 1.87.5 summary: Zitadel exposing internal database user name and host information in github.com/zitadel/zitadel cves: - CVE-2024-32967 ghsas: - GHSA-q5qj-x2h5-3945 references: - advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-q5qj-x2h5-3945 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32967 - fix: https://github.com/zitadel/zitadel/commit/b918603b576d156a08b90917c14c2d019c82ffc6 - web: https://github.com/zitadel/zitadel/releases/tag/v2.45.7 - web: https://github.com/zitadel/zitadel/releases/tag/v2.46.7 - web: https://github.com/zitadel/zitadel/releases/tag/v2.47.10 - web: https://github.com/zitadel/zitadel/releases/tag/v2.48.5 - web: https://github.com/zitadel/zitadel/releases/tag/v2.49.5 - web: https://github.com/zitadel/zitadel/releases/tag/v2.50.3 source: id: GHSA-q5qj-x2h5-3945 created: 2024-06-04T14:29:03.147386-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2919.yaml
id: GO-2024-2919 modules: - module: github.com/cri-o/cri-o versions: - introduced: 1.28.6 - fixed: 1.28.7 - introduced: 1.29.4 - fixed: 1.29.5 - introduced: 1.30.0 - fixed: 1.30.1 vulnerable_at: 1.30.0 summary: malicious container creates symlink "mtab" on the host External in github.com/cri-o/cri-o cves: - CVE-2024-5154 ghsas: - GHSA-j9hf-98c3-wrm8 references: - advisory: https://github.com/cri-o/cri-o/security/advisories/GHSA-j9hf-98c3-wrm8 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-5154 - web: https://access.redhat.com/errata/RHSA-2024:3676 - web: https://access.redhat.com/errata/RHSA-2024:3700 - web: https://access.redhat.com/security/cve/CVE-2024-5154 - web: https://bugzilla.redhat.com/show_bug.cgi?id=2280190 source: id: GHSA-j9hf-98c3-wrm8 created: 2024-06-26T14:09:29.772592-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2448.yaml
id: GO-2024-2448 modules: - module: github.com/mattermost/mattermost-server versions: - fixed: 8.1.7+incompatible vulnerable_at: 8.1.7-rc3+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - fixed: 8.1.7 vulnerable_at: 8.0.0-20240626184126-817e18414e41 summary: |- Mattermost notified all users in the channel when using WebSockets to respond individually in github.com/mattermost/mattermost-server cves: - CVE-2023-48732 ghsas: - GHSA-q7rx-w656-fwmv unknown_aliases: - BIT-mattermost-2023-48732 - CGA-jhcr-g7wj-9vq2 references: - advisory: https://github.com/advisories/GHSA-q7rx-w656-fwmv - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-48732 - web: https://github.com/mattermost/mattermost/commit/851515be222160bee0a495c0d411056b19ed4111 - web: https://mattermost.com/security-updates source: id: GHSA-q7rx-w656-fwmv created: 2024-06-26T16:10:54.767283-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0241.yaml
id: GO-2021-0241 modules: - module: std versions: - fixed: 1.15.13 - introduced: 1.16.0-0 - fixed: 1.16.5 vulnerable_at: 1.16.4 packages: - package: net/http/httputil symbols: - ReverseProxy.ServeHTTP skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Attacker can drop certain headers in net/http/httputil description: |- ReverseProxy can be made to forward certain hop-by-hop headers, including Connection. If the target of the ReverseProxy is itself a reverse proxy, this lets an attacker drop arbitrary headers, including those set by the ReverseProxy.Director. published: 2022-02-17T17:33:16Z cves: - CVE-2021-33197 credits: - Mattias Grenfeldt (https://grenfeldt.dev) - Asta Olofsson references: - fix: https://go.dev/cl/321929 - fix: https://go.googlesource.com/go/+/950fa11c4cb01a145bb07eeb167d90a1846061b3 - web: https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI - report: https://go.dev/issue/46313 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2119.yaml
id: GO-2023-2119 modules: - module: github.com/consensys/gnark versions: - fixed: 0.9.1 vulnerable_at: 0.9.0 packages: - package: github.com/consensys/gnark/backend/plonk/bls12-377 symbols: - Prove - Verify - package: github.com/consensys/gnark/backend/plonk/bls12-381 symbols: - Prove - Verify - package: github.com/consensys/gnark/backend/plonk/bls24-315 symbols: - Prove - Verify - package: github.com/consensys/gnark/backend/plonk/bls24-317 symbols: - Prove - Verify - package: github.com/consensys/gnark/backend/plonk/bn254 symbols: - Prove - Verify - package: github.com/consensys/gnark/backend/plonk/bw6-633 symbols: - Prove - Verify - package: github.com/consensys/gnark/backend/plonk/bw6-761 symbols: - Prove - Verify summary: Proof forgery due to insufficient randomness in github.com/consensys/gnark description: |- A a third party may derive a valid proof from a valid initial tuple {proof, public_inputs}, corresponding to the same public inputs as the initial proof. This vulnerability is due to randomness being generated using a small part of the scratch memory describing the state, allowing for degrees of freedom in the transcript. Note that the impact is limited to the PlonK verifier smart contract. ghsas: - GHSA-7p92-x423-vwj6 references: - advisory: https://github.com/Consensys/gnark/security/advisories/GHSA-7p92-x423-vwj6 - fix: https://github.com/Consensys/gnark/commit/3421eaa7d544286abf3de8c46282b8d4da6d5da0 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2934.yaml
id: GO-2024-2934 modules: - module: github.com/stacklok/minder versions: - fixed: 0.0.52 vulnerable_at: 0.0.51 summary: Minder affected by denial of service from maliciously configured Git repository in github.com/stacklok/minder cves: - CVE-2024-37904 ghsas: - GHSA-hpcg-xjq5-g666 references: - advisory: https://github.com/stacklok/minder/security/advisories/GHSA-hpcg-xjq5-g666 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37904 - fix: https://github.com/stacklok/minder/commit/35bab8f9a6025eea9e6e3cef6bd80707ac03d2a9 - fix: https://github.com/stacklok/minder/commit/7979b43 - web: https://github.com/stacklok/minder/blob/85985445c8ac3e51f03372e99c7b2f08a6d274aa/internal/providers/git/git.go#L55-L89 - web: https://github.com/stacklok/minder/blob/85985445c8ac3e51f03372e99c7b2f08a6d274aa/internal/providers/git/git.go#L56-L62 source: id: GHSA-hpcg-xjq5-g666 created: 2024-06-27T15:53:59.10909-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1038.yaml
id: GO-2022-1038 modules: - module: std versions: - fixed: 1.18.7 - introduced: 1.19.0-0 - fixed: 1.19.2 vulnerable_at: 1.19.1 packages: - package: net/http/httputil symbols: - ReverseProxy.ServeHTTP summary: Incorrect sanitization of forwarded query parameters in net/http/httputil description: |- Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparsable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparsable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged. credits: - Gal Goldstein (Security Researcher, Oxeye) - Daniel Abeles (Head of Research, Oxeye) references: - report: https://go.dev/issue/54663 - fix: https://go.dev/cl/432976 - web: https://groups.google.com/g/golang-announce/c/xtuG5faxtaU cve_metadata: id: CVE-2022-2880 cwe: 'CWE-444: Inconsistent Interpretation of HTTP Requests' references: - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2688.yaml
id: GO-2024-2688 modules: - module: kubevirt.io/kubevirt unsupported_versions: - last_affected: 1.2.0 vulnerable_at: 1.2.1 summary: KubeVirt NULL pointer dereference flaw in kubevirt.io/kubevirt cves: - CVE-2024-31420 ghsas: - GHSA-vjhf-6xfr-5p9g references: - advisory: https://github.com/advisories/GHSA-vjhf-6xfr-5p9g - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31420 - web: https://access.redhat.com/security/cve/CVE-2024-31420 - web: https://bugzilla.redhat.com/show_bug.cgi?id=2272951 source: id: GHSA-vjhf-6xfr-5p9g created: 2024-06-04T15:36:43.938217-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0171.yaml
id: GO-2022-0171 modules: - module: std versions: - fixed: 1.6.4 - introduced: 1.7.0-0 - fixed: 1.7.4 vulnerable_at: 1.7.3 packages: - package: crypto/x509 goos: - darwin symbols: - FetchPEMRoots - execSecurityRoots skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Mishandled trust preferences for root certificates on Darwin in crypto/x509 description: |- On Darwin, user's trust preferences for root certificates were not honored. If the user had a root certificate loaded in their Keychain that was explicitly not trusted, a Go program would still verify a connection using that root certificate. published: 2022-05-24T20:17:59Z cves: - CVE-2017-1000097 credits: - Xy Ziemba references: - fix: https://go.googlesource.com/go/+/7e5b2e0ec144d5f5b2923a7d5db0b9143f79a35a - report: https://go.dev/issue/18141 - web: https://groups.google.com/g/golang-dev/c/4NdLzS8sls8/m/uIz8QlnIBQAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2940.yaml
id: GO-2024-2940 modules: - module: github.com/drakkan/sftpgo vulnerable_at: 1.2.2 - module: github.com/drakkan/sftpgo/v2 versions: - introduced: 2.2.0 - fixed: 2.6.1 vulnerable_at: 2.6.0 summary: SFTPGo has insufficient access control for password reset in github.com/drakkan/sftpgo cves: - CVE-2024-37897 ghsas: - GHSA-hw5f-6wvv-xcrh references: - advisory: https://github.com/drakkan/sftpgo/security/advisories/GHSA-hw5f-6wvv-xcrh - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37897 - fix: https://github.com/drakkan/sftpgo/commit/1f8ac8bfe16100b0484d6c91e1e8361687324423 - fix: https://github.com/drakkan/sftpgo/commit/3462bba3f41cbc75486474991b9e3ac1b5f1e583 - web: https://github.com/drakkan/sftpgo/releases/tag/v2.6.1 source: id: GHSA-hw5f-6wvv-xcrh created: 2024-06-27T15:53:42.415925-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0021.yaml
id: GO-2020-0021 modules: - module: github.com/gogits/gogs versions: - fixed: 0.5.8 vulnerable_at: 0.5.5 packages: - package: github.com/gogits/gogs symbols: - GetIssues - SearchRepositoryByName - SearchUserByName skip_fix: 'TODO: Revisit this reason (Some dependencies no longer exist)' summary: SQL Injection in github.com/gogits/gogs description: |- Due to improper sanitization of user input, a number of methods are vulnerable to SQL injection if used with user input that has not been sanitized by the caller. published: 2021-04-14T20:04:52Z cves: - CVE-2014-8681 ghsas: - GHSA-mr6h-chqp-p9g2 credits: - Pascal Turbing - Jiahua (Joe) Chen references: - fix: https://github.com/gogs/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8 - web: https://seclists.org/fulldisclosure/2014/Nov/31 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2698.yaml
id: GO-2024-2698 modules: - module: github.com/mholt/archiver vulnerable_at: 2.1.0+incompatible - module: github.com/mholt/archiver/v3 vulnerable_at: 3.5.1 summary: Archiver Path Traversal vulnerability in github.com/mholt/archiver description: |- A flaw was discovered in the mholt/archiver package. This flaw allows an attacker to create a specially crafted tar file, which, when unpacked, may allow access to restricted files or directories. This issue can allow the creation or overwriting of files with the user's or application's privileges using the library. cves: - CVE-2024-0406 ghsas: - GHSA-rhh4-rh7c-7r5v references: - advisory: https://github.com/advisories/GHSA-rhh4-rh7c-7r5v - web: https://access.redhat.com/security/cve/CVE-2024-0406 - web: https://bugzilla.redhat.com/show_bug.cgi?id=2257749 notes: - no known fix source: id: GHSA-rhh4-rh7c-7r5v created: 2024-07-01T16:15:06.574303-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2705.yaml
id: GO-2024-2705 modules: - module: github.com/go-skynet/LocalAI unsupported_versions: - last_affected: 2.7.0 vulnerable_at: 1.40.0 summary: LocalAI cross-site request forgery vulnerability in github.com/go-skynet/LocalAI cves: - CVE-2024-3135 ghsas: - GHSA-jhvf-7c85-3c9g references: - advisory: https://github.com/advisories/GHSA-jhvf-7c85-3c9g - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-3135 - web: https://huntr.com/bounties/7afdc4d3-4b68-45ea-96d0-cf9ed3712ae8 source: id: GHSA-jhvf-7c85-3c9g created: 2024-06-04T15:31:08.697271-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0535.yaml
id: GO-2022-0535 modules: - module: std versions: - fixed: 1.12.16 - introduced: 1.13.0-0 - fixed: 1.13.7 vulnerable_at: 1.13.6 packages: - package: crypto/x509 goos: - windows symbols: - Certificate.systemVerify summary: Certificate validation bypass on Windows in crypto/x509 description: |- A Windows vulnerability allows attackers to spoof valid certificate chains when the system root store is in use. A workaround is present in Go 1.12.6+ and Go 1.13.7+, but affected users should additionally install the Windows security update to protect their system. See https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-0601 for details on the Windows vulnerability. published: 2022-08-01T22:21:17Z cves: - CVE-2020-0601 references: - fix: https://go.dev/cl/215905 - fix: https://go.googlesource.com/go/+/953bc8f391a63adf00bac2515dba62abe8a1e2c2 - report: https://go.dev/issue/36834 - web: https://groups.google.com/g/golang-announce/c/Hsw4mHYc470/m/WJeW5wguEgAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1857.yaml
id: GO-2023-1857 modules: - module: github.com/malfunkt/iprange vulnerable_at: 0.9.0 packages: - package: github.com/malfunkt/iprange symbols: - Parse - ParseList summary: Panic when parsing ranges with invalid masks in github.com/malfunkt/iprange description: Parsing a range with a mask larger than 32 bits causes a panic. ghsas: - GHSA-f99h-w337-mv56 references: - report: https://github.com/malfunkt/iprange/issues/1 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2569.yaml
id: GO-2024-2569 modules: - module: github.com/cilium/cilium versions: - fixed: 1.14.7 vulnerable_at: 1.14.6 summary: Unencrypted traffic between pods when using Wireguard and an external kvstore in github.com/cilium/cilium cves: - CVE-2024-25631 ghsas: - GHSA-x989-52fc-4vr4 unknown_aliases: - BIT-cilium-2024-25631 - BIT-cilium-operator-2024-25631 - BIT-hubble-2024-25631 - BIT-hubble-relay-2024-25631 references: - advisory: https://github.com/cilium/cilium/security/advisories/GHSA-x989-52fc-4vr4 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-25631 - web: https://docs.cilium.io/en/stable/installation/k8s-install-external-etcd/#when-do-i-need-to-use-a-kvstore - web: https://docs.cilium.io/en/stable/security/network/encryption-wireguard/#encryption-wg - web: https://github.com/cilium/cilium/releases/tag/v1.14.7 source: id: GHSA-x989-52fc-4vr4 created: 2024-06-05T13:39:10.852421-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2654.yaml
id: GO-2024-2654 modules: - module: github.com/argoproj/argo-cd/v2 versions: - fixed: 2.8.13 - introduced: 2.9.0 - fixed: 2.9.9 - introduced: 2.10.0 - fixed: 2.10.4 vulnerable_at: 2.10.3 packages: - package: github.com/argoproj/argo-cd/v2/server/application symbols: - NewHandler - newTerminalSession - package: github.com/argoproj/argo-cd/v2/util/session symbols: - expireOldFailedAttempts - SessionManager.updateFailureCount - SessionManager.getFailureCount derived_symbols: - SessionManager.VerifyUsernamePassword summary: Denial of service in github.com/argoproj/argo-cd/v2 description: |- Application may crash due to concurrent writes, leading to a denial of service. An attacker can crash the application continuously, making it impossible for legitimate users to access the service. Authentication is not required in the attack. cves: - CVE-2024-21661 ghsas: - GHSA-6v85-wr92-q4p7 credits: - '@nadava669' - '@todaywasawesome' - '@crenshaw-dev' - '@jannfis' - '@pasha-codefresh' references: - fix: https://github.com/argoproj/argo-cd/commit/2a22e19e06aaf6a1e734443043310a66c234e345 - fix: https://github.com/argoproj/argo-cd/commit/5bbb51ab423f273dda74ab956469843d2db2e208 - fix: https://github.com/argoproj/argo-cd/commit/ce04dc5c6f6e92033221ec6d96b74403b065ca8b - web: https://github.com/argoproj/argo-cd/blob/54601c8fd30b86a4c4b7eb449956264372c8bde0/util/session/sessionmanager.go#L302-L311 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2959.yaml
id: GO-2024-2959 modules: - module: github.com/gofiber/fiber vulnerable_at: 1.14.6 - module: github.com/gofiber/fiber/v2 versions: - fixed: 2.52.5 vulnerable_at: 2.52.4 packages: - package: github.com/gofiber/fiber/v2/middleware/session symbols: - Store.Get - Store.responseCookies summary: Session Middleware Token Injection Vulnerability in github.com/gofiber/fiber cves: - CVE-2024-38513 ghsas: - GHSA-98j2-3j3p-fw2v references: - advisory: https://github.com/gofiber/fiber/security/advisories/GHSA-98j2-3j3p-fw2v - fix: https://github.com/gofiber/fiber/commit/7926e5bf4da03e54f62d27d53229d35b264cba8e source: id: GHSA-98j2-3j3p-fw2v created: 2024-07-02T11:03:15.390979-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2765.yaml
id: GO-2024-2765 modules: - module: kubevirt.io/kubevirt versions: - fixed: 0.26.0 vulnerable_at: 0.26.0-rc.0 summary: Permissions bypass in KubeVirt in kubevirt.io/kubevirt cves: - CVE-2020-1701 ghsas: - GHSA-849r-8wvp-4wwg references: - advisory: https://github.com/advisories/GHSA-849r-8wvp-4wwg - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-1701 - web: https://bugzilla.redhat.com/show_bug.cgi?id=1792092 - web: https://github.com/kubevirt/containerized-data-importer/pull/1098 - web: https://github.com/kubevirt/kubevirt/commit/9efa8d7388d4fe1c698c6980aa7122c06bd141be - web: https://github.com/kubevirt/kubevirt/issues/2967 - web: https://github.com/kubevirt/kubevirt/pull/3001 source: id: GHSA-849r-8wvp-4wwg created: 2024-05-17T16:11:56.381692-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0038.yaml
id: GO-2020-0038 modules: - module: github.com/pion/dtls versions: - fixed: 1.5.2 vulnerable_at: 1.5.1 packages: - package: github.com/pion/dtls symbols: - Conn.handleIncomingPacket derived_symbols: - Client - Dial - Listener.Accept - Resume - Server summary: Improper authentication in github.com/pion/dtls description: |- Due to improper verification of packets, unencrypted packets containing application data are accepted after the initial handshake. This allows an attacker to inject arbitrary data which the client/server believes was encrypted, despite not knowing the session key. published: 2021-04-14T20:04:52Z cves: - CVE-2019-20786 ghsas: - GHSA-7gfg-6934-mqq2 references: - fix: https://github.com/pion/dtls/pull/128 - fix: https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0 - web: https://www.usenix.org/system/files/sec20fall_fiterau-brostean_prepub.pdf review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0701.yaml
id: GO-2022-0701 modules: - module: k8s.io/kubernetes versions: - fixed: 1.1.1 vulnerable_at: 1.1.0 packages: - package: k8s.io/kubernetes/pkg/api/rest symbols: - BeforeCreate skip_fix: 'TODO: Revisit this reason (Dependency github.com/docker/docker/pkg/units no longer exists)' - package: k8s.io/kubernetes/pkg/registry/generic/etcd symbols: - NamespaceKeyFunc skip_fix: 'TODO: Revisit this reason (Dependency github.com/docker/docker/pkg/units no longer exists)' - package: k8s.io/kubernetes/pkg/api/storage symbols: - NamespaceKeyFunc - NoNamespaceKeyFunc skip_fix: 'TODO: Revisit this reason (Dependency github.com/docker/docker/pkg/units no longer exists)' - package: k8s.io/kubernetes/pkg/registry/namespace/etcd symbols: - NewREST skip_fix: 'TODO: Revisit this reason (Dependency github.com/docker/docker/pkg/units no longer exists)' - package: k8s.io/kubernetes/pkg/registry/node/etcd symbols: - NewREST skip_fix: 'TODO: Revisit this reason (Dependency github.com/docker/docker/pkg/units no longer exists)' - package: k8s.io/kubernetes/pkg/registry/persistentvolume/etcd symbols: - NewREST skip_fix: 'TODO: Revisit this reason (Dependency github.com/docker/docker/pkg/units no longer exists)' summary: Directory traversal in k8s.io/kubernetes description: |- Crafted object type names can cause directory traversal in Kubernetes. Object names are not validated before being passed to etcd. This allows attackers to write arbitrary files via a crafted object name, hence causing directory traversal vulnerability in Kubernetes, as used in Red Hat OpenShift Enterprise 3.0. published: 2022-02-15T01:57:18Z cves: - CVE-2015-5305 ghsas: - GHSA-jp32-vmm6-3vf5 credits: - liggitt (Jordan Liggitt) references: - fix: https://github.com/kubernetes/kubernetes/pull/16381 - fix: https://github.com/kubernetes/kubernetes/commit/37f730f68c7f06e060f90714439bfb0dbb2df5e7 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2606.yaml
id: GO-2024-2606 modules: - module: github.com/jackc/pgproto3/v2 versions: - fixed: 2.3.3 vulnerable_at: 2.3.2 packages: - package: github.com/jackc/pgproto3/v2 symbols: - CloseComplete.Encode - AuthenticationSASLFinal.Encode - Terminate.Encode - NotificationResponse.Encode - AuthenticationGSSContinue.Encode - DataRow.Encode - CopyInResponse.Encode - FunctionCall.Encode - BackendKeyData.Encode - Query.Encode - CancelRequest.Encode - ParameterStatus.Encode - BindComplete.Encode - CopyBothResponse.Encode - CopyData.Encode - CopyOutResponse.Encode - AuthenticationGSS.Encode - Parse.Encode - PasswordMessage.Encode - AuthenticationCleartextPassword.Encode - ErrorResponse.Encode - SASLInitialResponse.Encode - Execute.Encode - FunctionCallResponse.Encode - ReadyForQuery.Encode - AuthenticationOk.Encode - SSLRequest.Encode - CopyDone.Encode - AuthenticationMD5Password.Encode - ParseComplete.Encode - EmptyQueryResponse.Encode - CommandComplete.Encode - AuthenticationSASL.Encode - NoData.Encode - Flush.Encode - GSSEncRequest.Encode - StartupMessage.Encode - Backend.Send - GSSResponse.Encode - CopyFail.Encode - Bind.Encode - AuthenticationSASLContinue.Encode - NoticeResponse.Encode - SASLResponse.Encode - Frontend.Send - Sync.Encode - ErrorResponse.marshalBinary - RowDescription.Encode - Close.Encode - ParameterDescription.Encode - PortalSuspended.Encode - Describe.Encode - package: github.com/jackc/pgproto3/v2/example/pgfortune symbols: - PgFortuneBackend.handleStartup - PgFortuneBackend.Run derived_symbols: - main fix_links: - https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007 - module: github.com/jackc/pgx/v4 versions: - fixed: 4.18.2 vulnerable_at: 4.18.1 packages: - package: github.com/jackc/pgx/v4/internal/sanitize symbols: - Query.Sanitize derived_symbols: - SanitizeSQL fix_links: - https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df, - module: github.com/jackc/pgx/v5 versions: - introduced: 5.0.0 - fixed: 5.5.4 vulnerable_at: 5.5.3 packages: - package: github.com/jackc/pgx/v5/internal/sanitize symbols: - Query.Sanitize derived_symbols: - SanitizeSQL - package: github.com/jackc/pgx/v5/pgproto3 symbols: - Frontend.SendSync - Backend.Flush - Frontend.SendDescribe - Parse.Encode - CopyBothResponse.Encode - CopyOutResponse.Encode - GSSResponse.Encode - DataRow.Encode - EmptyQueryResponse.Encode - PortalSuspended.Encode - Close.Encode - SASLInitialResponse.Encode - ReadyForQuery.Encode - Query.Encode - CopyFail.Encode - ParameterDescription.Encode - NoData.Encode - SSLRequest.Encode - AuthenticationMD5Password.Encode - Flush.Encode - StartupMessage.Encode - Frontend.SendParse - CloseComplete.Encode - Backend.Send - CopyInResponse.Encode - GSSEncRequest.Encode - Frontend.Send - Describe.Encode - AuthenticationOk.Encode - FunctionCallResponse.Encode - Bind.Encode - Frontend.SendClose - Terminate.Encode - Frontend.SendExecute - Sync.Encode - Execute.Encode - AuthenticationGSSContinue.Encode - FunctionCall.Encode - CancelRequest.Encode - AuthenticationSASLFinal.Encode - BackendKeyData.Encode - Frontend.Flush - NoticeResponse.Encode - AuthenticationSASL.Encode - Frontend.SendBind - AuthenticationSASLContinue.Encode - BindComplete.Encode - PasswordMessage.Encode - NotificationResponse.Encode - ErrorResponse.Encode - CopyData.Encode - ErrorResponse.marshalBinary - Frontend.SendQuery - ParameterStatus.Encode - AuthenticationCleartextPassword.Encode - AuthenticationGSS.Encode - RowDescription.Encode - CopyDone.Encode - CommandComplete.Encode - SASLResponse.Encode - ParseComplete.Encode derived_symbols: - Frontend.SendUnbufferedEncodedCopyData - package: github.com/jackc/pgx/v5/pgconn symbols: - Batch.ExecParams - PgConn.ExecBatch - Batch.ExecPrepared derived_symbols: - Connect - ConnectConfig - ConnectWithOptions - MultiResultReader.Close - MultiResultReader.NextResult - MultiResultReader.ReadAll - PgConn.CheckConn - PgConn.Close - PgConn.CopyFrom - PgConn.CopyTo - PgConn.Deallocate - PgConn.Exec - PgConn.ExecParams - PgConn.ExecPrepared - PgConn.Ping - PgConn.Prepare - PgConn.ReceiveMessage - PgConn.SyncConn - PgConn.WaitForNotification - Pipeline.Close - Pipeline.Flush - Pipeline.GetResults - Pipeline.SendDeallocate - Pipeline.SendPrepare - Pipeline.SendQueryParams - Pipeline.SendQueryPrepared - Pipeline.Sync - ResultReader.Close - ResultReader.NextRow - ResultReader.Read - ValidateConnectTargetSessionAttrsPreferStandby - ValidateConnectTargetSessionAttrsPrimary - ValidateConnectTargetSessionAttrsReadOnly - ValidateConnectTargetSessionAttrsReadWrite - ValidateConnectTargetSessionAttrsStandby - package: github.com/jackc/pgx/v5/pgproto3/example/pgfortune symbols: - PgFortuneBackend.handleStartup - PgFortuneBackend.Run derived_symbols: - main fix_links: - https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8 - https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4 summary: SQL injection in github.com/jackc/pgproto3 and github.com/jackc/pgx description: |- An integer overflow in the calculated message size of a query or bind message could allow a single large message to be sent as multiple messages under the attacker's control. This could lead to SQL injection if an attacker can cause a single query or bind message to exceed 4 GB in size. cves: - CVE-2024-27304 ghsas: - GHSA-mrww-27vc-gghv - GHSA-7jwh-3vrq-q3m8 credits: - paul-gerste-sonarsource references: - advisory: https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv - fix: https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007 - fix: https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4 - fix: https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8 - fix: https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2114.yaml
id: GO-2023-2114 modules: - module: github.com/crewjam/saml versions: - fixed: 0.4.14 vulnerable_at: 0.4.13 packages: - package: github.com/crewjam/saml summary: |- Cross-site scripting via missing binding syntax validation in github.com/crewjam/saml description: |- The package does not validate the ACS Location URI according to the SAML binding being parsed. If abused, this flaw allows attackers to register malicious Service Providers at the IdP and inject Javascript in the ACS endpoint definition, achieving Cross-Site-Scripting (XSS) in the IdP context during the redirection at the end of a SAML SSO Flow. Consequently, an attacker may perform any authenticated action as the victim once the victim's browser loads the SAML IdP initiated SSO link for the malicious service provider. cves: - CVE-2023-45683 ghsas: - GHSA-267v-3v32-g6q5 credits: - Francesco Lacerenza from Doyensec references: - advisory: https://github.com/crewjam/saml/security/advisories/GHSA-267v-3v32-g6q5 - fix: https://github.com/crewjam/saml/commit/b07b16cf83c4171d16da4d85608cb827f183cd79 notes: - The fix introduced functions Endpoint.UnmarshalXML and IndexedEndpoint.UnmarshalXML, but we currently do not have a way to mark uses of xml.Unmarshal on a certain type as vulnerable. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0274.yaml
id: GO-2022-0274 modules: - module: github.com/opencontainers/runc versions: - introduced: 1.0.1-0.20211012131345-9c444070ec7b - fixed: 1.1.0 vulnerable_at: 1.0.1-0.20211012131345-9c444070ec7b packages: - package: github.com/opencontainers/runc/libcontainer symbols: - Bytemsg.Serialize derived_symbols: - LinuxFactory.StartInitialization - linuxContainer.Run - linuxContainer.Start - linuxStandardInit.Init summary: Namespace restriction bypass in github.com/opencontainers/runc description: |- An attacker with partial control over the bind mount sources of a new container can bypass namespace restrictions. published: 2022-07-15T23:08:20Z cves: - CVE-2021-43784 ghsas: - GHSA-v95c-p5hm-xq8f references: - fix: https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed - web: https://github.com/opencontainers/runc/commit/dde509df4e28cec33b3c99c6cda3d4fd5beafc77 - web: https://bugs.chromium.org/p/project-zero/issues/detail?id=2241 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2775.yaml
id: GO-2024-2775 modules: - module: github.com/IBAX-io/go-ibax versions: - fixed: 1.4.2 vulnerable_at: 1.4.0 summary: IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax cves: - CVE-2022-3801 ghsas: - GHSA-m738-584h-26p6 references: - advisory: https://github.com/advisories/GHSA-m738-584h-26p6 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-3801 - fix: https://github.com/IBAX-io/go-ibax/commit/b0183d8e550836dc50282ee74ff421ee41b25a37 - report: https://github.com/IBAX-io/go-ibax/issues/2062 - web: https://vuldb.com/?id.212637 source: id: GHSA-m738-584h-26p6 created: 2024-06-04T17:59:22.590889-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2696.yaml
id: GO-2024-2696 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 9.3.0+incompatible - fixed: 9.3.3+incompatible - introduced: 9.4.0+incompatible - fixed: 9.4.4+incompatible - introduced: 9.5.0+incompatible - fixed: 9.5.2+incompatible vulnerable_at: 9.5.1+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - introduced: 8.1.0 - fixed: 8.1.11 vulnerable_at: 8.0.0-20240626145722-59998b0b8473 summary: Mattermost fails to authenticate the source of certain types of post actions in github.com/mattermost/mattermost-server cves: - CVE-2024-2447 ghsas: - GHSA-wp43-vprh-c3w5 references: - advisory: https://github.com/advisories/GHSA-wp43-vprh-c3w5 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-2447 - web: https://mattermost.com/security-updates source: id: GHSA-wp43-vprh-c3w5 created: 2024-06-26T13:59:50.842034-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0086.yaml
id: GO-2021-0086 modules: - module: github.com/documize/community versions: - fixed: 1.76.3-0.20191119114751-a4384210d4d0 vulnerable_at: 1.76.3-0.20191115182156-68824912016c packages: - package: github.com/documize/community/domain/section/markdown symbols: - Provider.Render summary: Cross-site scripting in github.com/documize/community description: |- HTML content in markdown is not sanitized during rendering, possibly allowing XSS if used to render untrusted user input. published: 2021-04-14T20:04:52Z cves: - CVE-2019-19619 ghsas: - GHSA-wmwp-pggc-h4mj references: - fix: https://github.com/documize/community/commit/a4384210d4d0d6b18e6fdb7e155de96d4a1cf9f3 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2811.yaml
id: GO-2024-2811 modules: - module: github.com/piraeusdatastore/piraeus-operator vulnerable_at: 1.10.9 - module: github.com/piraeusdatastore/piraeus-operator/v2 unsupported_versions: - last_affected: 2.5.0 vulnerable_at: 2.5.1 summary: piraeus-operator allows attacker to impersonate service account in github.com/piraeusdatastore/piraeus-operator cves: - CVE-2024-33398 ghsas: - GHSA-6fg2-hvj9-832f references: - advisory: https://github.com/advisories/GHSA-6fg2-hvj9-832f - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-33398 - web: https://gist.github.com/HouqiyuA/d0c11fae5ba4789946ae33175d0f9edb - web: https://github.com/HouqiyuA/k8s-rbac-poc - web: https://piraeus.io source: id: GHSA-6fg2-hvj9-832f created: 2024-06-26T14:06:22.393269-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2915.yaml
id: GO-2024-2915 modules: - module: github.com/goharbor/harbor versions: - fixed: 2.8.5+incompatible - introduced: 2.9.0+incompatible - fixed: 2.9.3+incompatible - introduced: 2.10.0+incompatible - fixed: 2.10.1+incompatible vulnerable_at: 2.10.1-rc1+incompatible summary: Open Redirect URL in Harbor in github.com/goharbor/harbor cves: - CVE-2024-22244 ghsas: - GHSA-5757-v49g-f6r7 references: - advisory: https://github.com/goharbor/harbor/security/advisories/GHSA-5757-v49g-f6r7 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-22244 source: id: GHSA-5757-v49g-f6r7 created: 2024-06-13T12:05:47.096437-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2490.yaml
id: GO-2024-2490 modules: - module: github.com/anchore/stereoscope versions: - fixed: 0.0.1 vulnerable_at: 0.0.0-20240118133533-eb656fc71793 packages: - package: github.com/anchore/stereoscope/pkg/file symbols: - UntarToDirectory fix_links: - https://github.com/anchore/stereoscope/commit/09dacab4d9ee65ee8bc7af8ebf4aa7b5aaa36204 summary: Path traversal in github.com/anchore/stereoscope description: |- It is possible to craft an OCI tar archive that, when stereoscope attempts to unarchive the contents, will result in writing to paths outside of the unarchive temporary directory. cves: - CVE-2024-24579 ghsas: - GHSA-hpxr-w9w7-g4gv credits: - '@wagoodman' - '@joshbressers' - '@nurmi' references: - advisory: https://github.com/anchore/stereoscope/security/advisories/GHSA-hpxr-w9w7-g4gv - fix: https://github.com/anchore/stereoscope/commit/09dacab4d9ee65ee8bc7af8ebf4aa7b5aaa36204 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1547.yaml
id: GO-2023-1547 modules: - module: helm.sh/helm/v3 versions: - fixed: 3.11.1 vulnerable_at: 3.11.0 packages: - package: helm.sh/helm/v3/cmd/helm symbols: - addInstallFlags - newUpgradeCmd derived_symbols: - main - package: helm.sh/helm/v3/pkg/action symbols: - Configuration.renderResources - Install.RunWithContext - Upgrade.prepareUpgrade derived_symbols: - Install.Run - Lint.Run - Upgrade.Run - Upgrade.RunWithContext - package: helm.sh/helm/v3/pkg/engine symbols: - Engine.initFunMap derived_symbols: - Engine.Render - Render - RenderWithClient summary: Information disclosure in helm.sh/helm/v3 description: |- An information disclosure vulnerability exists in the getHostByName template function. The function getHostByName is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with "helm install|upgrade|template" or when the Helm SDK is used to render a chart. Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject getHostByName into a chart in order to disclose values to a malicious DNS server. cves: - CVE-2023-25165 ghsas: - GHSA-pwcw-6f5g-gxf8 credits: - Philipp Stehle of SAP references: - advisory: https://github.com/helm/helm/security/advisories/GHSA-pwcw-6f5g-gxf8 - fix: https://github.com/helm/helm/commit/293b50c65d4d56187cd4e2f390f0ada46b4c4737 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0523.yaml
id: GO-2022-0523 modules: - module: std versions: - fixed: 1.17.12 - introduced: 1.18.0-0 - fixed: 1.18.4 vulnerable_at: 1.18.3 packages: - package: encoding/xml symbols: - Decoder.DecodeElement - Decoder.unmarshal - Decoder.unmarshalPath summary: Stack exhaustion when unmarshaling certain documents in encoding/xml description: |- Unmarshaling an XML document into a Go struct which has a nested field that uses the 'any' field tag can panic due to stack exhaustion. published: 2022-07-20T20:52:06Z references: - fix: https://go.dev/cl/417061 - fix: https://go.googlesource.com/go/+/c4c1993fd2a5b26fe45c09592af6d3388a3b2e08 - report: https://go.dev/issue/53611 - web: https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE cve_metadata: id: CVE-2022-30633 cwe: 'CWE-674: Uncontrolled Recursion' description: |- Uncontrolled recursion in Unmarshal in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via unmarshalling an XML document into a Go struct which has a nested field that uses the 'any' field tag. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2780.yaml
id: GO-2024-2780 modules: - module: k8s.io/kubernetes versions: - introduced: 1.13.0 - fixed: 1.13.7 - introduced: 1.14.0 - fixed: 1.14.3 vulnerable_at: 1.14.3-beta.0 summary: Kubelet Incorrect Privilege Assignment in k8s.io/kubernetes cves: - CVE-2019-11245 ghsas: - GHSA-r76g-g87f-vw8f references: - advisory: https://github.com/advisories/GHSA-r76g-g87f-vw8f - advisory: https://nvd.nist.gov/vuln/detail/CVE-2019-11245 - web: https://bugzilla.redhat.com/show_bug.cgi?id=1715726 - web: https://github.com/kubernetes/kubernetes/issues/78308 - web: https://github.com/kubernetes/kubernetes/pull/76665 - web: https://github.com/kubernetes/kubernetes/pull/76665/commits/26e3c8674e66f0d10170d34f5445f0aed207387f - web: https://security.netapp.com/advisory/ntap-20190919-0003 source: id: GHSA-r76g-g87f-vw8f created: 2024-06-07T11:26:55.945196-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2515.yaml
id: GO-2024-2515 modules: - module: github.com/grafana/grafana non_go_versions: - fixed: 7.0.0 vulnerable_at: 5.4.5+incompatible summary: Grafana XSS via the OpenTSDB datasource in github.com/grafana/grafana cves: - CVE-2020-13430 ghsas: - GHSA-7m2x-qhrq-rp8h unknown_aliases: - BIT-grafana-2020-13430 references: - advisory: https://github.com/advisories/GHSA-7m2x-qhrq-rp8h - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-13430 - fix: https://github.com/grafana/grafana/pull/24539 - web: https://github.com/grafana/grafana/releases/tag/v7.0.0 - web: https://security.netapp.com/advisory/ntap-20200528-0003 source: id: GHSA-7m2x-qhrq-rp8h created: 2024-06-14T11:39:28.904078-04:00 review_status: UNREVIEWED unexcluded: NOT_IMPORTABLE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2755.yaml
id: GO-2024-2755 modules: - module: k8s.io/kubernetes versions: - fixed: 1.19.3 vulnerable_at: 1.19.3-rc.0 summary: Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes cves: - CVE-2020-8563 ghsas: - GHSA-5xfg-wv98-264m references: - advisory: https://github.com/advisories/GHSA-5xfg-wv98-264m - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-8563 - web: https://bugzilla.redhat.com/show_bug.cgi?id=1886635 - web: https://github.com/kubernetes/kubernetes/issues/95621 - web: https://github.com/kubernetes/kubernetes/pull/95236 - web: https://github.com/kubernetes/kubernetes/pull/95236/commits/247f6dd09299bc7893c1e0affea11c0255025b96 - web: https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk - web: https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ - web: https://security.netapp.com/advisory/ntap-20210122-0006 source: id: GHSA-5xfg-wv98-264m created: 2024-06-04T17:59:43.631502-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2812.yaml
id: GO-2024-2812 modules: - module: github.com/jub0bs/fcors versions: - fixed: 0.9.0 vulnerable_at: 0.8.0 packages: - package: github.com/jub0bs/fcors/internal/radix symbols: - splitRight - Tree.Insert - node.add - lengthOfCommonSuffix - lastByteIn - Tree.Contains summary: Some CORS middleware allow untrusted origins in github.com/jub0bs/fcors description: |- Some CORS middleware (more specifically those created by specifying two or more origin patterns whose hosts share a proper suffix) incorrectly allow some untrusted origins, thereby opening the door to cross-origin attacks from the untrusted origins in question. For example, specifying origin patterns "https://foo.com" and "https://bar.com" (in that order) would yield a middleware that would incorrectly allow untrusted origin "https://barfoo.com". ghsas: - GHSA-v84h-653v-4pq9 related: - GHSA-vhxv-fg4m-p2w8 references: - advisory: https://github.com/jub0bs/fcors/security/advisories/GHSA-v84h-653v-4pq9 - fix: https://github.com/jub0bs/fcors/commit/b5dcb889a49def37d7d9c25deb7135f4eb45625e source: id: GHSA-v84h-653v-4pq9 created: 2024-05-20T16:46:53.091159-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2472.yaml
id: GO-2024-2472 modules: - module: github.com/notaryproject/notation unsupported_versions: - last_affected: 1.0.0 vulnerable_at: 1.1.1 summary: |- Go package github.com/notaryproject/notation configured with permissive trust policies potentially susceptible to rollback attack from compromised registry cves: - CVE-2024-23332 ghsas: - GHSA-57wx-m636-g3g8 references: - advisory: https://github.com/notaryproject/specifications/security/advisories/GHSA-57wx-m636-g3g8 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23332 - web: https://github.com/notaryproject/specifications/commit/cdabdd1042de2999c685fa5d422a785ded9c983a source: id: GHSA-57wx-m636-g3g8 created: 2024-06-14T11:36:23.175793-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2604.yaml
id: GO-2024-2604 modules: - module: github.com/zeromicro/go-zero versions: - fixed: 1.4.4 vulnerable_at: 1.4.3 packages: - package: github.com/zeromicro/go-zero/rest/internal/cors symbols: - isOriginAllowed summary: CORS Filter bypass in github.com/zeromicro/go-zero description: |- The CORS Filter feature in go-zero allows users to specify an array of domains allowed in the CORS policy. However, the isOriginAllowed function uses strings.HasSuffix to check the origin, which can lead to a bypass via a domain like "evil-victim.com". This vulnerability is capable of breaking CORS policy and thus allowing any page to make requests and retrieve data on behalf of other users. cves: - CVE-2024-27302 ghsas: - GHSA-fgxv-gw55-r5fq credits: - cokeBeer references: - advisory: https://github.com/zeromicro/go-zero/security/advisories/GHSA-fgxv-gw55-r5fq - fix: https://github.com/zeromicro/go-zero/commit/d9d79e930dff6218a873f4f02115df61c38b15db review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2102.yaml
id: GO-2023-2102 modules: - module: std versions: - fixed: 1.20.10 - introduced: 1.21.0-0 - fixed: 1.21.3 vulnerable_at: 1.21.2 packages: - package: net/http symbols: - http2serverConn.serve - http2serverConn.processHeaders - http2serverConn.upgradeRequest - http2serverConn.runHandler derived_symbols: - ListenAndServe - ListenAndServeTLS - Serve - ServeTLS - Server.ListenAndServe - Server.ListenAndServeTLS - Server.Serve - Server.ServeTLS - http2Server.ServeConn - module: golang.org/x/net versions: - fixed: 0.17.0 vulnerable_at: 0.16.0 packages: - package: golang.org/x/net/http2 symbols: - serverConn.serve - serverConn.processHeaders - serverConn.upgradeRequest - serverConn.runHandler derived_symbols: - Server.ServeConn summary: HTTP/2 rapid reset can cause excessive work in net/http description: |- A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function. ghsas: - GHSA-4374-p667-p6c8 related: - CVE-2023-44487 references: - report: https://go.dev/issue/63417 - fix: https://go.dev/cl/534215 - fix: https://go.dev/cl/534235 - web: https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ cve_metadata: id: CVE-2023-39325 cwe: 'CWE-400: Uncontrolled Resource Consumption' references: - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/ - https://security.netapp.com/advisory/ntap-20231110-0008/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXGWPQOJ3JNDW2XIYKIVJ7N7QUIFNM2Q/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZQIELEIRSZUYTFFH5KTH2YJ4IIQG2KE/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QF5QSYAOPDOWLY6DUHID56Q4HQFYB45I/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XTNLSL44Y5FB6JWADSZH6DCV4JJAAEQY/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ECRC75BQJP6FJN2L7KCKYZW4DSBD7QSD/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRKEXKANQ7BKJW2YTAMP625LJUJZLJ4P/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2BBIDR2ZMB3X5BC7SR4SLQMHRMVPY6L/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTT7DG3QOF5ZNJLUGHDNLRUIN6OWZARP/ - https://security.gentoo.org/glsa/202311-09 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SZN67IL7HMGMNAVLOTIXLIHUDXZK4LH/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NG7IMPL55MVWU3LCI4JQJT3K2U5CHDV7/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSY7SXFFTPZFWDM6XELSDSHZLVW3AHK7/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WCNCBYKZXLDFGAJUB7ZP5VLC3YTHJNVH/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVZDNSMVDAQJ64LJC5I5U5LDM5753647/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZSVEMQV5ROY5YW5QE3I57HT3ITWG5GCV/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3OVW5V2DM5K5IC3H7O42YDUGNJ74J35O/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZQYOOKHQDQ57LV2IAG6NRFOVXKHJJ3Z/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RSKA2II6QTD4YUKUNDVJQSRYSFC4VFR/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FTMJ3NJIDAZFWJQQSP3L22MUFJ3UP2PT/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPWCNYB5PQ5PCVZ4NJT6G56ZYFZ5QBU6/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LZSWTV4NV4SNQARNXG5T6LRHP26EW2/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PJCUNGIQDUMZ4Z6HWVYIMR66A35F5S74/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5E5JSJBZLYXOTZWXHJKRVCIXIHVWKJ6/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJWHBLVZDM5KQSDFRBFRKU5KSSOLIRQ4/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WJ4QVX2AMUJ2F2S27POOAHRC4K3CHU4/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ODBY7RVMGZCBSTWF2OZGIZS57FNFUL67/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXOU2JZUBEBP7GBKAYIJRPRBZSJCD7ST/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2495.yaml
id: GO-2024-2495 modules: - module: github.com/apache/servicecomb-service-center non_go_versions: - fixed: 2.2.0 vulnerable_at: 1.4.8 summary: Apache ServiceComb Service-Center Server-Side Request Forgery vulnerability in github.com/apache/servicecomb-service-center cves: - CVE-2023-44313 ghsas: - GHSA-9xc9-xq7w-vpcr references: - advisory: https://github.com/advisories/GHSA-9xc9-xq7w-vpcr - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-44313 - web: http://www.openwall.com/lists/oss-security/2024/01/31/4 - web: https://lists.apache.org/thread/kxovd455o9h4f2v811hcov2qknbwld5r source: id: GHSA-9xc9-xq7w-vpcr created: 2024-06-14T11:37:55.379016-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2480.yaml
id: GO-2024-2480 modules: - module: github.com/0xJacky/Nginx-UI non_go_versions: - fixed: 2.0.0-beta.12 vulnerable_at: 1.9.9 summary: |- Nginx-UI vulnerable to authenticated RCE through injecting into the application config via CRLF in github.com/0xJacky/Nginx-UI cves: - CVE-2024-23828 ghsas: - GHSA-qcjq-7f7v-pvc8 references: - advisory: https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-qcjq-7f7v-pvc8 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23828 - web: https://github.com/0xJacky/nginx-ui/commit/d70e37c8575e25b3da7203ff06da5e16c77a42d1 source: id: GHSA-qcjq-7f7v-pvc8 created: 2024-06-14T11:36:54.518439-04:00 review_status: UNREVIEWED unexcluded: NOT_IMPORTABLE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0191.yaml
id: GO-2022-0191 modules: - module: std versions: - fixed: 1.10.6 - introduced: 1.11.0-0 - fixed: 1.11.3 vulnerable_at: 1.11.2 packages: - package: crypto/x509 symbols: - CertPool.findVerifiedParents - Certificate.buildChains summary: Denial of service in chain verification in crypto/x509 description: |- The crypto/x509 package does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients verifying certificates are affected. published: 2022-07-15T23:03:26Z cves: - CVE-2018-16875 credits: - Netflix references: - fix: https://go.dev/cl/154105 - fix: https://go.googlesource.com/go/+/770130659b6fb2acf271476579a3644e093dda7f - report: https://go.dev/issue/29233 - web: https://groups.google.com/g/golang-announce/c/Kw31K8G7Fi0 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2939.yaml
id: GO-2024-2939 modules: - module: github.com/authzed/spicedb versions: - fixed: 1.33.1 vulnerable_at: 1.33.0 summary: SpiceDB exclusions can result in no permission returned when permission expected in github.com/authzed/spicedb cves: - CVE-2024-38361 ghsas: - GHSA-grjv-gjgr-66g2 unknown_aliases: - CGA-pfrr-qxjv-xmf4 references: - advisory: https://github.com/authzed/spicedb/security/advisories/GHSA-grjv-gjgr-66g2 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-38361 - fix: https://github.com/authzed/spicedb/commit/ecef31d2b266fde17eb2c3415e2ec4ceff96fbeb source: id: GHSA-grjv-gjgr-66g2 created: 2024-06-27T15:53:47.71938-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0228.yaml
id: GO-2021-0228 modules: - module: github.com/unknwon/cae versions: - fixed: 1.0.1 vulnerable_at: 1.0.0 packages: - package: github.com/unknwon/cae/tz symbols: - TzArchive.syncFiles - TzArchive.ExtractToFunc derived_symbols: - Create - ExtractTo - Open - OpenFile - TzArchive.Close - TzArchive.ExtractTo - TzArchive.Flush - TzArchive.Open - package: github.com/unknwon/cae/zip symbols: - ZipArchive.Open - ZipArchive.ExtractToFunc derived_symbols: - Create - ExtractTo - ExtractToFunc - Open - OpenFile - ZipArchive.Close - ZipArchive.ExtractTo - ZipArchive.Flush summary: Path traversal in github.com/unknwon/cae description: |- The ExtractTo function doesn't securely escape file paths in zip archives which include leading or non-leading "..". This allows an attacker to add or replace files system-wide. published: 2022-01-14T17:30:28Z cves: - CVE-2020-7664 ghsas: - GHSA-vpx7-vm66-qx8r credits: - Georgios Gkitsas of Snyk Security Team references: - fix: https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11 - web: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAEZIP-570383 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0217.yaml
id: GO-2022-0217 modules: - module: std versions: - fixed: 1.10.8 - introduced: 1.11.0-0 - fixed: 1.11.5 vulnerable_at: 1.11.4 packages: - package: crypto/elliptic symbols: - curve.doubleJacobian skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Denial of service affecting P-521 and P-384 curves in crypto/elliptic description: |- A DoS vulnerability in the crypto/elliptic implementations of the P-521 and P-384 elliptic curves may let an attacker craft inputs that consume excessive amounts of CPU. These inputs might be delivered via TLS handshakes, X.509 certificates, JWT tokens, ECDH shares or ECDSA signatures. In some cases, if an ECDH private key is reused more than once, the attack can also lead to key recovery. published: 2022-05-24T15:21:01Z cves: - CVE-2019-6486 credits: - Wycheproof Project references: - fix: https://go.dev/cl/159218 - fix: https://go.googlesource.com/go/+/193c16a3648b8670a762e925b6ac6e074f468a20 - report: https://go.dev/issue/29903 - web: https://groups.google.com/g/golang-announce/c/mVeX35iXuSw review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2726.yaml
id: GO-2024-2726 modules: - module: github.com/traefik/traefik vulnerable_at: 1.7.34 - module: github.com/traefik/traefik/v2 versions: - fixed: 2.11.2 vulnerable_at: 2.11.1 - module: github.com/traefik/traefik/v3 versions: - introduced: 3.0.0-rc1 - fixed: 3.0.0-rc5 vulnerable_at: 3.0.0-rc4 summary: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik ghsas: - GHSA-7f4j-64p6-5h5v references: - advisory: https://github.com/traefik/traefik/security/advisories/GHSA-7f4j-64p6-5h5v - web: https://github.com/traefik/traefik/releases/tag/v2.11.2 - web: https://github.com/traefik/traefik/releases/tag/v3.0.0-rc5 source: id: GHSA-7f4j-64p6-5h5v created: 2024-06-26T14:01:00.948687-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0243.yaml
id: GO-2021-0243 modules: - module: std versions: - fixed: 1.15.14 - introduced: 1.16.0-0 - fixed: 1.16.6 vulnerable_at: 1.16.5 packages: - package: crypto/tls symbols: - rsaKeyAgreement.generateClientKeyExchange skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Panic on certain certificates in crypto/tls description: |- crypto/tls clients can panic when provided a certificate of the wrong type for the negotiated parameters. net/http clients performing HTTPS requests are also affected. published: 2022-02-17T17:32:57Z cves: - CVE-2021-34558 credits: - Imre Rad references: - fix: https://go.dev/cl/334031 - fix: https://go.googlesource.com/go/+/a98589711da5e9d935e8d690cfca92892e86d557 - web: https://groups.google.com/g/golang-announce/c/n9FxMelZGAQ - report: https://go.dev/issue/47143 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2491.yaml
id: GO-2024-2491 modules: - module: github.com/opencontainers/runc versions: - introduced: 1.0.0-rc93 - fixed: 1.1.12 vulnerable_at: 1.1.11 packages: - package: github.com/opencontainers/runc/libcontainer/utils symbols: - CloseExecFrom skip_fix: cgo related fix error - package: github.com/opencontainers/runc/libcontainer/cgroups symbols: - openFile - prepareOpenat2 skip_fix: cgo related fix error - package: github.com/opencontainers/runc/libcontainer symbols: - Container.start - linuxSetnsInit.Init - linuxStandardInit.Init - Init - finalizeNamespace skip_fix: cgo related fix error summary: |- Container breakout through process.cwd trickery and leaked fds in github.com/opencontainers/runc cves: - CVE-2024-21626 ghsas: - GHSA-xr7r-f8xq-vfvv credits: - Rory McNamara from Snyk - '@lifubang from acmcoder' - Aleksa Sarai from SUSE references: - advisory: https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv - fix: https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf - web: http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html source: id: GHSA-xr7r-f8xq-vfvv created: 2024-07-01T16:15:02.647859-04:00 review_status: REVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1704.yaml
id: GO-2023-1704 modules: - module: std versions: - fixed: 1.19.8 - introduced: 1.20.0-0 - fixed: 1.20.3 vulnerable_at: 1.20.2 packages: - package: net/textproto symbols: - readMIMEHeader - Reader.upcomingHeaderNewlines derived_symbols: - Reader.ReadMIMEHeader summary: Excessive memory allocation in net/http and net/textproto description: |- HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. With fix, header parsing now correctly allocates only the memory required to hold parsed headers. credits: - Jakob Ackermann (@das7pad) references: - report: https://go.dev/issue/58975 - fix: https://go.dev/cl/481994 - web: https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 cve_metadata: id: CVE-2023-24534 cwe: 'CWE-400: Uncontrolled Resource Consumption' references: - https://security.netapp.com/advisory/ntap-20230526-0007/ - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2158.yaml
id: GO-2023-2158 modules: - module: github.com/grafana/google-sheets-datasource versions: - introduced: 0.9.0 - fixed: 1.2.2 vulnerable_at: 1.2.0 packages: - package: github.com/grafana/google-sheets-datasource/pkg/googlesheets symbols: - GoogleSheets.getSheetData derived_symbols: - GoogleSheets.Query - googleSheetsDatasource.QueryData summary: Google Sheet API key disclosure in github.com/grafana/google-sheets-datasource description: |- Error messages for the Google Sheets data source plugin were improperly sanitized. The Google Sheet API-key could potentially be exposed. cves: - CVE-2023-4457 ghsas: - GHSA-37x5-qpm8-53rq references: - web: https://grafana.com/security/security-advisories/cve-2023-4457/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2562.yaml
id: GO-2024-2562 modules: - module: github.com/greenpau/caddy-security unsupported_versions: - last_affected: 1.1.23 vulnerable_at: 1.1.29 summary: Improper Neutralization of HTTP Headers in github.com/greenpau/caddy-security cves: - CVE-2024-21499 ghsas: - GHSA-r969-783f-6jqr references: - advisory: https://github.com/advisories/GHSA-r969-783f-6jqr - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21499 - report: https://github.com/greenpau/caddy-security/issues/270 - web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy - web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249863 source: id: GHSA-r969-783f-6jqr created: 2024-06-14T11:42:07.479664-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0101.yaml
id: GO-2021-0101 modules: - module: github.com/apache/thrift versions: - introduced: 0.0.0-20151001171628-53dd39833a08 - fixed: 0.13.0 vulnerable_at: 0.12.1-0.20190222141417-6e5c0f6e315e packages: - package: github.com/apache/thrift/lib/go/thrift symbols: - TSimpleJSONProtocol.safePeekContains derived_symbols: - Skip - SkipDefaultDepth - TBinaryProtocol.Skip - TCompactProtocol.Skip - TJSONProtocol.ParseElemListBegin - TJSONProtocol.ReadBool - TJSONProtocol.ReadByte - TJSONProtocol.ReadDouble - TJSONProtocol.ReadFieldBegin - TJSONProtocol.ReadFieldEnd - TJSONProtocol.ReadI16 - TJSONProtocol.ReadI32 - TJSONProtocol.ReadI64 - TJSONProtocol.ReadListBegin - TJSONProtocol.ReadListEnd - TJSONProtocol.ReadMapBegin - TJSONProtocol.ReadMapEnd - TJSONProtocol.ReadMessageBegin - TJSONProtocol.ReadMessageEnd - TJSONProtocol.ReadSetBegin - TJSONProtocol.ReadSetEnd - TJSONProtocol.ReadStructBegin - TJSONProtocol.ReadStructEnd - TJSONProtocol.Skip - TSimpleJSONProtocol.ParseElemListBegin - TSimpleJSONProtocol.ParseF64 - TSimpleJSONProtocol.ParseI64 - TSimpleJSONProtocol.ParseListBegin - TSimpleJSONProtocol.ParseListEnd - TSimpleJSONProtocol.ParseObjectEnd - TSimpleJSONProtocol.ParseObjectStart - TSimpleJSONProtocol.ReadByte - TSimpleJSONProtocol.ReadDouble - TSimpleJSONProtocol.ReadI16 - TSimpleJSONProtocol.ReadI32 - TSimpleJSONProtocol.ReadI64 - TSimpleJSONProtocol.ReadListBegin - TSimpleJSONProtocol.ReadListEnd - TSimpleJSONProtocol.ReadMapBegin - TSimpleJSONProtocol.ReadMapEnd - TSimpleJSONProtocol.ReadMessageBegin - TSimpleJSONProtocol.ReadMessageEnd - TSimpleJSONProtocol.ReadSetBegin - TSimpleJSONProtocol.ReadSetEnd - TSimpleJSONProtocol.ReadStructBegin - TSimpleJSONProtocol.ReadStructEnd - TSimpleJSONProtocol.Skip - TStandardClient.Call - TStandardClient.Recv - tApplicationException.Read summary: Panic due to out-of-bounds read in github.com/apache/thrift description: |- Due to an improper bounds check, parsing maliciously crafted messages can cause panics. If this package is used to parse untrusted input, this may be used as a vector for a denial of service attack. published: 2021-07-28T18:08:05Z cves: - CVE-2019-0210 ghsas: - GHSA-jq7p-26h5-w78r references: - fix: https://github.com/apache/thrift/commit/264a3f318ed3e9e51573f67f963c8509786bcec2 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2394.yaml
id: GO-2023-2394 modules: - module: github.com/shift72/caddy-geo-ip vulnerable_at: 0.6.0 packages: - package: github.com/shift72/caddy-geo-ip skip_fix: Relies on quic-go which doesn't build on Go 1.18. summary: Spoofed source IP address in github.com/shift72/caddy-geo-ip description: |- The caddy-geo-ip (aka GeoIP) middleware for Caddy 2 allows attackers to spoof their source IP address via an X-Forwarded-For header, which may bypass a protection mechanism (trusted_proxy directive in reverse_proxy or IP address range restrictions). cves: - CVE-2023-50463 ghsas: - GHSA-rxg9-hgq7-8pwx references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-50463 - report: https://github.com/shift72/caddy-geo-ip/issues/4 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2578.yaml
id: GO-2024-2578 modules: - module: github.com/apache/incubator-answer versions: - fixed: 1.2.5 vulnerable_at: 1.2.5-RC2 summary: Apache Answer Cross-site Scripting vulnerability in github.com/apache/incubator-answer cves: - CVE-2024-23349 ghsas: - GHSA-8pf2-qj4v-fj64 references: - advisory: https://github.com/advisories/GHSA-8pf2-qj4v-fj64 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23349 - web: http://www.openwall.com/lists/oss-security/2024/02/22/2 - web: https://lists.apache.org/thread/y5902t09vfgy7892z3vzr1zq900sgyqg source: id: GHSA-8pf2-qj4v-fj64 created: 2024-05-17T16:15:07.683729-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2867.yaml
id: GO-2024-2867 modules: - module: github.com/grafana/grafana non_go_versions: - fixed: 8.5.16 - introduced: 9.0.0 - fixed: 9.2.8 vulnerable_at: 5.4.5+incompatible summary: Grafana Spoofing originalUrl of snapshots in github.com/grafana/grafana cves: - CVE-2022-39324 ghsas: - GHSA-4724-7jwc-3fpw unknown_aliases: - BIT-grafana-2022-39324 references: - advisory: https://github.com/grafana/grafana/security/advisories/GHSA-4724-7jwc-3fpw - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-39324 - fix: https://github.com/grafana/grafana/commit/239888f22983010576bb3a9135a7294e88c0c74a - fix: https://github.com/grafana/grafana/commit/d7dcea71ea763780dc286792a0afd560bff2985c - fix: https://github.com/grafana/grafana/pull/60232 - fix: https://github.com/grafana/grafana/pull/60256 source: id: GHSA-4724-7jwc-3fpw created: 2024-06-04T14:26:30.813921-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2163.yaml
id: GO-2023-2163 modules: - module: github.com/nats-io/nkeys versions: - introduced: 0.4.0 - fixed: 0.4.6 vulnerable_at: 0.4.5 packages: - package: github.com/nats-io/nkeys symbols: - decodePubCurveKey derived_symbols: - ckp.Open - ckp.Seal - ckp.SealWithRand summary: Curve KeyPairs fail to encrypt in github.com/nats-io/nkeys description: |- Curve KeyPairs always use the same (all-zeros) key to encrypt data, and provide no security. cves: - CVE-2023-46129 ghsas: - GHSA-mr45-rx8q-wcm9 credits: - Quentin Matillat (GitHub @tinou98) references: - advisory: https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9 - fix: https://github.com/nats-io/nkeys/commit/58fb9d69f42ea73fffad1d14e5914dc666f3daa1 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2695.yaml
id: GO-2024-2695 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 9.3.0+incompatible - fixed: 9.3.3+incompatible - introduced: 9.4.0+incompatible - fixed: 9.4.4+incompatible - introduced: 9.5.0+incompatible - fixed: 9.5.2+incompatible vulnerable_at: 9.5.1+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - introduced: 8.1.0 - fixed: 8.1.11 vulnerable_at: 8.0.0-20240626145722-59998b0b8473 summary: Mattermost Server doesn't limit the number of user preferences in github.com/mattermost/mattermost-server cves: - CVE-2024-28949 ghsas: - GHSA-mcw6-3256-64gg references: - advisory: https://github.com/advisories/GHSA-mcw6-3256-64gg - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-28949 - web: https://github.com/mattermost/mattermost/commit/11a21f4da352a472a09de3b8e125514750a6619a - web: https://github.com/mattermost/mattermost/commit/362b7d29d35c00fe80721d3d47442a4f3168eb2b - web: https://github.com/mattermost/mattermost/commit/5632d6b4ff6d019a21bb8ddd037d4a931cd85ae2 - web: https://github.com/mattermost/mattermost/commit/88f9285173dc4cb35fa19a8b8604e098a567f704 - web: https://mattermost.com/security-updates source: id: GHSA-mcw6-3256-64gg created: 2024-06-26T13:59:18.437352-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1792.yaml
id: GO-2023-1792 modules: - module: github.com/rs/cors versions: - fixed: 1.5.0 vulnerable_at: 1.4.0 packages: - package: github.com/rs/cors symbols: - New - Cors.handlePreflight derived_symbols: - AllowAll - Cors.HandlerFunc - Cors.ServeHTTP - Default summary: Insecure wildcard CORS policy in github.com/rs/cors description: |- The CORS handler actively converts a wildcard CORS policy into reflecting an arbitrary Origin header value, which is incompatible with the CORS security design, and could lead to CORS misconfiguration security problems. cves: - CVE-2018-20744 ghsas: - GHSA-927h-x4qj-r242 references: - fix: https://github.com/rs/cors/pull/57 - report: https://github.com/rs/cors/issues/55 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2447.yaml
id: GO-2024-2447 modules: - module: github.com/gravitational/teleport non_go_versions: - fixed: 12.4.31 - introduced: 13.0.0 - fixed: 13.4.13 - introduced: 14.0.0 - fixed: 14.2.4 vulnerable_at: 3.2.17+incompatible summary: |- Teleport Proxy and Teleport Agents: SSRF to arbitrary hosts is possible from low privileged users in github.com/gravitational/teleport ghsas: - GHSA-hw4x-mcx5-9q36 references: - advisory: https://github.com/gravitational/teleport/security/advisories/GHSA-hw4x-mcx5-9q36 - fix: https://github.com/gravitational/teleport/commit/bb2d67d357e868254a21ed7cb132030d7bf9fcbc - fix: https://github.com/gravitational/teleport/pull/36127 source: id: GHSA-hw4x-mcx5-9q36 created: 2024-06-14T11:35:35.160981-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2476.yaml
id: GO-2024-2476 modules: - module: github.com/dexidp/dex non_go_versions: - introduced: 2.37.0 - fixed: 2.38.0 vulnerable_at: 0.6.1 summary: |- Dex discarding TLSconfig and always serves deprecated TLS 1.0/1.1 and insecure ciphers in github.com/dexidp/dex cves: - CVE-2024-23656 ghsas: - GHSA-gr79-9v6v-gc9r references: - advisory: https://github.com/dexidp/dex/security/advisories/GHSA-gr79-9v6v-gc9r - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23656 - fix: https://github.com/dexidp/dex/commit/5bbdb4420254ba73b9c4df4775fe7bdacf233b17 - fix: https://github.com/dexidp/dex/pull/2964 - report: https://github.com/dexidp/dex/issues/2848 - web: https://github.com/dexidp/dex/blob/70d7a2c7c1bb2646b1a540e49616cbc39622fb83/cmd/dex/serve.go#L425 source: id: GHSA-gr79-9v6v-gc9r created: 2024-06-14T11:36:28.742125-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0379.yaml
id: GO-2022-0379 modules: - module: github.com/docker/distribution versions: - fixed: 2.8.0+incompatible vulnerable_at: 2.7.1+incompatible packages: - package: github.com/docker/distribution symbols: - UnmarshalManifest summary: Type confusion in github.com/docker/distribution description: |- Systems that rely on digest equivalence for image attestations may be vulnerable to type confusion. A maliciously crafted OCI Container Image can cause registry clients to parse the same image in two different ways without modifying the image's digest, invalidating the common pattern of relying on container image digests for equivalence. This problem has been addressed in newer versions by improving validation in manifest unmarshalling. published: 2022-07-29T20:00:03Z ghsas: - GHSA-qq97-vm5h-rrhg references: - fix: https://github.com/distribution/distribution/commit/b59a6f827947f9e0e67df0cfb571046de4733586 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2497.yaml
id: GO-2024-2497 modules: - module: github.com/moby/buildkit versions: - fixed: 0.12.5 vulnerable_at: 0.12.4 packages: - package: github.com/moby/buildkit/solver/llbsolver symbols: - llbBridge.Exec - llbBridge.Run - ValidateEntitlements - Solver.Solve - provenanceBridge.Solve - package: github.com/moby/buildkit/frontend/gateway/forwarder symbols: - BridgeClient.NewContainer - LLBBridgeToGatewayClient - GatewayForwarder.Solve - package: github.com/moby/buildkit/cmd/buildkitd symbols: - newController - package: github.com/moby/buildkit/frontend/gateway/container symbols: - NewContainer - package: github.com/moby/buildkit/frontend/gateway symbols: - serveLLBBridgeForwarder - newBridgeForwarder - gatewayFrontend.Solve - NewBridgeForwarder - llbBridgeForwarder.NewContainer fix_links: - https://github.com/moby/buildkit/commit/5026d95aa3336e97cfe46e3764f52d08bac7a10e summary: Privilege escalation in github.com/moby/buildkit description: |- BuildKit provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special security.insecure entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. cves: - CVE-2024-23653 ghsas: - GHSA-wr6v-9f75-vh2g credits: - '@rmcnamara-snyk' references: - fix: https://github.com/moby/buildkit/pull/4602 - fix: https://github.com/moby/buildkit/commit/92cc595cfb12891d4b3ae476e067c74250e4b71e - fix: https://github.com/moby/buildkit/commit/5026d95aa3336e97cfe46e3764f52d08bac7a10e - web: https://github.com/moby/buildkit/releases/tag/v0.12.5 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1832.yaml
id: GO-2023-1832 modules: - module: github.com/notaryproject/notation-go versions: - fixed: 1.0.0-rc.6 vulnerable_at: 1.0.0-rc.5 packages: - package: github.com/notaryproject/notation-go symbols: - Sign - Verify summary: Verification bypass in github.com/notaryproject/notation-go description: |- An attacker who controls or compromises a registry can lead a user to verify the wrong artifact. cves: - CVE-2023-33959 ghsas: - GHSA-xhg5-42rf-296r credits: - Adam Korczynski (@AdamKorcz) - Shiwei Zhang (@shizhMSFT) - Pritesh Bandi (@priteshbandi) references: - advisory: https://github.com/notaryproject/notation-go/security/advisories/GHSA-xhg5-42rf-296r - fix: https://github.com/notaryproject/notation-go/commit/39c8ed050a65cca3f3f308534acb612096735a64 - fix: https://github.com/notaryproject/notation-go/commit/eba60f5aed9c9e05dee55324423c95fe34700b4c - web: https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.6 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2979.yaml
id: GO-2024-2979 modules: - module: zotregistry.dev/zot non_go_versions: - fixed: 2.1.0 vulnerable_at: 1.4.3 - module: zotregistry.io/zot non_go_versions: - fixed: 2.1.0 vulnerable_at: 1.4.3 summary: |- Cache driver GetBlob() allows read access to any blob without access control check in zotregistry.dev/zot cves: - CVE-2024-39897 ghsas: - GHSA-55r9-5mx9-qq7r references: - advisory: https://github.com/project-zot/zot/security/advisories/GHSA-55r9-5mx9-qq7r - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39897 - web: https://github.com/project-zot/zot/commit/aaee0220e46bdadd12115ac67c19f9d3153eb1df source: id: GHSA-55r9-5mx9-qq7r created: 2024-07-10T14:10:22.351360194Z review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1578.yaml
id: GO-2023-1578 modules: - module: github.com/hashicorp/go-getter/v2 versions: - introduced: 2.0.0 - fixed: 2.2.0 vulnerable_at: 2.0.0 packages: - package: github.com/hashicorp/go-getter/v2 symbols: - untar - ZipDecompressor.Decompress - copyReader derived_symbols: - Bzip2Decompressor.Decompress - Client.Get - Client.GetChecksum - FolderStorage.Get - Get - GetAny - GetFile - GzipDecompressor.Decompress - HttpGetter.Get - Request.CopyReader - TarBzip2Decompressor.Decompress - TarGzipDecompressor.Decompress - TarXzDecompressor.Decompress - XzDecompressor.Decompress skip_fix: TODO include package variable Decompressors. - module: github.com/hashicorp/go-getter versions: - fixed: 1.7.0 vulnerable_at: 1.6.0 packages: - package: github.com/hashicorp/go-getter symbols: - untar - ZipDecompressor.Decompress - copyReader derived_symbols: - Bzip2Decompressor.Decompress - Client.ChecksumFromFile - Client.Get - FolderStorage.Get - GCSGetter.Get - GCSGetter.GetFile - Get - GetAny - GetFile - GzipDecompressor.Decompress - HttpGetter.Get - S3Getter.Get - S3Getter.GetFile - TarBzip2Decompressor.Decompress - TarDecompressor.Decompress - TarGzipDecompressor.Decompress - TarXzDecompressor.Decompress - TarZstdDecompressor.Decompress - XzDecompressor.Decompress - ZstdDecompressor.Decompress skip_fix: TODO include package variable Decompressors. summary: Denial of service in github.com/hashicorp/go-getter/v2 description: |- HashiCorp go-getter is vulnerable to decompression bombs. This can lead to excessive memory consumption and denial-of-service attacks. cves: - CVE-2023-0475 ghsas: - GHSA-jpxj-2jvg-6jv9 references: - web: https://discuss.hashicorp.com/t/hcsec-2023-4-go-getter-vulnerable-to-denial-of-service-via-malicious-compressed-archive/50125 - fix: https://github.com/hashicorp/go-getter/commit/0edab85348271c843782993345b07b1ac98912e6 - fix: https://github.com/hashicorp/go-getter/commit/78e6721a2a76266718dc92c3c03c1571dffdefdc review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0531.yaml
id: GO-2022-0531 modules: - module: std versions: - fixed: 1.17.11 - introduced: 1.18.0-0 - fixed: 1.18.3 vulnerable_at: 1.18.2 packages: - package: crypto/tls symbols: - serverHandshakeStateTLS13.sendSessionTickets summary: Session tickets lack random ticket_age_add in crypto/tls description: |- An attacker can correlate a resumed TLS session with a previous connection. Session tickets generated by crypto/tls do not contain a randomly generated ticket_age_add, which allows an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption. published: 2022-07-28T17:24:57Z credits: - Github user @nervuri references: - fix: https://go.dev/cl/405994 - fix: https://go.googlesource.com/go/+/fe4de36198794c447fbd9d7cc2d7199a506c76a5 - report: https://go.dev/issue/52814 - web: https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ cve_metadata: id: CVE-2022-30629 cwe: 'CWE-200: Information Exposure' description: |- Non-random values for ticket_age_add in session tickets in crypto/tls before Go 1.17.11 and Go 1.18.3 allow an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2900.yaml
id: GO-2024-2900 modules: - module: go.opentelemetry.io/collector/config/configgrpc versions: - fixed: 0.102.1 vulnerable_at: 0.102.0 packages: - package: go.opentelemetry.io/collector/config/configgrpc symbols: - getGRPCCompressionName derived_symbols: - ClientConfig.ToClientConn - module: go.opentelemetry.io/collector/config/confighttp versions: - fixed: 0.102.0 vulnerable_at: 0.101.0 packages: - package: go.opentelemetry.io/collector/config/confighttp symbols: - httpContentDecompressor - decompressor.ServeHTTP - ServerConfig.ToServer derived_symbols: - clientInfoHandler.ServeHTTP summary: |- Denial of Service via Zip/Decompression Bomb sent over HTTP or gRPC in go.opentelemetry.io/collector/config/configgrpc description: |- An unsafe decompression vulnerability allows unauthenticated attackers to crash the collector via excessive memory consumption. cves: - CVE-2024-36129 ghsas: - GHSA-c74f-6mfw-mm4v references: - advisory: https://github.com/open-telemetry/opentelemetry-collector/security/advisories/GHSA-c74f-6mfw-mm4v - fix: https://github.com/open-telemetry/opentelemetry-collector/pull/10289 - fix: https://github.com/open-telemetry/opentelemetry-collector/pull/10323 - web: https://opentelemetry.io/blog/2024/cve-2024-36129 source: id: GHSA-c74f-6mfw-mm4v created: 2024-07-16T10:53:58.646682-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2865.yaml
id: GO-2024-2865 modules: - module: github.com/stakater/Forecastle unsupported_versions: - last_affected: 1.0.139 vulnerable_at: 1.0.119 summary: Stakater Forecastle has a directory traversal vulnerability in github.com/stakater/Forecastle cves: - CVE-2023-40297 ghsas: - GHSA-x8xm-wrjq-5g54 references: - advisory: https://github.com/advisories/GHSA-x8xm-wrjq-5g54 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-40297 - web: https://github.com/sahar042/CVE-2023-40297 source: id: GHSA-x8xm-wrjq-5g54 created: 2024-06-04T14:26:50.366285-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1602.yaml
id: GO-2023-1602 modules: - module: github.com/russellhaering/gosaml2 versions: - fixed: 0.9.0 vulnerable_at: 0.8.1 packages: - package: github.com/russellhaering/gosaml2 symbols: - SAMLServiceProvider.ValidateEncodedLogoutRequestPOST - SAMLServiceProvider.validationContext - SAMLServiceProvider.ValidateEncodedResponse - maybeDeflate - DecodeUnverifiedBaseResponse - parseResponse - DecodeUnverifiedLogoutResponse - SAMLServiceProvider.ValidateEncodedLogoutResponsePOST derived_symbols: - SAMLServiceProvider.RetrieveAssertionInfo summary: |- Denial of service via deflate decompression bomb in github.com/russellhaering/gosaml2 description: |- A bug in SAML authentication library can result in Denial of Service attacks. Attackers can craft a "deflate"-compressed request which will consume significantly more memory during processing than the size of the original request. This may eventually lead to memory exhaustion and the process being killed. cves: - CVE-2023-26483 ghsas: - GHSA-6gc3-crp7-25w5 references: - advisory: https://github.com/advisories/GHSA-6gc3-crp7-25w5 - fix: https://github.com/russellhaering/gosaml2/commit/f9d66040241093e8702649baff50cc70d2c683c0 - web: https://github.com/russellhaering/gosaml2/releases/tag/v0.9.0 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0057.yaml
id: GO-2021-0057 modules: - module: github.com/buger/jsonparser versions: - fixed: 1.1.1 vulnerable_at: 1.1.0 packages: - package: github.com/buger/jsonparser symbols: - searchKeys derived_symbols: - ArrayEach - Delete - EachKey - FuzzDelete - FuzzEachKey - FuzzGetBoolean - FuzzGetFloat - FuzzGetInt - FuzzGetString - FuzzGetUnsafeString - FuzzObjectEach - FuzzSet - Get - GetBoolean - GetFloat - GetInt - GetString - GetUnsafeString - ObjectEach - Set summary: Panic due to improper input validation in github.com/buger/jsonparser description: |- Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2020-35381 ghsas: - GHSA-8vrw-m3j9-j27c credits: - '@toptotu' references: - fix: https://github.com/buger/jsonparser/pull/221 - fix: https://github.com/buger/jsonparser/commit/df3ea76ece10095374fd1c9a22a4fb85a44efc42 - web: https://github.com/buger/jsonparser/issues/219 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2808.yaml
id: GO-2024-2808 modules: - module: github.com/firebase/firebase-tools unsupported_versions: - cve_version_range: 'affected from 0 to 13.6.0 (default: unaffected)' vulnerable_at: 13.10.2+incompatible summary: CSRF in firebase-tools emulator suite in github.com/firebase/firebase-tools cves: - CVE-2024-4128 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-4128 - fix: https://github.com/firebase/firebase-tools/commit/068a2b08dc308c7ab4b569617f5fc8821237e3a0 - fix: https://github.com/firebase/firebase-tools/pull/6944 source: id: CVE-2024-4128 created: 2024-06-04T15:26:12.991483-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0380.yaml
id: GO-2022-0380 modules: - module: github.com/nats-io/jwt versions: - fixed: 1.1.0 vulnerable_at: 1.0.1 packages: - package: github.com/nats-io/jwt symbols: - AccountClaims.IsRevoked - Export.IsRevoked summary: Incorrect handling of credential expiry in github.com/nats-io/jwt description: |- The AccountClaims.IsRevoked and Export.IsRevoked functions improperly validate expired credentials using the current system time rather than the issue time of the JWT to be tested. These functions cannot be used properly. Newer versions of the jwt package provide an IsClaimRevoked method which performs correct validation. In these versions, the IsRevoked method always return true. published: 2022-07-15T23:29:36Z cves: - CVE-2020-26892 ghsas: - GHSA-2c64-vj8g-vwrq - GHSA-4w5x-x539-ppf5 references: - advisory: https://advisories.nats.io/CVE/CVE-2020-26892.txt - fix: https://github.com/nats-io/jwt/commit/e11ce317263cef69619fc1ca743b195d02aa1d8a review_status: REVIEWED