repo_id
stringclasses 927
values | file_path
stringlengths 99
214
| content
stringlengths 2
4.15M
|
|---|---|---|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1572.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-41727"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Denial of service via crafted TIFF image in golang.org/x/image/tiff",
"descriptions": [
{
"lang": "en",
"value": "An attacker can craft a malformed TIFF image which will consume a significant amount of memory when passed to DecodeConfig. This could lead to a denial of service."
}
],
"affected": [
{
"vendor": "golang.org/x/image",
"product": "golang.org/x/image/tiff",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/image/tiff",
"versions": [
{
"version": "0",
"lessThan": "0.5.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "decoder.ifdUint"
},
{
"name": "newDecoder"
},
{
"name": "Decode"
},
{
"name": "DecodeConfig"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/58003"
},
{
"url": "https://go.dev/cl/468195"
},
{
"url": "https://groups.google.com/g/golang-announce/c/ag-FiyjlD5o"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1572"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/"
}
],
"credits": [
{
"lang": "en",
"value": "Philippe Antoine (Catena cyber)"
},
{
"lang": "en",
"value": "OSS Fuzz"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1495.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-41721"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Request smuggling due to improper request handling in golang.org/x/net/http2/h2c",
"descriptions": [
{
"lang": "en",
"value": "A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests."
}
],
"affected": [
{
"vendor": "golang.org/x/net",
"product": "golang.org/x/net/http2/h2c",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/net/http2/h2c",
"versions": [
{
"version": "0.0.0-20220524220425-1d687d428aca",
"lessThan": "0.1.1-0.20221104162952-702349b0e862",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "h2cHandler.ServeHTTP"
},
{
"name": "h2cUpgrade"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 444: Inconsistent Interpretation of HTTP Requests (\"HTTP Request/Response Smuggling)"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/56352"
},
{
"url": "https://go.dev/cl/447396"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1495"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3H3EWQXM2XL5AGBX6UL443JEJ3GQXJN/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5DXTLLWN6HKI5I35EUZRBISTNZJ75GP/"
}
],
"credits": [
{
"lang": "en",
"value": "John Howard (Google)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2024-2609.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2024-24784"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Comments in display names are incorrectly handled in net/mail",
"descriptions": [
{
"lang": "en",
"value": "The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/mail",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/mail",
"versions": [
{
"version": "0",
"lessThan": "1.21.8",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.22.0-0",
"lessThan": "1.22.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "addrParser.consumeGroupList"
},
{
"name": "addrParser.consumePhrase"
},
{
"name": "isAtext"
},
{
"name": "Address.String"
},
{
"name": "AddressParser.Parse"
},
{
"name": "AddressParser.ParseList"
},
{
"name": "Header.AddressList"
},
{
"name": "ParseAddress"
},
{
"name": "ParseAddressList"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/65083"
},
{
"url": "https://go.dev/cl/555596"
},
{
"url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-2609"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240329-0007/"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/08/4"
}
],
"credits": [
{
"lang": "en",
"value": "Juho Nurminen of Mattermost"
},
{
"lang": "en",
"value": "Slonser (https://github.com/Slonser)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-1038.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-2880"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Incorrect sanitization of forwarded query parameters in net/http/httputil",
"descriptions": [
{
"lang": "en",
"value": "Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparsable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparsable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/http/httputil",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/http/httputil",
"versions": [
{
"version": "0",
"lessThan": "1.18.7",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.19.0-0",
"lessThan": "1.19.2",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "ReverseProxy.ServeHTTP"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-444: Inconsistent Interpretation of HTTP Requests"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/54663"
},
{
"url": "https://go.dev/cl/432976"
},
{
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-1038"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Gal Goldstein (Security Researcher, Oxeye)"
},
{
"lang": "en",
"value": "Daniel Abeles (Head of Research, Oxeye)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-1037.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-2879"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Unbounded memory consumption when reading headers in archive/tar",
"descriptions": [
{
"lang": "en",
"value": "Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "archive/tar",
"collectionURL": "https://pkg.go.dev",
"packageName": "archive/tar",
"versions": [
{
"version": "0",
"lessThan": "1.18.7",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.19.0-0",
"lessThan": "1.19.2",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Reader.next"
},
{
"name": "parsePAX"
},
{
"name": "Writer.writePAXHeader"
},
{
"name": "Reader.Next"
},
{
"name": "Writer.WriteHeader"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/54853"
},
{
"url": "https://go.dev/cl/439355"
},
{
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-1037"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Adam Korczynski (ADA Logics)"
},
{
"lang": "en",
"value": "OSS-Fuzz"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0049.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2020-36564"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Improper input validation in github.com/justinas/nosurf",
"descriptions": [
{
"lang": "en",
"value": "Due to improper validation of caller input, validation is silently disabled if the provided expected token is malformed, causing any user supplied token to be considered valid."
}
],
"affected": [
{
"vendor": "github.com/justinas/nosurf",
"product": "github.com/justinas/nosurf",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/justinas/nosurf",
"versions": [
{
"version": "0",
"lessThan": "1.1.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "VerifyToken"
},
{
"name": "verifyToken"
},
{
"name": "CSRFHandler.ServeHTTP"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 345: Insufficient Verification of Data Authenticity"
}
]
}
],
"references": [
{
"url": "https://github.com/justinas/nosurf/pull/60"
},
{
"url": "https://github.com/justinas/nosurf/commit/4d86df7a4affa1fa50ab39fb09aac56c3ce9c314"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0049"
}
],
"credits": [
{
"lang": "en",
"value": "@aeneasr"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1702.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-24537"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Infinite loop in parsing in go/scanner",
"descriptions": [
{
"lang": "en",
"value": "Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "go/scanner",
"collectionURL": "https://pkg.go.dev",
"packageName": "go/scanner",
"versions": [
{
"version": "0",
"lessThan": "1.19.8",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.3",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Scanner.updateLineInfo"
},
{
"name": "Scanner.Scan"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/59180"
},
{
"url": "https://go.dev/cl/482078"
},
{
"url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1702"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Philippe Antoine (Catena cyber)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0032.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2019-25073"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Path traversal in github.com/goadesign/goa",
"descriptions": [
{
"lang": "en",
"value": "Improper path sanitization in github.com/goadesign/goa before v3.0.9, v2.0.10, or v1.4.3 allow remote attackers to read files outside of the intended directory."
}
],
"affected": [
{
"vendor": "github.com/goadesign/goa",
"product": "github.com/goadesign/goa",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/goadesign/goa",
"versions": [
{
"version": "0",
"lessThan": "1.4.3",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Controller.FileHandler"
},
{
"name": "Service.ListenAndServe"
},
{
"name": "Service.ListenAndServeTLS"
},
{
"name": "Service.Serve"
},
{
"name": "mux.ServeHTTP"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "goa.design/goa",
"product": "goa.design/goa",
"collectionURL": "https://pkg.go.dev",
"packageName": "goa.design/goa",
"versions": [
{
"version": "0",
"lessThan": "1.4.3",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Controller.FileHandler"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "goa.design/goa/v3",
"product": "goa.design/goa/v3",
"collectionURL": "https://pkg.go.dev",
"packageName": "goa.design/goa/v3",
"versions": [
{
"version": "0",
"lessThan": "3.0.9",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Controller.FileHandler"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory('Path Traversal')"
}
]
}
],
"references": [
{
"url": "https://github.com/goadesign/goa/pull/2388"
},
{
"url": "https://github.com/goadesign/goa/commit/70b5a199d0f813d74423993832c424e1fc73fb39"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0032"
}
],
"credits": [
{
"lang": "en",
"value": "@christi3k"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0527.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-30630"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Stack exhaustion in Glob on certain paths in io/fs",
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled recursion in Glob in io/fs before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a path which contains a large number of path separators."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "io/fs",
"collectionURL": "https://pkg.go.dev",
"packageName": "io/fs",
"versions": [
{
"version": "0",
"lessThan": "1.17.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.18.0-0",
"lessThan": "1.18.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Glob"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-674: Uncontrolled Recursion"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/417065"
},
{
"url": "https://go.googlesource.com/go/+/fa2d41d0ca736f3ad6b200b2a4e134364e9acc59"
},
{
"url": "https://go.dev/issue/53415"
},
{
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0527"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0988.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-32190"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Failure to strip relative path components in net/url",
"descriptions": [
{
"lang": "en",
"value": "JoinPath and URL.JoinPath do not remove ../ path elements appended to a relative path. For example, JoinPath(\"https://go.dev\", \"../go\") returns the URL \"https://go.dev/../go\", despite the JoinPath documentation stating that ../ path elements are removed from the result."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/url",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/url",
"versions": [
{
"version": "1.19.0-0",
"lessThan": "1.19.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "URL.JoinPath"
},
{
"name": "JoinPath"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
}
]
}
],
"references": [
{
"url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s"
},
{
"url": "https://go.dev/issue/54385"
},
{
"url": "https://go.dev/cl/423514"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0988"
}
],
"credits": [
{
"lang": "en",
"value": "@q0jt"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-1144.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-41717"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Excessive memory growth in net/http and golang.org/x/net/http2",
"descriptions": [
{
"lang": "en",
"value": "An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/http",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/http",
"versions": [
{
"version": "0",
"lessThan": "1.18.9",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.19.0-0",
"lessThan": "1.19.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "http2serverConn.canonicalHeader"
},
{
"name": "ListenAndServe"
},
{
"name": "ListenAndServeTLS"
},
{
"name": "Serve"
},
{
"name": "ServeTLS"
},
{
"name": "Server.ListenAndServe"
},
{
"name": "Server.ListenAndServeTLS"
},
{
"name": "Server.Serve"
},
{
"name": "Server.ServeTLS"
},
{
"name": "http2Server.ServeConn"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "golang.org/x/net",
"product": "golang.org/x/net/http2",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/net/http2",
"versions": [
{
"version": "0",
"lessThan": "0.4.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "serverConn.canonicalHeader"
},
{
"name": "Server.ServeConn"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/56350"
},
{
"url": "https://go.dev/cl/455717"
},
{
"url": "https://go.dev/cl/455635"
},
{
"url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-1144"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QBKBAZBIOXZV5QCFHZNSVXULR32XJCYD/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQGNAXK3YBPMUP3J4TECIRDHFGW37522/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PUM4DIVOLJCBK5ZDP4LJOL24GXT3YSIR/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4SBIUECMLNC572P23DDOKJNKPJVX26SP/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3XC47AUW5J5M2ULJX7WCCL3B2ETLMT/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q52IQI754YAE4XPR4QBRWPIVZWYGZ4FS/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/56B2FFESRYYP6IY2AZ3UWXLWKZ5IYZN4/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANIOPUXWIHVRA6CEWXCGOMX3YYS6KFHG/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WPEIZ7AMEJCZXU3FEJZMVRNHQZXX5P3I/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSVIS6MTMFVBA7JPMRAUNKUOYEVSJYSB/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZSVEMQV5ROY5YW5QE3I57HT3ITWG5GCV/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RSKA2II6QTD4YUKUNDVJQSRYSFC4VFR/"
}
],
"credits": [
{
"lang": "en",
"value": "Josselin Costanzi"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0524.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-30631"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Stack exhaustion when reading certain archives in compress/gzip",
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "compress/gzip",
"collectionURL": "https://pkg.go.dev",
"packageName": "compress/gzip",
"versions": [
{
"version": "0",
"lessThan": "1.17.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.18.0-0",
"lessThan": "1.18.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Reader.Read"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-674: Uncontrolled Recursion"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/417067"
},
{
"url": "https://go.googlesource.com/go/+/b2b8872c876201eac2d0707276c6999ff3eb185e"
},
{
"url": "https://go.dev/issue/53168"
},
{
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0524"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0025.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2018-25046"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Path traversal in code.cloudfoundry.org/archiver",
"descriptions": [
{
"lang": "en",
"value": "Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory."
}
],
"affected": [
{
"vendor": "code.cloudfoundry.org/archiver",
"product": "code.cloudfoundry.org/archiver/extractor",
"collectionURL": "https://pkg.go.dev",
"packageName": "code.cloudfoundry.org/archiver/extractor",
"versions": [
{
"version": "0",
"lessThan": "0.0.0-20180523222229-09b5706aa936",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "extractTarArchiveFile"
},
{
"name": "extractZipArchiveFile"
},
{
"name": "detectableExtractor.Extract"
},
{
"name": "tarExtractor.Extract"
},
{
"name": "tgzExtractor.Extract"
},
{
"name": "zipExtractor.Extract"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 29: Path Traversal: \"\\..\\filename\""
}
]
}
],
"references": [
{
"url": "https://github.com/cloudfoundry/archiver/commit/09b5706aa9367972c09144a450bb4523049ee840"
},
{
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0025"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-2045.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-39322"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Memory exhaustion in QUIC connection handling in crypto/tls",
"descriptions": [
{
"lang": "en",
"value": "QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "crypto/tls",
"collectionURL": "https://pkg.go.dev",
"packageName": "crypto/tls",
"versions": [
{
"version": "1.21.0-0",
"lessThan": "1.21.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "QUICConn.HandleData"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/62266"
},
{
"url": "https://go.dev/cl/523039"
},
{
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2045"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231020-0004/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Marten Seemann"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-2095.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-39323"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Arbitrary code execution during build via line directives in cmd/go",
"descriptions": [
{
"lang": "en",
"value": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex."
}
],
"affected": [
{
"vendor": "Go toolchain",
"product": "cmd/go",
"collectionURL": "https://pkg.go.dev",
"packageName": "cmd/go",
"versions": [
{
"version": "0",
"lessThan": "1.20.9",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.21.0-0",
"lessThan": "1.21.2",
"status": "affected",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 94: Improper Control of Generation of Code ('Code Injection')"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/63211"
},
{
"url": "https://go.dev/cl/533215"
},
{
"url": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2095"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231020-0001/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1737.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-29401"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Improper handling of filenames in Content-Disposition HTTP header in github.com/gin-gonic/gin",
"descriptions": [
{
"lang": "en",
"value": "The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of \"setup.bat\u0026quot;;x=.txt\" will be sent as a file named \"setup.bat\". If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header."
}
],
"affected": [
{
"vendor": "github.com/gin-gonic/gin",
"product": "github.com/gin-gonic/gin",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/gin-gonic/gin",
"versions": [
{
"version": "1.3.1-0.20190301021747-ccb9e902956d",
"lessThan": "1.9.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Context.FileAttachment"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 20: Improper Input Validation"
}
]
}
],
"references": [
{
"url": "https://github.com/gin-gonic/gin/issues/3555"
},
{
"url": "https://github.com/gin-gonic/gin/pull/3556"
},
{
"url": "https://github.com/gin-gonic/gin/releases/tag/v1.9.1"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1737"
}
],
"credits": [
{
"lang": "en",
"value": "motoyasu-saburi"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-1059.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-32149"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Denial of service via crafted Accept-Language header in golang.org/x/text/language",
"descriptions": [
{
"lang": "en",
"value": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse."
}
],
"affected": [
{
"vendor": "golang.org/x/text",
"product": "golang.org/x/text/language",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/text/language",
"versions": [
{
"version": "0",
"lessThan": "0.3.8",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "ParseAcceptLanguage"
},
{
"name": "MatchStrings"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/56152"
},
{
"url": "https://go.dev/cl/442235"
},
{
"url": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-1059"
}
],
"credits": [
{
"lang": "en",
"value": "Adam Korczynski (ADA Logics)"
},
{
"lang": "en",
"value": "OSS-Fuzz"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0040.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2020-36562"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Uncontrolled Resource Consumption in github.com/shiyanhui/dht",
"descriptions": [
{
"lang": "en",
"value": "Due to unchecked type assertions, maliciously crafted messages can cause panics, which may be used as a denial of service vector."
}
],
"affected": [
{
"vendor": "github.com/shiyanhui/dht",
"product": "github.com/shiyanhui/dht",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/shiyanhui/dht",
"defaultStatus": "affected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://github.com/shiyanhui/dht/issues/57"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0040"
}
],
"credits": [
{
"lang": "en",
"value": "@hMihaiDavid"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1568.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-41722"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Path traversal on Windows in path/filepath",
"descriptions": [
{
"lang": "en",
"value": "A path traversal vulnerability exists in filepath.Clean on Windows. On Windows, the filepath.Clean function could transform an invalid path such as \"a/../c:/b\" into the valid path \"c:\\b\". This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack. After fix, the filepath.Clean function transforms this path into the relative (but still invalid) path \".\\c:\\b\"."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "path/filepath",
"collectionURL": "https://pkg.go.dev",
"packageName": "path/filepath",
"versions": [
{
"version": "0",
"lessThan": "1.19.6",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.1",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"windows"
],
"programRoutines": [
{
"name": "Clean"
},
{
"name": "Abs"
},
{
"name": "Dir"
},
{
"name": "EvalSymlinks"
},
{
"name": "Glob"
},
{
"name": "IsLocal"
},
{
"name": "Join"
},
{
"name": "Rel"
},
{
"name": "Walk"
},
{
"name": "WalkDir"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-22: Improper Limitation of a Pathname to a Restricted\nDirectory (\"Path Traversal\")\n"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/57274"
},
{
"url": "https://go.dev/cl/468123"
},
{
"url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1568"
}
],
"credits": [
{
"lang": "en",
"value": "RyotaK (https://ryotak.net)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-2375.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-45287"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel",
"descriptions": [
{
"lang": "en",
"value": "Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "crypto/tls",
"collectionURL": "https://pkg.go.dev",
"packageName": "crypto/tls",
"versions": [
{
"version": "0",
"lessThan": "1.20.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "rsaKeyAgreement.processClientKeyExchange"
},
{
"name": "rsaKeyAgreement.generateClientKeyExchange"
},
{
"name": "Conn.Handshake"
},
{
"name": "Conn.HandshakeContext"
},
{
"name": "Conn.Read"
},
{
"name": "Conn.Write"
},
{
"name": "Dial"
},
{
"name": "DialWithDialer"
},
{
"name": "Dialer.Dial"
},
{
"name": "Dialer.DialContext"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-208: Observable Timing Discrepancy"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/20654"
},
{
"url": "https://go.dev/cl/326012/26"
},
{
"url": "https://groups.google.com/g/golang-announce/c/QMK8IQALDvA"
},
{
"url": "https://people.redhat.com/~hkario/marvin/"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2375"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240112-0005/"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2024-2963.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2024-24791"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Denial of service due to improper 100-continue handling in net/http",
"descriptions": [
{
"lang": "en",
"value": "The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an \"Expect: 100-continue\" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending \"Expect: 100-continue\" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/http",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/http",
"versions": [
{
"version": "0",
"lessThan": "1.21.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.22.0-0",
"lessThan": "1.22.5",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "persistConn.readResponse"
},
{
"name": "Client.CloseIdleConnections"
},
{
"name": "Client.Do"
},
{
"name": "Client.Get"
},
{
"name": "Client.Head"
},
{
"name": "Client.Post"
},
{
"name": "Client.PostForm"
},
{
"name": "Get"
},
{
"name": "Head"
},
{
"name": "Post"
},
{
"name": "PostForm"
},
{
"name": "Transport.CancelRequest"
},
{
"name": "Transport.CloseIdleConnections"
},
{
"name": "Transport.RoundTrip"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/591255"
},
{
"url": "https://go.dev/issue/67555"
},
{
"url": "https://groups.google.com/g/golang-dev/c/t0rK-qHBqzY/m/6MMoAZkMAgAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-2963"
}
],
"credits": [
{
"lang": "en",
"value": "Geoff Franks"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2024-2598.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2024-24783"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Verify panics on certificates with an unknown public key algorithm in crypto/x509",
"descriptions": [
{
"lang": "en",
"value": "Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "crypto/x509",
"collectionURL": "https://pkg.go.dev",
"packageName": "crypto/x509",
"versions": [
{
"version": "0",
"lessThan": "1.21.8",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.22.0-0",
"lessThan": "1.22.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Certificate.buildChains"
},
{
"name": "Certificate.Verify"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-476: NULL Pointer Dereference"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/65390"
},
{
"url": "https://go.dev/cl/569339"
},
{
"url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-2598"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240329-0005/"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/08/4"
}
],
"credits": [
{
"lang": "en",
"value": "John Howard (Google)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1569.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-41725"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Excessive resource consumption in mime/multipart",
"descriptions": [
{
"lang": "en",
"value": "A denial of service is possible from excessive resource consumption in net/http and mime/multipart. Multipart form parsing with mime/multipart.Reader.ReadForm can consume largely unlimited amounts of memory and disk files. This also affects form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. ReadForm takes a maxMemory parameter, and is documented as storing \"up to maxMemory bytes +10MB (reserved for non-file parts) in memory\". File parts which cannot be stored in memory are stored on disk in temporary files. The unconfigurable 10MB reserved for non-file parts is excessively large and can potentially open a denial of service vector on its own. However, ReadForm did not properly account for all memory consumed by a parsed form, such as map entry overhead, part names, and MIME headers, permitting a maliciously crafted form to consume well over 10MB. In addition, ReadForm contained no limit on the number of disk files created, permitting a relatively small request body to create a large number of disk temporary files. With fix, ReadForm now properly accounts for various forms of memory overhead, and should now stay within its documented limit of 10MB + maxMemory bytes of memory consumption. Users should still be aware that this limit is high and may still be hazardous. In addition, ReadForm now creates at most one on-disk temporary file, combining multiple form parts into a single temporary file. The mime/multipart.File interface type's documentation states, \"If stored on disk, the File's underlying concrete type will be an *os.File.\". This is no longer the case when a form contains more than one file part, due to this coalescing of parts into a single file. The previous behavior of using distinct files for each form part may be reenabled with the environment variable GODEBUG=multipartfiles=distinct. Users should be aware that multipart.ReadForm and the http.Request methods that call it do not limit the amount of disk consumed by temporary files. Callers can limit the size of form data with http.MaxBytesReader."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "mime/multipart",
"collectionURL": "https://pkg.go.dev",
"packageName": "mime/multipart",
"versions": [
{
"version": "0",
"lessThan": "1.19.6",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Reader.ReadForm"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/58006"
},
{
"url": "https://go.dev/cl/468124"
},
{
"url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1569"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Arpad Ryszka"
},
{
"lang": "en",
"value": "Jakob Ackermann (@das7pad)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0023.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2015-10004"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Timing side-channel in github.com/robbert229/jwt",
"descriptions": [
{
"lang": "en",
"value": "Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC."
}
],
"affected": [
{
"vendor": "github.com/robbert229/jwt",
"product": "github.com/robbert229/jwt",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/robbert229/jwt",
"versions": [
{
"version": "0",
"lessThan": "0.0.0-20170426191122-ca1404ee6e83",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Algorithm.validateSignature"
},
{
"name": "Algorithm.Validate"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 208: Information Exposure Through Timing Discrepancy"
}
]
}
],
"references": [
{
"url": "https://github.com/robbert229/jwt/commit/ca1404ee6e83fcbafb66b09ed0d543850a15b654"
},
{
"url": "https://github.com/robbert229/jwt/issues/12"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0023"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1988.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-3978"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Improper rendering of text nodes in golang.org/x/net/html",
"descriptions": [
{
"lang": "en",
"value": "Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack."
}
],
"affected": [
{
"vendor": "golang.org/x/net",
"product": "golang.org/x/net/html",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/net/html",
"versions": [
{
"version": "0",
"lessThan": "0.13.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "render1"
},
{
"name": "Render"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/61615"
},
{
"url": "https://go.dev/cl/514896"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1988"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-2043.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-39319"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Improper handling of special tags within script contexts in html/template",
"descriptions": [
{
"lang": "en",
"value": "The html/template package does not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "html/template",
"collectionURL": "https://pkg.go.dev",
"packageName": "html/template",
"versions": [
{
"version": "0",
"lessThan": "1.20.8",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.21.0-0",
"lessThan": "1.21.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "escaper.escapeText"
},
{
"name": "tSpecialTagEnd"
},
{
"name": "indexTagEnd"
},
{
"name": "Template.Execute"
},
{
"name": "Template.ExecuteTemplate"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/62197"
},
{
"url": "https://go.dev/cl/526157"
},
{
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2043"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231020-0009/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0532.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-30580"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Empty Cmd.Path can trigger unintended binary in os/exec on Windows",
"descriptions": [
{
"lang": "en",
"value": "Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either \"..com\" or \"..exe\" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "os/exec",
"collectionURL": "https://pkg.go.dev",
"packageName": "os/exec",
"versions": [
{
"version": "0",
"lessThan": "1.17.11",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.18.0-0",
"lessThan": "1.18.3",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"windows"
],
"programRoutines": [
{
"name": "Cmd.Start"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-94: Improper Control of Generation of Code ('Code Injection')"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/403759"
},
{
"url": "https://go.googlesource.com/go/+/960ffa98ce73ef2c2060c84c7ac28d37a83f345e"
},
{
"url": "https://go.dev/issue/52574"
},
{
"url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0532"
}
],
"credits": [
{
"lang": "en",
"value": "Chris Darroch (chrisd8088@github.com)"
},
{
"lang": "en",
"value": "brian m. carlson (bk2204@github.com)"
},
{
"lang": "en",
"value": "Mikhail Shcherbakov (https://twitter.com/yu5k3)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2021-0106.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2020-36566"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Path traversal in github.com/whyrusleeping/tar-utils",
"descriptions": [
{
"lang": "en",
"value": "Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory."
}
],
"affected": [
{
"vendor": "github.com/whyrusleeping/tar-utils",
"product": "github.com/whyrusleeping/tar-utils",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/whyrusleeping/tar-utils",
"versions": [
{
"version": "0",
"lessThan": "0.0.0-20201201191210-20a61371de5b",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Extractor.outputPath"
},
{
"name": "Extractor.Extract"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
}
]
}
],
"references": [
{
"url": "https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227"
},
{
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"url": "https://pkg.go.dev/vuln/GO-2021-0106"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2024-2599.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-45290"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Memory exhaustion in multipart form parsing in net/textproto and net/http",
"descriptions": [
{
"lang": "en",
"value": "When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/textproto",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/textproto",
"versions": [
{
"version": "0",
"lessThan": "1.21.8",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.22.0-0",
"lessThan": "1.22.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Reader.readLineSlice"
},
{
"name": "Reader.readContinuedLineSlice"
},
{
"name": "Reader.ReadCodeLine"
},
{
"name": "Reader.ReadContinuedLine"
},
{
"name": "Reader.ReadContinuedLineBytes"
},
{
"name": "Reader.ReadDotLines"
},
{
"name": "Reader.ReadLine"
},
{
"name": "Reader.ReadLineBytes"
},
{
"name": "Reader.ReadMIMEHeader"
},
{
"name": "Reader.ReadResponse"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/65383"
},
{
"url": "https://go.dev/cl/569341"
},
{
"url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-2599"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240329-0004/"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/08/4"
}
],
"credits": [
{
"lang": "en",
"value": "Bartek Nowotarski"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0022.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2014-125026"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Out-of-bounds write in github.com/cloudflare/golz4",
"descriptions": [
{
"lang": "en",
"value": "LZ4 bindings use a deprecated C API that is vulnerable to memory corruption, which could lead to arbitrary code execution if called with untrusted user input."
}
],
"affected": [
{
"vendor": "github.com/cloudflare/golz4",
"product": "github.com/cloudflare/golz4",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/cloudflare/golz4",
"versions": [
{
"version": "0",
"lessThan": "0.0.0-20140711154735-199f5f787806",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Uncompress"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 94: Improper Control of Generation of Code ('Code Injection')"
}
]
}
],
"references": [
{
"url": "https://github.com/cloudflare/golz4/commit/199f5f7878062ca17a98e079f2dbe1205e2ed898"
},
{
"url": "https://github.com/cloudflare/golz4/issues/5"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0022"
}
],
"credits": [
{
"lang": "en",
"value": "Yann Collet"
}
]
}
}
}
|
webconfig
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/webconfig/404.html
|
<!--
Copyright 2022 The Go Authors. All rights reserved.
Use of this source code is governed by a BSD-style
license that can be found in the LICENSE file.
-->
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<title>Not Found: Go Vulnerability Database</title>
<style>
body {
font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Helvetica, Arial, sans-serif;
font-size: 1rem;
line-height: normal;
}
</style>
</head>
<body>
<h1>Not Found</h1>
<p>
We couldn't find what you're looking for in the Go Vulnerability Database.
</p>
<p>
At the top level, the database is organized by module. The ID directory
lists Go vulnerabilities by ID.
</p>
<p>Check out <a href="https://go.dev/security/vulndb">https://go.dev/security/vulndb</a> for more information.</p>
</body>
</html>
|
webconfig
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/webconfig/README.md
|
# Go Vulnerability Database Web Configuration
These files control what users see when they visit [vuln.go.dev](https://vuln.go.dev), and
when they get a 404 on that site.
## Deployment
Every time a new CL is submitted, the existing `.html` and `.ico` files in this folder
are automatically copied to the vuln DB bucket via the script in
`deploy/gcp-deploy.sh`.
**If a new file is added**, update the script in `deploy/gcp-deploy.sh` and below.
### Manual deployment
In exceptional cases, the files may need to be manually copied into the bucket.
To do this, run this script:
```sh
gsutil cp webconfig/index.html gs://go-vulndb
for file in 404 copyright privacy; do
gsutil -h "Content-Type:text/html" cp webconfig/$file.html gs://go-vulndb/$file
done
gsutil cp webconfig/favicon.ico gs://go-vulndb
```
This requires `golang-vulndb-project-owners` rights, which must be requested
and approved via Access on Demand (go/get-aod).
## Initial Setup
The initial setup has already been completed and no further action is required.
The go-vulndb bucket was configured to display these pages via:
```sh
gsutil web set -m index.html -e 404 gs://go-vulndb
```
Use `gsutil web get gs://go-vulndb` to display the current configuration.
|
webconfig
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/webconfig/index.html
|
<!--
Copyright 2022 The Go Authors. All rights reserved.
Use of this source code is governed by a BSD-style
license that can be found in the LICENSE file.
-->
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<title>Go Vulnerability Database</title>
<style>
body {
font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Helvetica, Arial, sans-serif;
font-size: 1rem;
line-height: normal;
}
</style>
</head>
<body>
<h1>Go Vulnerability Database</h1>
<p>
This is the Go vulnerability database. It is meant to be accessed by
programs that want to find vulnerabilities associated with Go modules.
</p>
<p>
To browse the database, see
<a href="https://pkg.go.dev/vuln/">pkg.go.dev/vuln</a>.
</p>
<p>
For the database schema, see
<a href="https://go.dev/security/vuln/database">go.dev/security/vuln/database</a>.
</p>
<p>
For details on Go vulnerability management, see
<a href="https://go.dev/security/vuln">go.dev/security/vuln</a>.
</p>
<p>
For privacy information about this service, see
<a href="https://vuln.go.dev/privacy">vuln.go.dev/privacy</a>.
</p>
<p>
For copyright and licensing information about the reports in this
database, see
<a href="https://vuln.go.dev/copyright">vuln.go.dev/copyright</a>.
</p>
</body>
</html>
|
webconfig
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/webconfig/privacy.html
|
<!--
Copyright 2022 The Go Authors. All rights reserved.
Use of this source code is governed by a BSD-style
license that can be found in the LICENSE file.
-->
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<title>Privacy Policy: Go Vulnerability Database</title>
<style>
body {
font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Helvetica, Arial, sans-serif;
font-size: 1rem;
line-height: normal;
}
</style>
</head>
<body>
<h1>Privacy Policy</h1>
<p>
The <code>govulncheck</code> command retrieves vulnerability information
for modules by connecting to the Go Vulnerability Database run by Google
(<a href="https://vuln.go.dev">vuln.go.dev</a>).
</p>
<p>
Clients send data in HTTP requests to this database, which logs standard HTTP information:
</p>
<ul>
<li>Request timestamp</li>
<li>IP address</li>
<li>Full request URL, including service domain and URI path being requested</li>
</ul>
<p>
We use this data for debugging. In general, we've built this tool to retain
as little information about usage as possible while still ensuring that we
are able to detect and fix problems.
</p>
<p>
We do not store logged identifiable information such as IP addresses for
more than 30 days. We also do not correlate or combine information from our
request logs with any personal information that you have provided Google
for other services.
</p>
<p>
If you'd like to read the main policy which govulncheck adheres to, see the
<a href="https://policies.google.com/privacy" target="_blank">Google
Privacy Policy</a>.
</p>
</body>
</html>
|
webconfig
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/webconfig/copyright.html
|
<!--
Copyright 2022 The Go Authors. All rights reserved.
Use of this source code is governed by a BSD-style
license that can be found in the LICENSE file.
-->
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<title>Copyright: Go Vulnerability Database</title>
<style>
body {
font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Helvetica, Arial, sans-serif;
font-size: 1rem;
line-height: normal;
}
</style>
</head>
<body>
<h1>Copyright</h1>
<p>
The Go Vulnerability Database is licensed under the
<a href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 License</a>.
</p>
<p>
The Go Vulnerability Database includes information from the following sources:
<ul>
<li>The Common Vulnerabilities and Exposures database
(<a href="https://cve.mitre.org/about/termsofuse.html">https://cve.mitre.org/about/termsofuse.html</a>)
<li>The GitHub Advisory Database
(<a href="https://github.com/advisories">https://github.com/advisories</a>)
</ul>
</p>
</body>
</html>
|
doc
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/doc/triage.md
|
# Handling Go Vulnerability Reports
NOTE: This document is somewhat outdated but still contains some valuable background / context. A newer [quickstart guide](quickstart.md) is in progress.
This document explains how we handle vulnerability issue triage in the
[x/vulndb issue tracker](http://github.com/golang/vulndb/issues).
## Reports
All vulnerabilities in the Go vulnerability database are currently stored as a
YAML file in the data/reports or data/excluded directory.
For a detailed explanation of the report format and style guide, see
[doc/format.md](format.md).
## Issue States
Any open issue should be in one of the following states:
- New (no label)
- Needs investigation
- Needs report
- Excluded
- Out of scope
Maintainers of the Go vulndb move issues from one state to another.
The intent behind these explicit states is to describe the (minimum)
next steps required to bring the issue to resolution.
### New (untriaged)
The issue has been filed by the vulndb worker or an external reporter.
The issue will have the title: `x/vulndb: potential Go vuln in <module/package>: <CVE ID and or GHSA ID>`.
To transition from this state, do one of the following:
- Label the issue as `NeedsInvestigation`, and discuss the issue with the team.
- Label the issue as `excluded: REASON`, and use the `vulnreport create-excluded` command
to create a CL.
- Label the issue as `NeedsReport`, and use the `vulnreport` tool to assist in creating a CL.
- Label the issue as `excluded: OUT_OF_SCOPE` and close the issue.
- Label the issue as `duplicate` and close the issue.
### Needs Investigation
Label: `NeedsInvestigation`
This state is used when it is not clear how to proceed. (Otherwise, an
issue can move straight to one of the other states.)
Make a plan to discuss the issue with the team to determine a course of action.
### Needs Report
Label: `NeedsReport`
The issue has been confirmed to be an in-scope Go vulnerability, and a report
needs to be added to `data/reports`.
### Excluded
Label: `excluded: REASON` where REASON is one of the possible
[excluded reasons](https://go.dev/security/vuln/database#excluded-reports).
The issue represents a reported vulnerability, but is not in scope for the
main `data/reports` folder. An "excluded" report needs to be added to `data/excluded`.
### Out-of-scope
Label: `excluded: OUT_OF_SCOPE` or `duplicate`.
The issue is out of scope for both the `data/reports` and `data/excluded` folders.
For example, it is an issue mistakenly posted to the tracker (`excluded: OUT_OF_SCOPE`)
or a duplicate (`duplicate`) of another issue.
The issue can be closed without further action.
## Adding new reports
### One-time setup
1. Clone the x/vulndb repository: `git clone https://go.googlesource.com/vulndb`.
2. Get a [GitHub access token](https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/creating-a-personal-access-token) with scope `repo: public_repo`
(follow instructions for "personal access token (classic)").
Store the token in a file, e.g., `~/.github-token`, and run:
``export VULN_GITHUB_ACCESS_TOKEN=`cat ~/.github-token` `` (you can also store
this command in a `~/.bashrc` file or similar).
3. (To use experimental generative AI features) Get a
[Gemini API key](https://aistudio.google.com/app/apikey).
As above, you can store the token in a file like `~/.gemini-api-key` and use
the environment variable `GEMINI_API_KEY`.
4. From the repo root, run `go install ./cmd/vulnreport` to install the latest
version of vulnreport tool.
### Add a new standard report (label `NeedsReport`)
1. Sync your git repo, re-install the vulnreport tool, and create a fresh branch.
2. From the repo root, run `vulnreport create <GitHub issue number>`.
The `vulnreport` tool will create a YAML report template for the CVE or GHSA
at the specified GitHub issue number.
Tips for the `vulnreport create` command:
- This command works for both regular reports and excluded reports, with
no flags or configuration needed.
- The command accepts multiple Github issue numbers (space separated),
and Github issue ranges (e.g., `vulnreport create 99 1000-1010` would
create reports for issue #99 and all issues from #1000 to #1010,
skipping any that are closed, do not exist, or already have reports.)
- Use the `-ai` flag to automatically populate a (first-draft)
AI-generated summary and description. (See
[Experimental Features](#experimental-features)).
- Use the `-symbols` flag to attempt to automatically populate vulnerable
symbols. (See [Experimental Features](#experimental-features)).
- By default, the `create` command attempts to find a GHSA for the
vulnerability and pull it from osv.dev. If this is not working, use
the `-cve` flag to use the CVE (rather than the GHSA) as the default
source, or the `-graphql` flag to pull GHSAs directly from Github's
GraphQL API.
3. Edit the report file template, following the guidance in [doc/format.md](format.md).
A few tips:
- If a person or organization is given credit in the CVE or GHSA, add the
name(s) to the `credits` field. Otherwise, delete the field.
- In the `vulnerable_at` field, put the highest version just before the
vuln is fixed. The pkgsite versions page can help with the list of
versions. The GitHub UI also makes it easy to list tags (click "Code",
then the dropdown that shows the current branch, then "Tags"). Walk the
versions backwards from the fixed one to find the highest that doesn't
contain the fix. (It might not be the immediately preceding version.)
- If the vulnerable functions cannot be auto-populated, add vulnerable
functions to the `symbols` list by reading the CVE, the fixing CLs, and the
code at the vulnerable version you chose above.
4. From the repo root, run `vulnreport fix <GitHub issue number>`.
This will lint the report, add exported symbols, and convert the YAML to OSV.
5. Once any errors are fixed, run `vulnreport commit <GitHub issue number>`.
This will create a git commit containing the new files with a standard commit
message. Commits are to the local git repository. The `vulnreport commit`
command also accepts multiple space-separated issue numbers, and will create
a separate commit for each report.
6. Send the commit for review and approval. See the Go
[contribution guide](https://go.dev/doc/contribute) for sending a change on
Gerrit.
7. If you make changes to the report during review, re-run
`vulnreport fix <GitHub issue number>` before re-mailing to update the OSV
and make sure the report is still valid.
### Batch add excluded reports (label `excluded: REASON`)
1. Sync your git repo, re-install the vulnreport tool, and create a fresh branch.
2. Run `vulnreport create-excluded`.
This will batch create YAML reports for all issues with the
`excluded: REASON` label. If there is an error creating any given report,
the skipped issue number will be printed to stdout and that issue will have
to be created manually with `vulnreport create <Github issue number>`.
(see steps 2-4 above for more information).
Additionally, `create-excluded` will automatically create a single commit for
all successful reports. To skip this auto-commit step, use the `-dry` flag.
3. Send the commit for review and approval. See the Go
[contribution guide](https://go.dev/doc/contribute) for sending a change on
Gerrit.
## Handling duplicates
Sometimes an issue describes a vulnerability that we already have a report for.
The worker doesn't always detect this automatically, so it is a good idea to
grep the `/data` directory of this repo for the module path and read the
report to see if the vulns are the same.
**NEW:** The command `vulnreport duplicates` (with no args) can find likely
duplicates on the issue tracker.
If the issue is indeed a duplicate:
1. Apply the label `duplicate` to the issue.
2. Find the duplicate issue (say it is #NNN) in the issue tracker, and on the
current issue, write the comment "Duplicate of #NNN". (No period after the
number.)
3. If a report has already been created for #NNN:
1. Find the report yaml file (say GO-YYYY-NNNN.yaml) in `data/reports`, and add
the duplicate IDs to the `cves` or `ghsas` section, as appropriate.
Running `vulnreport fix` can sometimes find the IDs automatically.
(If the duplicate IDs are already present, close the GH issue.)
2. On a new branch, run `vulnreport -up commit NNN` to update generated files
and create a commit. Edit the generated commit message so that it includes
the words "add aliases".
You can also add "Fixes #DDDD" (the number of the duplicate issue) to the
commit message, or close it manually.
3. Mail the commit.
4. If no report has been created for #NNN yet, make sure the duplicate ID is present
somewhere in issue #NNN for reference, and close the duplicate issue.
## Standard Library Reports
When adding a vulnerability report about the standard library, ensure that the
references section follows this format:
```yaml
references:
- report: https://go.dev/issue/<#>
- fix: https://go.dev/cl/<#>
- web: https://groups.google.com/g/golang-announce/c/<XXX>/<YYY>
```
You can find these links in the golang-announce@ email for the security release
fixing this vulnerability.
**Report:** The Github issue will be listed in the golang-announce@ email.
**Fix:** The PR will be a go.dev/cl/<#> link, found as a gopherbot comment on
the issue for the vulnerability.
**Web:** The golang-announce email link.
## Updating a report
Occasionally, we will receive new information about a Go vulnerability and want
to update the existing report.
In that case, reopen the issue for the report to discuss the change, rather
than create a new issue.
The command `vulnreport -up commit NNN` can be used to create a more sensible
commit message when committing an updated report.
## Experimental features
### AI-generated summary and description
The command `vulnreport suggest <Github issue number>` uses Gemini to
create AI-generated summaries and descriptions for a report. The `-i`
(interactive) flag gives the option of applying the suggestions directly
to the YAML file.
### Automatic symbol population
The command `vulnreport symbols <Github issue number>` uses the commit
link(s) in the report to find a list of possibly vulnerable functions
(functions that were present in the parent commit and were changed by
the patch). Currently, this command cannot handle pull requests or
commits with multiple parents.
## Frequent issues during triage
This section describes frequent issues that come up when triaging vulndb reports.
### vulnreport cgo failures
When `vulnreport fix` fails with an error message like
```txt
/path/to/package@v1.2.3/foo.go:1:2: could not import C (no metadata for C)
````
a frequent cause is the local machine missing `C` library headers causing
typechecking of cgo packages to fail. The easiest workaround is to use
a machine with the development headers installed or to install them.
Commonly missing packages include:
- libgpgme-dev
- libdevmapper-dev
### "awaiting analysis"
When the NIST page says "AWAITING ANALYSIS", write the report; don't wait for them
to finish their analysis. "Awaiting analysis" just means that NVD hasn't yet looked
at the vulnerability and assigned a severity score/CWE etc. Since we don't care about
those pieces of information, we can ignore that banner and just create a report if
the vulnerability is in scope for our database.
|
doc
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/doc/quickstart.md
|
# Go Vulnerability Database Quickstart
[WORK IN PROGRESS]
This document is a quick guide our new (evolving) process for handling vulnerability issue triage in the
[x/vulndb issue tracker](http://github.com/golang/vulndb/issues).
For the original documentation, which is somewhat outdated, see our [old triage docs](triage.md).
## Quickstart
### Triage
1. If you haven't already, follow the [one-time-setup](#one-time-setup) process.
2. Sync the vulndb repo, re-install vulnreport and switch to a fresh branch, e.g.:
```bash
$ cd vulndb
$ git sync
$ go install ./cmd/vulnreport
$ git checkout -b reports
```
3. Auto-triage the outstanding issues by running
```bash
$ vulnreport triage
```
See [`vulnreport triage`](#vulnreport-triage) for more info
and options for this command.
4. All triaged reports (label: `triaged`) will need a report, except for duplicates. For all reports marked `possible duplicate`, determine if
the label is correct.
* If correct: replace the `possible duplicate` label with the `duplicate` label, add a comment exactly of the form "Duplicate of #NNN" where #NNN is number of the issue this is a duplicate of, and close the issue.
* If incorrect: remove the `possible duplicate` label and ensure the `triaged` label is present.
5. For all reports marked `possibly not Go`, determine if the label is correct by investigating the report to see if the vulnerability affects Go code.
* If correct: replace the `possibly not Go` label with the `excluded:NOT_GO_CODE` label.
* If incorrect: remove the `possibly not Go` label and ensure the `triaged` label is present.
Once labeled, you can create excluded reports for these using the `vulnreport create-excluded` command (See [the old docs](triage.md#batch-add-excluded-reports-label-excluded-reason) for usage).
Note: the excluded labels NOT_IMPORTABLE and EFFECTIVELY_PRIVATE are being deprecated.
The labels NOT_A_VULNERABILITY and DEPENDENT_VULNERABILITY are still acceptable, but it
is also OK to just create an unreviewed report for these types of vulns.
6. All remaining open issues marked `triaged` now need standard reports.
### Add standard reports
1. Issues marked `high priority` need a REVIEWED report, and issues without a priority label need an UNREVIEWED report. To create a report for issue #NNN, run:
```bash
$ vulnreport create NNN
```
The command knows whether to create a reviewed or unreviewed report based on the issue's label. (To override this decision, use flag `-status=UNREVIEWED` or `-status=REVIEWED`.)
2. Edit the report if needed. For reviewed reports, this follows the standard process. For unreviewed reports, only edit the report if it has lint/fix errors (which will be populated in the notes section).
3. Fix the report and add derived files:
```bash
$ vulnreport fix NNN
```
4. If `fix` fails, edit the report until it succeeds.
5. Commit the report:
```bash
$ vulnreport commit NNN
```
6. Mail the CL and add a team member as a reviewer.
## One-time setup
1. Clone the x/vulndb repository: `git clone https://go.googlesource.com/vulndb`.
2. Get a [GitHub access token](https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/creating-a-personal-access-token) with scope `repo: public_repo`
(follow instructions for "personal access token (classic)").
Store the token in a file, e.g., `~/.github-token`, and run:
``export VULN_GITHUB_ACCESS_TOKEN=`cat ~/.github-token` `` (you can also store
this command in a `~/.bashrc` file or similar).
3. From the repo root, run `go install ./cmd/vulnreport` to install the latest
version of vulnreport tool.
## Issue types
There are 4 types of issues on our tracker:
1. CVEs/GHSAs created automatically by the worker
2. Direct external reports from community members
3. Suggested edits from community members
4. Placeholder issues for first-party reports
The vast majority of issues are of the first type, and this document focuses on handling these.
## `vulnreport` commands
### `vulnreport triage`
Standard usage:
```bash
$ vulnreport triage
```
This command looks at all untriaged issues to find and label:
* High-priority issues (label: `high priority`) - issues that affect modules with >= 100 importers
* Possible duplicates (label: `possible duplicate`) - issues
that may be duplicates of another issue because they share a CVE/GHSA
* Possibly not Go (label: `possibly Not Go`) - issues that possibly do not affect Go at all. This is applied to modules
for which more than 20% of current reports are marked `excluded: NOT_GO_CODE`.
Arguments:
The `vulnreport triage` command also accepts arguments,
e.g. `vulnreport triage 123` to triage issue #123, but the duplicate search only works properly when applied to all open issues.
Flags:
* `-dry`: don't apply labels to issues
* `-f`: force re-triage of issues labeled `triaged`
|
doc
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/doc/format.md
|
# Vulnerability Report Format & Style Guide
The Go security team uses an internal YAML format to create vulnerability
reports, which are automatically converted to OSV JSON and served to the
vulnerability database at [vuln.go.dev](https://vuln.go.dev).
The YAML format is subject to change without warning and should not be
relied on by external tools. (See [go.dev/security/vuln/database](https://go.dev/security/vuln/database) for information on the public Go Vulnerability
database API and the OSV schema.)
This page documents the fields of the internal YAML file format.
## `id`
type `string`
**required**
The unique Go identifier assigned to this report.
This is automatically assigned via `vulnreport create`. It should be of
the form `GO-YYYY-NNNN` where `YYYY` is the year the report was created,
and `NNNN` is the x/vulndb issue tracker number associated with the report.
## `modules`
type `[]module`
**required**
Information on each Go module affected by the vulnerability.
### `module.module`
type `string`
**required**
The module path of the vulnerable module.
Use `"std"` for vulnerabilities in the standard library.
Use `"cmd"` for vulnerabilities in the Go tools (`cmd/...`).
### `module.versions`
type `[]version`
The version ranges in which the package is vulnerable.
If omitted, it is assumed that _every_ version of the module is
vulnerable.
Versions must be SemVer 2.0.0 versions, with no "v" or "go" prefix.
Version ranges must not overlap.
Don't expend effort finding the first `introduced` version unless
it's obvious.
The version ranges in announcements, CVE text, GHSAs, and so forth are
frequently wrong. Always verify the fixed version from the repository history.
If the vulnerability is fixed in multiple minor versions, define sorted,
non-overlapping version ranges thats describe the affected revisions.
For example, for a fix in 1.17.2, 1.18.4, and 1.19.0:
```yaml
- fixed: 1.17.2
- introduced: 1.18.0
fixed: 1.18.4
```
Note that we don't need to mention 1.19.0 in the version ranges, since it
comes after 1.18.4.
#### `version.introduced`
type `string`
The version at which the vulnerability was introduced.
If this field is omitted, it is assumed that every version, from the
initial commit, up to the `fixed` version is vulnerable.
#### `version.fixed`
type `string`
The version at which the vulnerability was fixed.
If this field is omitted, it is assumed that every version since the
`introduced` version is vulnerable.
### `module.non_go_versions`
type `string`
(Optional - used only in special cases, usually for binary reports.)
The non-Go version range(s) at which the package is vulnerable.
A non-Go version range can be used to specify versions used by
module maintainers that do not conform to [Go's module
version conventions](https://go.dev/doc/modules/version-numbers).
An example is data/reports/GO-2024-2539.yaml, whose vulnerable versions
are listed as:
```yaml
versions:
- fixed: 1.1.2-0.20230830170046-f4cf4c6de017
non_go_versions:
- fixed: 4.0.0-rc2
vulnerable_at: 1.1.2-0.20230829214939-57856e474934
```
The [GHSA](https://github.com/advisories/GHSA-4fp6-574p-fc35) for this report
lists a fixed version, `4.0.0-rc2`, which is not known to the module proxy.
To encode this, we list that version as a "non-Go" version, and put the
pseudo-version corresponding to the fix commit in the regular `versions` section.
### `module.vulnerable_at`
type `string`
The version at which the vulnerable symbols were obtained. Ideally, this
is the version just prior to the fix.
In many cases, this can be inferred automatically via `vulnreport fix`.
### `module.vulnerable_at_requires`
type `[]string`
List of module@version to require when performing static analysis.
It is rare that we need to specify this.
Example from [GO-2021-0072](../data/reports/GO-2021-0072.yaml):
```yaml
vulnerable_at_requires:
- github.com/Sirupsen/logrus@v1.0.6
```
### `module.packages`
type `[]package`
**required**
Information on each package affected by the vulnerability.
Include every importable package containing a root vulnerable symbol.
If `"internal/foo".F` is vulnerable and `"foo".F` calls it, only include
the innermost (internal) package.
If a vulnerability occurs in multiple major versions of a module,
include an entry for each major version.
#### `package.package`
type `string`
**required**
The import path of the vulnerable package.
#### `package.symbols`
type `[]string`
The symbols affected by this vulnerability.
If included, only programs which use these symbols will be marked as
vulnerable. If omitted, any program which imports this module will be
marked vulnerable.
These should be the symbols initially detected or identified in the CVE
or other source.
#### `package.derived_symbols`
type `[]string`
Derived symbols that are calculated from `symbols`,
such as by static analysis tools like `govulncheck`.
This is generated automatically by the `vulnreport fix` command.
Don't edit this field manually.
Potentially, the set of derived symbols can differ with the module
version. We don't attempt to capture that level of detail. Most of the
values of `derived_symbols` as of this writing were obtained from a
module version that was just prior to the version that the report
listed as fixed.
#### `package.skip_fix`
type `string`
A text justification for why static analysis should not be performed
on this package (perhaps because it causes an error). It is rare
that we need to specify this.
## `summary`
type `string`
**required**
A short (<=100 characters) textual description of the vulnerability,
usually of the form "PROBLEM in MODULE(s)", e.g:
`summary: "Man-in-the-middle attack in golang.org/x/crypto/ssh`.
To allow for easy visual differentiation, each report must have a unique
summary.
## `description`
type `string`
**required** if first-party.
Optional for third-party when there is an advisory link.
A textual description of the vulnerability and its impact. Should be
wrapped to 80 columns. Does not use Markdown formatting.
The first paragraph should be a short, succinct description of the
nature and impact of the vulnerability, ideally one line. Assume
the person reading this knows what the vulnerable package does.
Use additional paragraphs to describe the issue in more detail as
necessary.
Use the present tense: "This is vulnerable" rather than "this was
vulnerable".
This field may be omitted for third-party reports that have an
external canonical advisory linked in the references section.
## `published`
type `time.Time`
(Handled automatically, do not edit manually)
Date the report was added to the vulnerability database.
This is normally determined from the git repository history, and
does not need to be set in the report YAML except when the first
commit of the report YAML doesn't match the publication date.
Older reports moved from a previous location have this set.
## `last_modified`
type `time.Time`
(Handled automatically, do not edit manually)
Last time the report was changed. This is normally determined from
the repository history, and does not need to be set in the report
YAML.
## `cves`
type `[]string`
The Common Vulnerabilities and Exposures (CVE) ID(s) for the
vulnerability.
## `ghsas`
type `[]string`
The GitHub Security Advisory (GHSA) IDs for the vulnerability.
## `credits`
type `[]string`
The name(s) of the person/organization that discovered/reported the
vulnerability.
This should be filled in for Go project reports (standard library,
golang.org/x, etc.). Use the text from the golang-announce email
when available.
For third-party reports, if `vulnreport create` finds CVE or GHSA metadata, use
that. Also, look for a "Credits" heading on the GHSA report linked from the
GitHub issue. Otherwise, it's okay to leave this blank.
## `references`
type `[]reference`
Links to further information about the vulnerability.
Include a `fix` link to the fix pull request, Gerrit code review, or commit.
No need to link both the PR and the commit.
Prefer to link to the PR or code review rather than the commit.
Don't include links to CVEs and GHSAs just because they exist.
(That's what the cve/ghsa fields are for.)
DO include an `advisory` link to an authoritative *first-party*
advisory when one exists.
If the first-party advisory is a GHSA, then link to that.
If the first-party advisory is a CVE, then link to the CVE page on
nvd.nist.gov/vuln.
Include a `report` link to a first-party bug or issue when one exists.
Don't include links to random third-party issue trackers (e.g.,
Debian announcements). CVEs often contain a bunch of random links
of dubious value; be aggressive in pruning these out.
The internal representation of a `Reference` is a struct with `Type`
and `URL` fields. For convenience, the YAML representation is a
single-element map from type to URL. For example:
```yaml
references:
- fix: https://go.dev/cl/25010
- report: https://go.dev/issue/16405
```
### `reference.type`
type `string`
The type of reference, as in the
[OSV references field](https://ossf.github.io/osv-schema/#references-field).
OSV types are upper-case, but the type in the YAML should be lower case.
Types we use:
* `ADVISORY`: A link to an authoritative, first-party advisory.
* `ARTICLE`: An article or blog post about the vulnerability.
* `REPORT`: A bug or issue tracker link.
* `FIX`: A link to the PR/CL which fixes the vulnerability.
* `PACKAGE`: The home page for the package. (We usually do not include this.)
* `EVIDENCE`: A demonstration of the vulnerability. (We usually do not include this.)
* `WEB`: Anything that doesn't fit into the above.
### `reference.url`
type `string`
The URL of the reference.
## `cve_metadata`
type `cve_metadata`
Information used to generate a CVE record based on this report. This
should be populated only if the Go CNA assigned the CVE for this report.
### `cve_metadata.id`
type `string`
The CVE ID assigned by the Go CNA for this report.
### `cve_metadata.cwe`
type `string`
The [CWE](https://cwe.mitre.org/index.html) most closely associated
with this vulnerability, of the form "CWE-XXX: Description".
### `cve_metadata.description`
type `string`
The description of the vulnerability to use in the CVE record. If blank,
the top-level description is used.
This was used to preserve existing descriptions. For new reports, this
does not need to be set.
### `cve_metadata.references`
type `[]string`
References that should be published in the CVE record, but not the OSV
record. This is used to preserve references added by the CVE program,
and is rarely used.
Example: [GO-2022-0476](../data/reports/GO-2022-0476.yaml)
## `notes`
type `[]string`
Optional, freeform notes about the report. This field is ignored when creating
OSV and CVE records, so it does not need to be polished.
It can be used to document decisions made when creating the report,
outstanding issues, or anything else worth mentioning.
## `source`
**required** for new reports
Auto-generated metadata indicating the source of this report.
### `source.id`
type `string`
The CVE or GHSA ID of the vulnerability used to generate this report.
For original reports, this is "go-security-team".
### `source.created`
type `string`
The timestamp at which the report was generated based on the indicated source.
## `review_status`
type `string`
**required**
The status of this report, either UNREVIEWED or REVIEWED.
Unreviewed reports are generally auto-generated or nearly so. Their
details have not been verified and no attempt has been made to determine
packages or symbols. These reports must have an advisory link.
Reviewed reports are reports for which we have made a good faith effort
to determine correct affected versions, packages, and symbols. (In some
cases it is not possible to determine all of these, which is OK). Descriptions
are optional, except for reports affecting the Go standard library, toolchain
or x/ repos.
## `excluded`
type `string`
A reason the report is excluded from the database.
When a CVE or GHSA is evaluated and determined to be out of scope
for the Go Vulnerability Database, the reason for excluding it may
be recorded in a report. This report should include a value for the
`excluded` enum (this field) as well as a list of CVEs and/or GHSAs.
Excluded reports are placed in the `excluded/` directory.
Valid values are:
* `NOT_GO_CODE`: The vulnerability is not in a Go package, and
cannot affect any Go packages. (For example, a vulnerability in
a C++ library.)
* `NOT_IMPORTABLE`: The vulnerability occurs in package `main`,
an `internal/` package only imported by package `main`, or some
other location which can never be imported by another module.
* `EFFECTIVELY_PRIVATE`: While the vulnerability occurs in a Go
package which can be imported by another module, the package is
not intended for external use and is not likely to ever be imported
outside the module in which it is defined.
* `DEPENDENT_VULNERABILITY`: This vulnerability is a subset of another
vulnerability in the database. For example, if package A contains a
vulnerability, package B depends on package A, and there are separate
CVEs for packages A and B, we might mark the report for B as a dependent
vulnerability entirely superseded by the report for A.
* `NOT_A_VULNERABILITY`: While a CVE or GHSA has been assigned,
there is no known vulnerability associated with it.
* `LEGACY_FALSE_POSITIVE`: This is the label used for excluded reports
that were marked as false positive in the initial triage process (in 2020),
before we stored excluded reports in the repo. This label must not be used
for any new reports.
## Example Reports
* Standard library: [GO-2021-0067](../data/reports/GO-2021-0067.yaml)
* Toolchain: [GO-2021-0068](../data/reports/GO-2021-0068.yaml)
* x/ repo: [GO-2020-0012](../data/reports/GO-2020-0012.yaml)
* Third-party: [GO-2021-0075](../data/reports/GO-2021-0075.yaml)
* Excluded:[GO-2022-0559](../data/excluded/GO-2022-0559.yaml)
|
doc
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/doc/worker.md
|
# worker
`worker` is a binary that can act as both a CLI and a web server.
With no command-line arguments, it listens for HTTP traffic at the `PORT`
environment variable. There is no reason to run the server locally (except
debugging), so this document describes only the CLI.
The CLI can display Firestore database of CVE records, update the database from
commits of the CVE repo github.com/CVEProject/cvelist, and file issues.
## Setup
You will need a Google Cloud account and a project to run the worker. If you
don't already have default credentials on your machine, set them up with
```
gcloud auth application-default login
```
To run most CLI commands you'll need a `-project` flag, to specify the GCP
project where the Firestore DB resides. Since there is only one Firestore DB per
project and we want multiple, independent DBs, we also require a string called the
"namespace," specified with `-namespace`.
## update COMMIT
The update command takes a commit hash from the github.com/CVEProject/cvelist
repo, and modifies the DB to match the commit, creating and modifying CVE
records as needed. It does not file any issues; it only categorizes CVEs as
needing issues, not requiring action, and so on.
The command
```
worker -project go-vuln -namespace test update HEAD
```
will clone the cvelist repo from github and update the `test` namespace with the
most recent commit of the repo. It will contact pkg.go.dev to determine whether
URLs are modules.
To update at a different commit, or just to avoid the clone, clone the repo
locally and provide a path to it:
```
worker -project go-vuln -namespace test \
-local-cve-repo ~/repos/github.com/CVEProject/cvelist \
update cb2d8ae8ac0afed043d0fd99669e1aaac42e8b69
```
To avoid hitting pkg.go.dev, compile a file of known module paths, one per line,
and pass it as well:
```
worker -project go-vuln -namespace test \
-local-cve-repo ~/repos/github.com/CVEProject/cvelist \
-known-module-file ~/module-paths.txt \
update cb2d8ae8ac0afed043d0fd99669e1aaac42e8b69
```
If an update is interrupted or fails to complete, subsequent calls to `worker
update` will fail. If you're sure there is no concurrent update in progress, it
is safe to pass the `-force` flag to force the update.
## list-cves
The command
```
worker -project go-vuln -namespace test list-cves NeedsIssue
```
will list all CVE records that need an issue. You can also use these other
argument values (from internal/worker/store/store.go:TriageState):
- IssueCreated
- UpdatedSinceIssueCreation
- HasVuln
- FalsePositive
It's not recommended to pass the "NoActionNeeded" triage state, because the vast
majority of records have this state and listing them takes a long time.
## create-issues
To create issues from records that need them, use the `create-issues` subcommand
and provide a repo and the path to a file that holds a GitHub access token.
You can also limit the number of issues created.
```
worker -project go-vuln -namespace test \
-issue-repo myorg/myrepo \
-ghtokenfile ~/github-token \
-limit 10 \
create-issues
```
## list-updates
This subcommand shows the update operations that have run, most to least recent.
## show
Run `show` with a list of CVE IDs to display the corresponding CVE records.
|
internal
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/internal.go
|
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Package internal contains functionality for x/vulndb.
package internal
import (
"bufio"
"os"
"strings"
"golang.org/x/vulndb/internal/derrors"
)
// Readfilelines reads and returns the lines from a file.
// Whitespace on each line is trimmed.
// Blank lines and lines beginning with '#' are ignored.
func ReadFileLines(filename string) (lines []string, err error) {
defer derrors.Wrap(&err, "ReadFileLines(%q)", filename)
f, err := os.Open(filename)
if err != nil {
return nil, err
}
defer f.Close()
s := bufio.NewScanner(f)
for s.Scan() {
line := strings.TrimSpace(s.Text())
if line == "" || strings.HasPrefix(line, "#") {
continue
}
lines = append(lines, line)
}
if s.Err() != nil {
return nil, s.Err()
}
return lines, nil
}
|
issues
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/issues/issues.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Package issues provides a general way to interact with issues,
// and a client for interacting with the GitHub issues API.
package issues
import (
"context"
"fmt"
"net/url"
"slices"
"time"
"github.com/google/go-github/v41/github"
"golang.org/x/oauth2"
"golang.org/x/vulndb/internal/derrors"
)
// Issue represents a GitHub issue.
type Issue struct {
Number int
Title string
Body string
State string
Assignee string
Labels []string
CreatedAt time.Time
}
// IssuesOptions are options for Issues
type IssuesOptions struct {
// State filters issues based on their state. Possible values are: open,
// closed, all. Default is "open".
State string
// Labels filters issues based on their label.
Labels []string
}
// Client is a shallow client for a github.Client.
type Client struct {
GitHub *github.Client
Owner string
Repo string
}
// Config is used to initialize a new Client.
type Config struct {
// Owner is the owner of a GitHub repo. For example, "golang" is the owner
// for github.com/golang/vulndb.
Owner string
// Repo is the name of a GitHub repo. For example, "vulndb" is the repo
// name for github.com/golang/vulndb.
Repo string
// Token is access token that authorizes and authenticates
// requests to the GitHub API.
Token string
}
// NewClient creates a Client that will create issues in
// the a GitHub repo.
func NewClient(ctx context.Context, cfg *Config) *Client {
ts := oauth2.StaticTokenSource(&oauth2.Token{AccessToken: cfg.Token})
tc := oauth2.NewClient(ctx, ts)
c := github.NewClient(tc)
return &Client{
GitHub: c,
Owner: cfg.Owner,
Repo: cfg.Repo,
}
}
// NewTestClient creates a Client for use in tests.
func NewTestClient(ctx context.Context, cfg *Config, baseURL *url.URL) *Client {
c := NewClient(ctx, cfg)
c.GitHub.BaseURL = baseURL
c.GitHub.UploadURL = baseURL
return c
}
// Destination returns the URL of the Github repo.
func (c *Client) Destination() string {
return fmt.Sprintf("https://github.com/%s/%s", c.Owner, c.Repo)
}
// Reference returns the URL of the given issue.
func (c *Client) Reference(num int) string {
return fmt.Sprintf("%s/issues/%d", c.Destination(), num)
}
// IssueExists reports whether an issue with the given ID exists.
func (c *Client) IssueExists(ctx context.Context, number int) (_ bool, err error) {
defer derrors.Wrap(&err, "IssueExists(%d)", number)
iss, _, err := c.GitHub.Issues.Get(ctx, c.Owner, c.Repo, number)
if err != nil {
return false, err
}
if iss != nil {
fmt.Printf("ID = %d, Number = %d\n", iss.GetID(), iss.GetNumber())
return true, nil
}
return false, nil
}
// convertGithubIssueToIssue converts a github.Issue to an Issue.
func convertGithubIssueToIssue(ghIss *github.Issue) *Issue {
iss := &Issue{}
if ghIss.Number != nil {
iss.Number = *ghIss.Number
}
if ghIss.Title != nil {
iss.Title = *ghIss.Title
}
if ghIss.Number != nil {
iss.Number = *ghIss.Number
}
if ghIss.Body != nil {
iss.Body = *ghIss.Body
}
if ghIss.CreatedAt != nil {
iss.CreatedAt = *ghIss.CreatedAt
}
if ghIss.State != nil {
iss.State = *ghIss.State
}
if ghIss.Assignee != nil {
iss.Assignee = ghIss.Assignee.GetLogin()
}
if ghIss.Labels != nil {
iss.Labels = make([]string, len(ghIss.Labels))
for i, label := range ghIss.Labels {
iss.Labels[i] = label.GetName()
}
}
return iss
}
// Issue returns the issue with the given issue number.
func (c *Client) Issue(ctx context.Context, number int) (_ *Issue, err error) {
defer derrors.Wrap(&err, "Issue(%d)", number)
ghIss, _, err := c.GitHub.Issues.Get(ctx, c.Owner, c.Repo, number)
if err != nil {
return nil, err
}
iss := convertGithubIssueToIssue(ghIss)
return iss, nil
}
// Issues returns all Github issues that match the filters in opts.
func (c *Client) Issues(ctx context.Context, opts IssuesOptions) (_ []*Issue, err error) {
defer derrors.Wrap(&err, "Issues()")
clientOpts := &github.IssueListByRepoOptions{
State: opts.State,
Labels: opts.Labels,
ListOptions: github.ListOptions{
PerPage: 100,
},
}
issues := []*Issue{}
page := 1
for {
clientOpts.ListOptions.Page = page
pageIssues, resp, err := c.GitHub.Issues.ListByRepo(ctx, c.Owner, c.Repo, clientOpts)
if err != nil {
return nil, err
}
for _, giss := range pageIssues {
if giss.IsPullRequest() {
continue
}
issues = append(issues, convertGithubIssueToIssue(giss))
}
if resp.NextPage == 0 {
break
}
page = resp.NextPage
}
return issues, nil
}
// CreateIssue creates a new issue.
func (c *Client) CreateIssue(ctx context.Context, iss *Issue) (number int, err error) {
defer derrors.Wrap(&err, "CreateIssue(%s)", iss.Title)
req := &github.IssueRequest{
Title: &iss.Title,
Body: &iss.Body,
}
if len(iss.Labels) > 0 {
req.Labels = &iss.Labels
}
giss, _, err := c.GitHub.Issues.Create(ctx, c.Owner, c.Repo, req)
if err != nil {
return 0, err
}
return giss.GetNumber(), nil
}
func (c *Client) SetLabels(ctx context.Context, issNum int, labels []string) (err error) {
defer derrors.Wrap(&err, "AddLabels(%d, %s)", issNum, labels)
req := &github.IssueRequest{
Labels: &labels,
}
_, _, err = c.GitHub.Issues.Edit(ctx, c.Owner, c.Repo, issNum, req)
if err != nil {
return err
}
return nil
}
// NewGoID creates a Go advisory ID based on the issue number
// and time of issue creation.
func (iss *Issue) NewGoID() string {
var year int
if !iss.CreatedAt.IsZero() {
year = iss.CreatedAt.Year()
}
return fmt.Sprintf("GO-%04d-%04d", year, iss.Number)
}
func (iss *Issue) HasLabel(label string) bool {
return slices.Contains(iss.Labels, label)
}
|
issues
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/issues/issues_test.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package issues_test
import (
"context"
"fmt"
"net/http"
"strconv"
"strings"
"testing"
"github.com/google/go-cmp/cmp"
"github.com/google/go-cmp/cmp/cmpopts"
"golang.org/x/vulndb/internal/issues"
"golang.org/x/vulndb/internal/issues/githubtest"
)
var testConfig = &issues.Config{
Owner: githubtest.TestOwner,
Repo: githubtest.TestRepo,
Token: githubtest.TestToken,
}
func TestClient(t *testing.T) {
client, _ := githubtest.Setup(context.Background(), t, testConfig)
want := fmt.Sprintf("https://github.com/%s/%s", githubtest.TestOwner, githubtest.TestRepo)
if got := client.Destination(); got != want {
t.Fatalf("client.Destination(): %q; want = %q", got, want)
}
want = fmt.Sprintf("https://github.com/%s/%s/issues/2", githubtest.TestOwner, githubtest.TestRepo)
if got := client.Reference(2); got != want {
t.Fatalf("client.Reference(): %q; want = %q", got, want)
}
}
func TestCreateIssue(t *testing.T) {
c, mux := githubtest.Setup(context.Background(), t, testConfig)
want := 15
mux.HandleFunc(fmt.Sprintf("/repos/%s/%s/issues", githubtest.TestOwner, githubtest.TestRepo), func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, "POST")
fmt.Fprintf(w, `{"number":%d}`, want)
})
ctx := context.Background()
input := &issues.Issue{Title: "title", Body: "body"}
got, err := c.CreateIssue(ctx, input)
if err != nil {
t.Fatalf("c.CreateIssue: %v", err)
}
if got != want {
t.Errorf("c.CreateIssue(ctx, %v) = %d; got = %d", input, got, want)
}
}
func TestIssueAndIssueExists(t *testing.T) {
c, mux := githubtest.Setup(context.Background(), t, testConfig)
want := &issues.Issue{
Number: 7,
Title: "title",
Body: "body",
}
mux.HandleFunc(fmt.Sprintf("/repos/%s/%s/issues/%d", githubtest.TestOwner, githubtest.TestRepo, want.Number), func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, "GET")
if strings.HasSuffix(r.URL.Path, strconv.Itoa(want.Number)) {
fmt.Fprintf(w, `{"number":%d, "title":%q, "body":%q}`, want.Number, want.Title, want.Body)
return
}
})
ctx := context.Background()
got, err := c.Issue(ctx, want.Number)
if err != nil {
t.Fatal(err)
}
if diff := cmp.Diff(want, got); diff != "" {
t.Errorf("unexpected diff (want-, got+):\n%s", diff)
}
got2, err := c.IssueExists(ctx, want.Number)
if err != nil {
t.Fatal(err)
}
if !got2 {
t.Errorf("c.IssueExist(ctx, %d) = %t; want = true", want.Number, got2)
}
}
func TestIssues(t *testing.T) {
c, mux := githubtest.Setup(context.Background(), t, testConfig)
iss := &issues.Issue{
Number: 1,
Title: "vuln worker test",
Body: "test of go.googlesource.com/vulndb/internal/issues",
State: "open",
}
iss2 := &issues.Issue{
Number: 2,
Title: "vuln worker test2",
Body: "test of go.googlesource.com/vulndb/internal/issues",
State: "open",
}
mux.HandleFunc(fmt.Sprintf("/repos/%s/%s/issues", githubtest.TestOwner, githubtest.TestRepo), func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, "GET")
fmt.Fprintf(w, `[{"number":%d, "title":%q, "body":%q, "state":%q},{"number":%d, "title":%q, "body":%q, "state":%q}]`,
iss.Number, iss.Title, iss.Body, iss.State, iss2.Number, iss2.Title, iss2.Body, iss2.State)
})
ctx := context.Background()
want := []*issues.Issue{iss, iss2}
got, err := c.Issues(ctx, issues.IssuesOptions{State: "open"})
if err != nil {
t.Fatal(err)
}
if diff := diffIssues(want, got); diff != "" {
t.Errorf("mismatch (-want, +got):\n%s", diff)
}
}
func testMethod(t *testing.T, r *http.Request, want string) {
t.Helper()
if got := r.Method; got != want {
t.Errorf("Request method: %v, want %v", got, want)
}
}
func diffIssues(want, got []*issues.Issue) string {
byTitle := func(a, b *issues.Issue) bool { return a.Title < b.Title }
return cmp.Diff(want, got, cmpopts.SortSlices(byTitle),
cmpopts.IgnoreFields(issues.Issue{}, "CreatedAt"))
}
|
issues
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/issues/real_test.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
//go:build go1.17
// +build go1.17
package issues
import (
"context"
"flag"
"fmt"
"os"
"testing"
"github.com/google/go-cmp/cmp"
"github.com/google/go-cmp/cmp/cmpopts"
"golang.org/x/vulndb/internal/gitrepo"
)
var (
githubRepo = flag.String("repo", "", "GitHub repo (in form owner/repo) to test issues")
githubToken = flag.String("ghtoken", os.Getenv("VULN_GITHUB_ACCESS_TOKEN"), "GitHub access token")
)
func diffIssue(want, got *Issue) string {
return cmp.Diff(want, got,
cmpopts.IgnoreFields(Issue{}, "CreatedAt"))
}
func diffIssues(want, got []*Issue) string {
byTitle := func(a, b *Issue) bool { return a.Title < b.Title }
return cmp.Diff(want, got, cmpopts.SortSlices(byTitle),
cmpopts.IgnoreFields(Issue{}, "CreatedAt"))
}
func TestRealClient(t *testing.T) {
t.Run("github", func(t *testing.T) {
if *githubRepo == "" {
t.Skip("skipping: no -repo flag")
}
if *githubRepo == "golang/vulndb" {
t.Skip("Do not use x/vulndb as the test repo. Create a personal test repo instead.")
}
owner, repo, err := gitrepo.ParseGitHubRepo(*githubRepo)
if err != nil {
t.Fatal(err)
}
if *githubToken == "" {
t.Fatal("need -ghtoken")
}
testClient(t, NewClient(context.Background(), &Config{Owner: owner, Repo: repo, Token: *githubToken}))
})
}
func testClient(t *testing.T, c *Client) {
ctx := context.Background()
iss := &Issue{
Title: "vuln worker test",
Body: "test of go.googlesource.com/vulndb/internal/issues",
Labels: []string{"testing"},
State: "open",
}
iss2 := &Issue{
Title: "vuln worker test2",
Body: "test of go.googlesource.com/vulndb/internal/issues",
Labels: []string{"testing", "other"},
State: "open",
}
num, err := c.CreateIssue(ctx, iss)
iss.Number = num
if err != nil {
t.Fatal(err)
}
gotExists, err := c.IssueExists(ctx, num)
if err != nil {
t.Fatal(err)
}
if !gotExists {
t.Error("created issue doesn't exist")
}
gotIss, err := c.Issue(ctx, num)
if err != nil {
t.Fatal(err)
}
if diff := diffIssue(iss, gotIss); diff != "" {
fmt.Printf("%v", *gotIss)
t.Errorf("mismatch (-want, +got):\n%s", diff)
}
num2, err := c.CreateIssue(ctx, iss2)
iss2.Number = num2
if err != nil {
t.Fatal(err)
}
want := []*Issue{iss, iss2}
got, err := c.Issues(ctx, IssuesOptions{Labels: []string{"testing"}})
if err != nil {
t.Fatal(err)
}
if diff := diffIssues(want, got); diff != "" {
t.Errorf("mismatch (-want, +got):\n%s", diff)
}
want = []*Issue{iss2}
got, err = c.Issues(ctx, IssuesOptions{Labels: []string{"other"}})
if err != nil {
t.Fatal(err)
}
if diff := diffIssues(want, got); diff != "" {
t.Errorf("mismatch (-want, +got):\n%s", diff)
}
}
|
githubtest
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/issues/githubtest/setup.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Package githubtest provides a test client and server for testing the GitHub API
// client.
package githubtest
import (
"context"
"net/http"
"net/http/httptest"
"net/url"
"testing"
"golang.org/x/vulndb/internal/issues"
)
const (
TestOwner = "test-owner"
TestRepo = "test-repo"
TestToken = "test-token"
testBaseURLPath = "/api-test"
)
// Setup sets up a test HTTP server along with a issues.Client that is
// configured to talk to that test server.
func Setup(ctx context.Context, t *testing.T, cfg *issues.Config) (*issues.Client, *http.ServeMux) {
mux := http.NewServeMux()
apiHandler := http.NewServeMux()
apiHandler.Handle(testBaseURLPath+"/", http.StripPrefix(testBaseURLPath, mux))
server := httptest.NewServer(apiHandler)
url, _ := url.Parse(server.URL + testBaseURLPath + "/")
client := issues.NewTestClient(ctx, cfg, url)
t.Cleanup(server.Close)
return client, mux
}
|
osvutils
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/osvutils/affects_test.go
|
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package osvutils
import (
"errors"
"testing"
"golang.org/x/vulndb/internal/osv"
)
func TestAffectsSemver(t *testing.T) {
tests := []struct {
name string
Ranges []osv.Range
version string
want bool
}{
{
name: "single introduced:0",
Ranges: []osv.Range{{Type: osv.RangeTypeSemver, Events: []osv.RangeEvent{{Introduced: "0"}}}},
version: "10.0.0",
want: true,
},
{
// 1.0.0 < 2.0.0
name: "inside osv.Range with introduced=0<v<fixed",
Ranges: []osv.Range{{Type: osv.RangeTypeSemver, Events: []osv.RangeEvent{{Introduced: "0"}, {Fixed: "2.0.0"}}}},
version: "1.0.0",
want: true,
},
{
// v0.0.1 <= v1.0.0
name: "inside osv.Range with introduced<v",
Ranges: []osv.Range{{Type: osv.RangeTypeSemver, Events: []osv.RangeEvent{{Introduced: "0.0.1"}}}},
version: "1.0.0",
want: true,
},
{
// v1.0.0 <= v1.0.0
name: "inside osv.Range with introduced=v",
Ranges: []osv.Range{{Type: osv.RangeTypeSemver, Events: []osv.RangeEvent{{Introduced: "1.0.0"}}}},
version: "1.0.0",
want: true,
},
{
// v1.0.0 <= v1.0.0 < v2.0.0
name: "inside osv.Range with introduced=v<fixed",
Ranges: []osv.Range{{Type: osv.RangeTypeSemver, Events: []osv.RangeEvent{{Introduced: "1.0.0"}, {Fixed: "2.0.0"}}}},
version: "1.0.0",
want: true,
},
{
// v0.0.1 <= v1.0.0 < v2.0.0
name: "inside osv.Range with introduced<v<fixed",
Ranges: []osv.Range{{Type: osv.RangeTypeSemver, Events: []osv.RangeEvent{{Introduced: "0.0.1"}, {Fixed: "2.0.0"}}}},
version: "1.0.0",
want: true,
},
{
// v2.0.0 < v3.0.0
name: "outside osv.Range with introduced<fixed<v",
Ranges: []osv.Range{{Type: osv.RangeTypeSemver, Events: []osv.RangeEvent{{Introduced: "1.0.0"}, {Fixed: "2.0.0"}}}},
version: "3.0.0",
want: false,
},
{
// v1.0.0 < v2.0.0
name: "outside osv.Range with v<introduced<fixed",
Ranges: []osv.Range{{Type: osv.RangeTypeSemver, Events: []osv.RangeEvent{{Introduced: "2.0.0"}, {Fixed: "3.0.0"}}}},
version: "1.0.0",
want: false,
},
{
name: "inside osv.Range with multiple Ranges",
Ranges: []osv.Range{{Type: osv.RangeTypeSemver, Events: []osv.RangeEvent{{Introduced: "1.0.0"}, {Fixed: "2.0.0"}, {Introduced: "3.0.0"}}}},
version: "3.0.0",
want: true,
},
{
name: "outside osv.Range with multiple Ranges",
Ranges: []osv.Range{{Type: osv.RangeTypeSemver, Events: []osv.RangeEvent{{Introduced: "0"}, {Fixed: "1.18.6"}, {Introduced: "1.19.0"}, {Fixed: "1.19.1"}}}},
version: "1.18.6",
want: false,
},
{
// pseudo-versions work
name: "pseudo-version",
Ranges: []osv.Range{
{Type: osv.RangeTypeSemver, Events: []osv.RangeEvent{{Introduced: "0.0.0-20210824120805-abcdef"}}},
},
version: "0.0.0-20220824120805-4b6e5c587895",
want: true,
},
}
for _, test := range tests {
t.Run(test.name, func(t *testing.T) {
got, err := AffectsSemver(test.Ranges, test.version)
if err != nil {
t.Fatal(err)
}
if test.want != got {
t.Errorf("AffectsSemver(%#v, %s): want %t, got %t", test.Ranges, test.version, test.want, got)
}
})
}
}
func TestAffectsSemverError(t *testing.T) {
tests := []struct {
name string
Ranges []osv.Range
version string
wantErr error
}{
{
name: "unsorted range",
Ranges: []osv.Range{{Type: osv.RangeTypeSemver, Events: []osv.RangeEvent{{Introduced: "1.0.0"}, {Fixed: "2.0.0"}, {Introduced: "1.2.0"}}}},
version: "0.0.0",
wantErr: errUnsortedRange,
},
{
name: "invalid version",
Ranges: []osv.Range{{Type: osv.RangeTypeSemver, Events: []osv.RangeEvent{{Introduced: "1.0.0"}, {Fixed: "2.0.0"}}}},
version: "v0.0.0",
wantErr: errInvalidSemver,
},
}
for _, test := range tests {
t.Run(test.name, func(t *testing.T) {
_, got := AffectsSemver(test.Ranges, test.version)
if !errors.Is(got, test.wantErr) {
t.Errorf("AffectsSemver(%#v, %s): want err containing %q, got %q", test.Ranges, test.version, test.wantErr, got)
}
})
}
}
|
osvutils
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/osvutils/validate_test.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package osvutils
import (
"errors"
"testing"
"time"
"golang.org/x/vulndb/internal/osv"
)
var (
jan1999 = osv.Time{Time: time.Date(1999, 1, 1, 0, 0, 0, 0, time.UTC)}
jan2000 = osv.Time{Time: time.Date(2000, 1, 1, 0, 0, 0, 0, time.UTC)}
)
// testEntry creates a valid Entry and modifies it by running transform.
// If transform is nil, it returns the base test Entry.
func testEntry(transform func(e *osv.Entry)) *osv.Entry {
e := &osv.Entry{
SchemaVersion: "1.3.1",
ID: "GO-1999-0001",
Published: jan1999,
Modified: jan2000,
Aliases: []string{"CVE-1999-1111"},
Summary: "A summary",
Details: "Some details",
Affected: []osv.Affected{
{
Module: osv.Module{
Path: "example.com/module",
Ecosystem: "Go",
},
Ranges: []osv.Range{
{
Type: "SEMVER",
Events: []osv.RangeEvent{
{Introduced: "0"}, {Fixed: "1.1.0"},
{Introduced: "1.2.0"},
{Fixed: "1.2.2"},
}}},
EcosystemSpecific: &osv.EcosystemSpecific{
Packages: []osv.Package{{Path: "example.com/module/package", Symbols: []string{"Symbol"}}}}},
{
Module: osv.Module{
Path: "stdlib",
Ecosystem: "Go",
},
Ranges: []osv.Range{
{
Type: "SEMVER",
Events: []osv.RangeEvent{
{Introduced: "0"}, {Fixed: "1.1.0"},
{Introduced: "1.2.0"},
{Fixed: "1.2.2"},
}}},
EcosystemSpecific: &osv.EcosystemSpecific{
Packages: []osv.Package{{Path: "package", Symbols: []string{"Symbol"}}}}},
},
References: []osv.Reference{
{Type: "FIX", URL: "https://example.com/cl/123"},
},
DatabaseSpecific: &osv.DatabaseSpecific{
URL: "https://pkg.go.dev/vuln/GO-1999-0001"}}
if transform == nil {
return e
}
transform(e)
return e
}
func TestValidate(t *testing.T) {
t.Run("ok", func(t *testing.T) {
if err := Validate(testEntry(nil)); err != nil {
t.Error(err)
}
if err := ValidateExceptTimestamps(testEntry(nil)); err != nil {
t.Error("ValidateExceptTimestamps():", err)
}
})
t.Run("timestamps", func(t *testing.T) {
for _, tc := range []struct {
name string
entry *osv.Entry
wantErr error
}{
{
name: "no modified",
entry: testEntry(func(e *osv.Entry) {
e.Modified = osv.Time{}
}),
wantErr: errNoModified,
},
{
name: "no published",
entry: testEntry(func(e *osv.Entry) {
e.Published = osv.Time{}
}),
wantErr: errNoPublished,
},
{
name: "published after modified",
entry: testEntry(func(e *osv.Entry) {
e.Modified = jan1999
e.Published = jan2000
}),
wantErr: errPublishedAfterModified,
},
} {
t.Run(tc.name, func(t *testing.T) {
want := tc.wantErr
if got := Validate(tc.entry); !errors.Is(got, want) {
t.Errorf("Validate() error = %v, want error %v", got, want)
}
// There should be no error when we don't check timestamps.
if err := ValidateExceptTimestamps(tc.entry); err != nil {
t.Errorf("ValidateExceptTimestamps() error = %v", err)
}
})
}
})
t.Run("fail", func(t *testing.T) {
for _, tc := range []struct {
name string
entry *osv.Entry
wantErr error
}{
{
name: "no ID",
entry: testEntry(func(e *osv.Entry) {
e.ID = ""
}),
wantErr: errNoID,
},
{
name: "no schema version",
entry: testEntry(func(e *osv.Entry) {
e.SchemaVersion = ""
}),
wantErr: errNoSchemaVersion,
},
{
name: "no summary",
entry: testEntry(func(e *osv.Entry) {
e.Summary = ""
}),
wantErr: errNoSummary,
},
{
name: "no details",
entry: testEntry(func(e *osv.Entry) {
e.Details = ""
}),
wantErr: errNoDetails,
},
{
name: "no affected",
entry: testEntry(func(e *osv.Entry) {
e.Affected = nil
}),
wantErr: errNoAffected,
},
{
name: "no references",
entry: testEntry(func(e *osv.Entry) {
e.References = nil
}),
wantErr: errNoReferences,
},
{
name: "no database specific",
entry: testEntry(func(e *osv.Entry) {
e.DatabaseSpecific = nil
}),
wantErr: errNoDatabaseSpecific,
},
{
name: "missing module path",
entry: testEntry(func(e *osv.Entry) {
e.Affected[0].Module.Path = ""
}),
wantErr: errNoModule,
},
{
name: "non-Go ecosystem",
entry: testEntry(func(e *osv.Entry) {
e.Affected[0].Module.Ecosystem = "Goo"
}),
wantErr: errNotGoEcosystem,
},
{
name: "no version ranges",
entry: testEntry(func(e *osv.Entry) {
e.Affected[0].Ranges = nil
}),
wantErr: errNoRanges,
},
{
name: "no ecosystem specific",
entry: testEntry(func(e *osv.Entry) {
e.Affected[0].EcosystemSpecific = nil
}),
wantErr: errNoEcosystemSpecific,
},
{
name: "no package path",
entry: testEntry(func(e *osv.Entry) {
e.Affected[0].EcosystemSpecific.Packages[0].Path = ""
}),
wantErr: errNoPackagePath,
},
{
name: "invalid alias",
entry: testEntry(func(e *osv.Entry) {
e.Aliases = append(e.Aliases, "CVE-GHSA-123")
}),
wantErr: errInvalidAlias,
},
{
name: "invalid pkgsite URL",
entry: testEntry(func(e *osv.Entry) {
// missing "/vuln/"
e.DatabaseSpecific.URL = "https://pkg.go.dev/GO-1234-5667"
}),
wantErr: errInvalidPkgsiteURL,
},
{
name: "package path not prefixed by module path",
entry: testEntry(func(e *osv.Entry) {
e.Affected[0].Module.Path = "example.com/module"
e.Affected[0].EcosystemSpecific.Packages[0].Path = "example.com/package"
}),
wantErr: errInvalidPackagePath,
},
{
name: "more than one version range",
entry: testEntry(func(e *osv.Entry) {
e.Affected[0].Ranges = append(e.Affected[0].Ranges, osv.Range{})
}),
wantErr: errTooManyRanges,
},
{
name: "non-SEMVER range",
entry: testEntry(func(e *osv.Entry) {
e.Affected[0].Ranges[0].Type = "unknown"
}),
wantErr: errRangeTypeNotSemver,
},
{
name: "no range events",
entry: testEntry(func(e *osv.Entry) {
e.Affected[0].Ranges[0].Events = nil
}),
wantErr: errNoRangeEvents,
},
{
name: "out of order range",
entry: testEntry(func(e *osv.Entry) {
e.Affected[0].Ranges[0].Events = []osv.RangeEvent{
{Fixed: "1.1.1"}, {Fixed: "1.1.2"},
}
}),
wantErr: errOutOfOrderRange,
},
{
name: "unsorted range",
entry: testEntry(func(e *osv.Entry) {
e.Affected[0].Ranges[0].Events = []osv.RangeEvent{
{Fixed: "1.1.1"}, {Introduced: "1.1.0"},
}
}),
wantErr: errUnsortedRange,
},
{
name: "no introduced or fixed in range event",
entry: testEntry(func(e *osv.Entry) {
e.Affected[0].Ranges[0].Events[0] = osv.RangeEvent{}
}),
wantErr: errNoIntroducedOrFixed,
},
{
name: "both introduced and fixed in range event",
entry: testEntry(func(e *osv.Entry) {
e.Affected[0].Ranges[0].Events = []osv.RangeEvent{
{Introduced: "1.1.0", Fixed: "1.1.1"},
}
}),
wantErr: errBothIntroducedAndFixed,
},
{
name: "non-canonical semver",
entry: testEntry(func(e *osv.Entry) {
e.Affected[0].Ranges[0].Events = []osv.RangeEvent{
{Introduced: "1.1"},
}
}),
wantErr: errInvalidSemver,
},
{
name: "invalid semver",
entry: testEntry(func(e *osv.Entry) {
e.Affected[0].Ranges[0].Events = []osv.RangeEvent{
{Introduced: "1x2x3"},
}
}),
wantErr: errInvalidSemver,
},
} {
t.Run(tc.name, func(t *testing.T) {
want := tc.wantErr
if got := Validate(tc.entry); !errors.Is(got, want) {
t.Errorf("Validate() error = %v, want error %v", got, want)
}
if got := ValidateExceptTimestamps(tc.entry); !errors.Is(got, want) {
t.Errorf("ValidateExceptTimestamps() error = %v, want error %v", got, want)
}
})
}
})
}
|
osvutils
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/osvutils/affects.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package osvutils
import (
"fmt"
"golang.org/x/vulndb/internal/osv"
"golang.org/x/vulndb/internal/version"
)
// AffectsSemver returns whether the version v is within the given ranges.
// v must be unprefixed, valid semver, and ranges must be sorted,
// non-overlapping, and contain only valid semver.
// The function errors if either of the inputs is invalid.
func AffectsSemver(ranges []osv.Range, v string) (bool, error) {
// Check that ranges are sorted and otherwise valid.
if err := ValidateRanges(ranges); err != nil {
return false, err
}
if !version.IsValid(v) {
return false, fmt.Errorf("%w: %s", errInvalidSemver, v)
}
for _, r := range ranges {
if containsSemver(r, v) {
return true, nil
}
}
return false, nil
}
// containsSemver checks if semver version v is in the
// range encoded by ar.
// The range must be sorted in ascending order.
func containsSemver(ar osv.Range, v string) bool {
var affected bool
for _, e := range ar.Events {
if !affected && e.Introduced != "" {
affected = e.Introduced == "0" || !version.Before(v, e.Introduced)
} else if affected && e.Fixed != "" {
affected = version.Before(v, e.Fixed)
}
}
return affected
}
|
osvutils
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/osvutils/validate.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Package osvutils provides utilities for working with Go OSV entries.
// It is separated from package osv because that package
// promises to only import from the standard library.
package osvutils
import (
"errors"
"fmt"
"strings"
"golang.org/x/vulndb/internal/derrors"
"golang.org/x/vulndb/internal/idstr"
"golang.org/x/vulndb/internal/osv"
"golang.org/x/vulndb/internal/version"
)
// Validate errors if there are any problems with the OSV Entry.
// It is used to validate OSV entries before publishing them to the
// Go vulnerability database, and has stricter requirements than
// the general OSV format.
func Validate(e *osv.Entry) (err error) {
derrors.Wrap(&err, "Validate(%s)", e.ID)
return validate(e, true)
}
// ValidateExceptTimestamps errors if there are any problems with the
// OSV Entry, with the exception of the timestamps (published, modified and
// withdrawn) which are not checked.
// This is used to validate entries at CL submit time, before their timestamps
// are corrected.
func ValidateExceptTimestamps(e *osv.Entry) (err error) {
derrors.Wrap(&err, "ValidateExceptTimestamps(%s)", e.ID)
return validate(e, false)
}
var (
// Errors for incorrect timestamps.
errNoModified = errors.New("modified time must be non-zero")
errNoPublished = errors.New("published time must be non-zero")
errPublishedAfterModified = errors.New("published time cannot be after modified time")
// Errors for missing fields.
errNoID = errors.New("id field is empty")
errNoSchemaVersion = errors.New("schema_version field is empty")
errNoSummary = errors.New("summary field is empty")
errNoDetails = errors.New("details field is empty")
errNoAffected = errors.New("affected field is empty")
errNoReferences = errors.New("references field is empty")
errNoDatabaseSpecific = errors.New("database_specific field is empty")
errNoModule = errors.New("affected field missing module path")
errNotGoEcosystem = errors.New("affected ecosystem is not Go")
errNoRanges = errors.New("affected field contains no ranges")
errNoEcosystemSpecific = errors.New("affected field contains no ecosystem_specific field")
errNoPackagePath = errors.New("affected.ecosystem_specific.imports field has no package path")
// Errors for invalid fields.
errInvalidAlias = errors.New("alias must be CVE or GHSA ID")
errInvalidPkgsiteURL = errors.New("database_specific.URL must be a link to https://pkg.go.dev/vuln/<Go id>")
errInvalidPackagePath = errors.New("package path must be prefixed by module path")
errTooManyRanges = errors.New("each module should have exactly one version range")
errRangeTypeNotSemver = errors.New("range type must be SEMVER")
errNoRangeEvents = errors.New("range must contain one or more events")
errOutOfOrderRange = errors.New("introduced and fixed versions must alternate")
errUnsortedRange = errors.New("range events must be in strictly ascending order")
errNoIntroducedOrFixed = errors.New("introduced or fixed must be set")
errBothIntroducedAndFixed = errors.New("introduced and fixed cannot both be set in same event")
errInvalidSemver = errors.New("invalid or non-canonical semver version")
)
func validate(e *osv.Entry, checkTimestamps bool) (err error) {
if checkTimestamps {
switch {
case e.Modified.IsZero():
return errNoModified
case e.Published.IsZero():
return errNoPublished
case e.Published.After(e.Modified.Time):
return fmt.Errorf("%w (published=%s, modified=%s)", errPublishedAfterModified, e.Published, e.Modified)
}
}
// Check for missing required fields.
switch {
case e.ID == "":
return errNoID
case e.SchemaVersion == "":
return errNoSchemaVersion
case e.Summary == "":
return errNoSummary
case e.Details == "" && !hasAdvisory(e):
return errNoDetails
case len(e.Affected) == 0:
return errNoAffected
case len(e.References) == 0:
return errNoReferences
case e.DatabaseSpecific == nil:
return errNoDatabaseSpecific
}
for _, a := range e.Affected {
if err := validateAffected(&a); err != nil {
return err
}
}
for _, alias := range e.Aliases {
if !idstr.IsAliasType(alias) {
return fmt.Errorf("%w (found alias %s)", errInvalidAlias, alias)
}
}
return validateDatabaseSpecific(e.DatabaseSpecific)
}
func hasAdvisory(entry *osv.Entry) bool {
for _, ref := range entry.References {
if ref.Type == osv.ReferenceTypeAdvisory {
return true
}
}
return false
}
func validateAffected(a *osv.Affected) error {
switch {
case a.Module.Path == "":
return errNoModule
case a.Module.Ecosystem != osv.GoEcosystem:
return errNotGoEcosystem
}
if err := ValidateRanges(a.Ranges); err != nil {
return err
}
return validateEcosystemSpecific(a.EcosystemSpecific, a.Module.Path)
}
func ValidateRanges(ranges []osv.Range) error {
switch {
case len(ranges) == 0:
return errNoRanges
case len(ranges) > 1:
return fmt.Errorf("%w (found %d ranges)", errTooManyRanges, len(ranges))
}
return validateRange(&ranges[0])
}
func validateRange(r *osv.Range) error {
switch {
case r.Type != osv.RangeTypeSemver:
return fmt.Errorf("%w (found range type %q)",
errRangeTypeNotSemver, r.Type)
case len(r.Events) == 0:
return errNoRangeEvents
}
// Check that all the events are valid and sorted in ascending order.
prev, err := parseRangeEvent(&r.Events[0])
if err != nil {
return err
}
for _, event := range r.Events[1:] {
current, err := parseRangeEvent(&event)
if err != nil {
return fmt.Errorf("invalid range event: %w", err)
}
// Introduced and fixed versions must alternate.
if current.introduced == prev.introduced {
return errOutOfOrderRange
}
if !less(prev.v, current.v) {
return fmt.Errorf("%w (found %s>=%s)", errUnsortedRange, prev.v, current.v)
}
prev = current
}
return nil
}
func less(v, w string) bool {
// Ensure that version 0 is always lowest.
if v == "0" {
return true
}
if w == "0" {
return false
}
return version.Before(v, w)
}
type event struct {
v string
introduced bool
}
func parseRangeEvent(e *osv.RangeEvent) (*event, error) {
introduced, fixed := e.Introduced, e.Fixed
var v string
var isIntroduced bool
switch {
case introduced == "" && fixed == "":
return nil, errNoIntroducedOrFixed
case introduced != "" && fixed != "":
return nil, errBothIntroducedAndFixed
case introduced == "0":
return &event{v: "0", introduced: true}, nil
case introduced != "":
v = introduced
isIntroduced = true
case fixed != "":
v = fixed
isIntroduced = false
}
if !version.IsValid(v) || v != version.Canonical(v) {
return nil, fmt.Errorf("%w (found %s)", errInvalidSemver, v)
}
return &event{v: v, introduced: isIntroduced}, nil
}
func validateEcosystemSpecific(es *osv.EcosystemSpecific, module string) error {
if es == nil {
return errNoEcosystemSpecific
}
for _, pkg := range es.Packages {
if pkg.Path == "" {
return errNoPackagePath
}
// Package path must be prefixed by module path unless it is
// in the Go standard library or toolchain.
if (module != osv.GoStdModulePath && module != osv.GoCmdModulePath) &&
!strings.HasPrefix(pkg.Path, module) {
return fmt.Errorf("%w (found module=%q, package=%q)", errInvalidPackagePath, module, pkg.Path)
}
}
return nil
}
func validateDatabaseSpecific(d *osv.DatabaseSpecific) error {
if !idstr.IsGoAdvisory(d.URL) {
return fmt.Errorf("%w (found URL %q)", errInvalidPkgsiteURL, d.URL)
}
return nil
}
|
ghsarepo
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/ghsarepo/client.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
//
// Package ghsarepo provides a client and utilities for reading
// GitHub security advisories directly from the Git repo
// https://github.com/github/advisory-database.
//
// This allows us to read GHSAs in OSV format instead of
// the SecurityAdvisory format output by the GraphQL API.
package ghsarepo
import (
"encoding/json"
"github.com/go-git/go-git/v5"
"github.com/go-git/go-git/v5/plumbing/object"
"github.com/go-git/go-git/v5/storage/memory"
"golang.org/x/exp/maps"
"golang.org/x/vulndb/internal/genericosv"
"golang.org/x/vulndb/internal/gitrepo"
)
type Client struct {
byID map[string]*genericosv.Entry
byAlias map[string][]*genericosv.Entry
}
// NewClient returns a client to read from the GHSA database.
// It clones the Git repo at https://github.com/github/advisory-database,
// which can take around ~20 seconds.
func NewClient() (*Client, error) {
repo, err := git.Clone(memory.NewStorage(), nil, &git.CloneOptions{
URL: "https://github.com/github/advisory-database",
ReferenceName: "refs/heads/main",
SingleBranch: true,
Depth: 1,
Tags: git.NoTags,
NoCheckout: true,
})
if err != nil {
return nil, err
}
return NewClientFromRepo(repo)
}
// NewClient returns a client that reads from the GHSA database
// in the given repo, which must follow the structure of
// https://github.com/github/advisory-database.
func NewClientFromRepo(repo *git.Repository) (*Client, error) {
const reviewed = "advisories/github-reviewed"
root, err := gitrepo.Root(repo)
if err != nil {
return nil, err
}
e, err := root.FindEntry(reviewed)
if err != nil {
return nil, err
}
tree, err := repo.TreeObject(e.Hash)
if err != nil {
return nil, err
}
c := &Client{
byID: make(map[string]*genericosv.Entry),
byAlias: make(map[string][]*genericosv.Entry),
}
if err := tree.Files().ForEach(func(f *object.File) error {
contents, err := f.Contents()
if err != nil {
return err
}
var advisory genericosv.Entry
if err := json.Unmarshal([]byte(contents), &advisory); err != nil {
return err
}
if !affectsGo(&advisory) {
return nil
}
if !advisory.Withdrawn.IsZero() {
return nil
}
c.byID[advisory.ID] = &advisory
for _, alias := range advisory.Aliases {
c.byAlias[alias] = append(c.byAlias[alias], &advisory)
}
return nil
}); err != nil {
return nil, err
}
return c, nil
}
func affectsGo(osv *genericosv.Entry) bool {
for _, a := range osv.Affected {
if a.Package.Ecosystem == genericosv.EcosystemGo {
return true
}
}
return false
}
// IDs returns all the GHSA IDs in the GHSA database.
func (c *Client) IDs() []string {
return maps.Keys(c.byID)
}
// List returns all the genericosv.Entry entries in the GHSA database.
func (c *Client) List() []*genericosv.Entry {
return maps.Values(c.byID)
}
// ByGHSA returns the genericosv.Entry entry for the given GHSA, or nil if none
// exists.
func (c *Client) ByGHSA(ghsa string) *genericosv.Entry {
return c.byID[ghsa]
}
// ByCVE returns the genericosv.Entry entries for the given CVE, or nil if none
// exist.
func (c *Client) ByCVE(cve string) []*genericosv.Entry {
return c.byAlias[cve]
}
|
ghsarepo
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/ghsarepo/client_test.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package ghsarepo
import (
"flag"
"testing"
"time"
"github.com/google/go-cmp/cmp"
"github.com/google/go-cmp/cmp/cmpopts"
"golang.org/x/vulndb/internal/gitrepo"
)
var integration = flag.Bool("integration", false, "if true, access the real GHSA repo in tests")
func TestClientReal(t *testing.T) {
if !*integration {
t.Skipf("-integration flag not set")
}
c, err := NewClient()
if err != nil {
t.Fatal(err)
}
// A real GHSA id and its corresponding CVE.
ghsa, cve := "GHSA-8c26-wmh5-6g9v", "CVE-2022-27191"
if osv := c.ByGHSA(ghsa); osv.ID != ghsa {
t.Errorf("c.ByGHSA(%s).ID = %s, want %s", ghsa, osv.ID, ghsa)
}
if osvs := c.ByCVE(cve); osvs[0].ID != ghsa {
t.Errorf("c.ByCVE(%s)[0].ID = %s, want %s", ghsa, osvs[0].ID, ghsa)
}
// A non-existent GHSA and CVE.
notGHSA, notCVE := "GHSA-aaaa-bbbb-cccc", "CVE-0000-1111"
if osv := c.ByGHSA(notGHSA); osv != nil {
t.Errorf("c.ByGHSA(%s) = %v, want nil", ghsa, osv)
}
if osvs := c.ByCVE(notCVE); osvs != nil {
t.Errorf("c.ByCVE(%s) = %v, want nil", ghsa, osvs)
}
}
func TestByGHSA(t *testing.T) {
c, err := newTestClient()
if err != nil {
t.Fatal(err)
}
// A GHSA id in the test repo.
ghsa := "GHSA-abcd-efgh-b123"
if osv := c.ByGHSA(ghsa); osv.ID != ghsa {
t.Errorf("c.ByGHSA(%s).ID = %s, want %s", ghsa, osv.ID, ghsa)
}
// A GHSA not in the test repo.
notGHSA := "GHSA-abcd-untouched"
if osv := c.ByGHSA(notGHSA); osv != nil {
t.Errorf("c.ByGHSA(%s) = %v, want nil", ghsa, osv)
}
}
func TestByCVE(t *testing.T) {
c, err := newTestClient()
if err != nil {
t.Fatal(err)
}
// A CVE in the test repo and its corresponding GHSA.
cve, ghsa := "CVE-20YY-XXXX", "GHSA-abcd-efgh-b123"
if osvs := c.ByCVE(cve); osvs[0].ID != ghsa {
t.Errorf("c.ByCVE(%s)[0].ID = %s, want %s", ghsa, osvs[0].ID, ghsa)
}
// A CVE not in the test repo.
notCVE := "CVE-0000-1111"
if osvs := c.ByCVE(notCVE); osvs != nil {
t.Errorf("c.ByCVE(%s) = %v, want nil", ghsa, osvs)
}
}
func TestIDs(t *testing.T) {
c, err := newTestClient()
if err != nil {
t.Fatal(err)
}
want := []string{"GHSA-abcd-efgh-b123", "GHSA-test-part-a123"}
got := c.IDs()
if diff := diffIgnoreOrder(want, got); diff != "" {
t.Errorf("c.IDs() mismatch (-want +got)\n:%s", diff)
}
}
func TestList(t *testing.T) {
c, err := newTestClient()
if err != nil {
t.Fatal(err)
}
wantIDs := []string{"GHSA-abcd-efgh-b123", "GHSA-test-part-a123"}
got := c.List()
var gotIDs []string
for _, osv := range got {
gotIDs = append(gotIDs, osv.ID)
}
if diff := diffIgnoreOrder(wantIDs, gotIDs); diff != "" {
t.Errorf("c.List() mismatch (-want +got)\n:%s", diff)
}
}
func diffIgnoreOrder(s1, s2 []string) string {
return cmp.Diff(s1, s2, cmpopts.SortSlices(func(a, b string) bool {
return a < b
}))
}
func newTestClient() (*Client, error) {
repo, err := gitrepo.ReadTxtarRepo("testdata/repo.txtar", time.Now())
if err != nil {
return nil, err
}
return NewClientFromRepo(repo)
}
|
testdata
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/ghsarepo/testdata/repo.txtar
|
# Copyright 2023 The Go Authors. All rights reserved.
# Use of this source code is governed by a BSD-style
# license that can be found in the LICENSE file.
# Test repo in the shape of github.com/github/advisory-database
-- advisories/github-reviewed/2022/12/GHSA-abcd-efgh-b123.json --
{
"schema_version": "1.3.0",
"id": "GHSA-abcd-efgh-b123",
"aliases": [
"CVE-20YY-XXXX"
],
"summary": "Summary",
"details": "Longer form details.",
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "example/package"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.1"
}
]
}
]
}
],
"database_specific": {
"cwe_ids": [
],
"severity": "MODERATE",
"github_reviewed": true
}
}
-- advisories/github-reviewed/2021/10/GHSA-test-part-a123.json --
{
"schema_version": "1.3.0",
"id": "GHSA-test-part-a123",
"aliases": [
"CVE-2020-XXXX"
],
"summary": "Short summary",
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "golang.org/x/example"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-202"
}
]
}
],
"database_specific": {
"last_known_affected_version_range": "<= 0.0.0-202"
}
}
],
"references": [
{
"type": "WEB",
"url": "https://example.com/example/link"
}
],
"database_specific": {
"cwe_ids": [
"CWE-347"
],
"severity": "MODERATE",
"github_reviewed": true
}
}
-- advisories/github-reviewed/2022/10/GHSA-qwer-tyui-0987.json --
{
"schema_version": "1.3.0",
"id": "GHSA-qwer-tyui-0987",
"aliases": [
"CVE-2022-XXXXX"
],
"summary": "An example report that isn't in the go ecosystem",
"details": "The longer description of the example",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
}
],
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.example.subexample"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.1.4"
}
]
}
]
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-XXXXX"
},
{
"type": "PACKAGE",
"url": "https://example.com/package"
},
{
"type": "WEB",
"url": "https://example.org/news.html"
}
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true
}
}
-- advisories/unreviewed/2023/01/GHSA-abcd-untouched.json --
{
"schema_version": "1.3.0",
"id": "GHSA-abcd-untouched",
"aliases": [
"CVE-2022-XXXX"
],
"details": "Because this is unreveiwed, it shouldn't even be considered",
"severity": [
],
"affected": [
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4099"
},
{
"type": "WEB",
"url": "https://wpscan.com/vulnerability/a282dd39-926d-406b-b8f5-e4c6e0c2c028"
}
],
"database_specific": {
"cwe_ids": [
"CWE-89"
],
"severity": null,
"github_reviewed": false
}
}
-- README.md --
This should be ignored
|
cvelistrepo
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/cvelistrepo/cvelistrepo.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Package cvelistrepo supports working with the repo
// containing the list of CVEs.
package cvelistrepo
import (
"context"
"encoding/json"
"fmt"
"io"
"path"
"sort"
"strconv"
"strings"
"github.com/go-git/go-git/v5"
"github.com/go-git/go-git/v5/plumbing"
"github.com/go-git/go-git/v5/plumbing/filemode"
"github.com/go-git/go-git/v5/plumbing/object"
"golang.org/x/vulndb/internal/derrors"
)
// URLs of the CVE project list repos.
const (
URLv4 = "https://github.com/CVEProject/cvelist"
URLv5 = "https://github.com/CVEProject/cvelistV5"
)
// A File is a file in the cvelist repo that contains a CVE.
type File struct {
DirPath string
Filename string
TreeHash plumbing.Hash
BlobHash plumbing.Hash
Year int
Number int
}
// Files returns all the CVE files in the given repo commit, sorted by
// name.
func Files(repo *git.Repository, commit *object.Commit) (_ []File, err error) {
defer derrors.Wrap(&err, "CVEFiles(%s)", commit.Hash)
root, err := repo.TreeObject(commit.TreeHash)
if err != nil {
return nil, fmt.Errorf("TreeObject: %v", err)
}
files, err := walkFiles(repo, root, "", nil)
if err != nil {
return nil, err
}
sort.Slice(files, func(i, j int) bool {
// Compare the year and the number, as ints. Using the ID directly
// would put CVE-2014-100009 before CVE-2014-10001.
if files[i].Year != files[j].Year {
return files[i].Year < files[j].Year
}
return files[i].Number < files[j].Number
})
return files, nil
}
// walkFiles collects CVE files from a repo tree.
func walkFiles(repo *git.Repository, tree *object.Tree, dirpath string, files []File) ([]File, error) {
for _, e := range tree.Entries {
if e.Mode == filemode.Dir {
dir, err := repo.TreeObject(e.Hash)
if err != nil {
return nil, err
}
files, err = walkFiles(repo, dir, path.Join(dirpath, e.Name), files)
if err != nil {
return nil, err
}
} else if isCVEFilename(e.Name) {
// e.Name is CVE-YEAR-NUMBER.json
year, err := strconv.Atoi(e.Name[4:8])
if err != nil {
return nil, err
}
number, err := strconv.Atoi(e.Name[9 : len(e.Name)-5])
if err != nil {
return nil, err
}
files = append(files, File{
DirPath: dirpath,
Filename: e.Name,
TreeHash: tree.Hash,
BlobHash: e.Hash,
Year: year,
Number: number,
})
}
}
return files, nil
}
// isCVEFilename reports whether name is the basename of a CVE file.
func isCVEFilename(name string) bool {
return strings.HasPrefix(name, "CVE-") && path.Ext(name) == ".json"
}
// blobReader returns a reader to the blob with the given hash.
func blobReader(repo *git.Repository, hash plumbing.Hash) (io.Reader, error) {
blob, err := repo.BlobObject(hash)
if err != nil {
return nil, err
}
return blob.Reader()
}
// FetchCVE fetches the CVE file for cveID from the CVElist repo and returns
// the parsed info.
func FetchCVE[T any](ctx context.Context, repo *git.Repository, cveID string) (_ T, err error) {
defer derrors.Wrap(&err, "FetchCVE(repo, commit, %s)", cveID)
var zero T
ref, err := repo.Reference(plumbing.HEAD, true)
if err != nil {
return zero, err
}
ch := ref.Hash()
commit, err := repo.CommitObject(ch)
if err != nil {
return zero, err
}
files, err := Files(repo, commit)
if err != nil {
return zero, err
}
for _, f := range files {
if strings.Contains(f.Filename, cveID) {
cve, err := Parse[T](repo, f)
if err != nil {
return zero, err
}
return cve, nil
}
}
return zero, fmt.Errorf("%s not found", cveID)
}
// Parse unmarshals the contents of f.
func Parse[T any](repo *git.Repository, f File) (T, error) {
var zero T
b, err := f.ReadAll(repo)
if err != nil {
return zero, err
}
if len(b) == 0 {
return zero, fmt.Errorf("%s is empty", f.Filename)
}
v := new(T)
if err := json.Unmarshal(b, v); err != nil {
return zero, err
}
return *v, nil
}
func (f *File) ReadAll(repo *git.Repository) ([]byte, error) {
r, err := blobReader(repo, f.BlobHash)
if err != nil {
return nil, err
}
return io.ReadAll(r)
}
|
cvelistrepo
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/cvelistrepo/txtar.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package cvelistrepo
import (
"context"
"fmt"
"os"
"path"
"path/filepath"
"slices"
"testing"
"time"
"github.com/go-git/go-git/v5/plumbing"
"github.com/google/go-cmp/cmp"
"golang.org/x/exp/maps"
"golang.org/x/tools/txtar"
"golang.org/x/vulndb/internal/gitrepo"
"golang.org/x/vulndb/internal/idstr"
"golang.org/x/vulndb/internal/proxy"
"golang.org/x/vulndb/internal/report"
"golang.org/x/vulndb/internal/test"
"gopkg.in/yaml.v3"
)
var (
txtarRepo = filepath.Join(testdata, "cvelist.txtar")
testdata = filepath.Join("testdata", "cve")
testCVEs = map[string]string{
// First-party CVEs not assigned by the Go CNA.
// (These were created before Go was a CNA).
"CVE-2020-9283": "golang.org/x/crypto",
"CVE-2021-27919": "archive/zip",
"CVE-2021-3115": "cmd/go",
// Third party CVEs, assigned by other CNAs.
"CVE-2022-39213": "github.com/pandatix/go-cvss",
"CVE-2023-44378": "github.com/Consensys/gnark",
"CVE-2023-45141": "github.com/gofiber/fiber",
"CVE-2024-2056": "github.com/gvalkov/tailon",
"CVE-2024-33522": "github.com/projectcalico/calico",
// A third-party non-Go CVE that was miscategorized
// as applying to "github.com/amlweems/xzbot".
"CVE-2024-3094": "github.com/amlweems/xzbot",
// First-party CVEs, assigned by the Go CNA.
"CVE-2023-29407": "golang.org/x/image",
"CVE-2023-45283": "path/filepath",
"CVE-2023-45285": "cmd/go",
// A third-party CVE assigned by the Go CNA.
"CVE-2023-45286": "github.com/go-resty/resty/v2",
}
testTime = time.Date(1999, 1, 1, 0, 0, 0, 0, time.UTC)
)
func UpdateTxtar(ctx context.Context, t *testing.T, url string) {
ids := maps.Keys(testCVEs)
slices.Sort(ids)
if err := writeTxtarRepo(ctx, url, txtarRepo, ids); err != nil {
t.Fatal(err)
}
}
func TestToReport[S report.Source](t *testing.T, update, realProxy bool) error {
pc, err := proxy.NewTestClient(t, realProxy)
if err != nil {
t.Fatal(err)
}
if update {
if err := os.RemoveAll(filepath.Join(testdata, t.Name())); err != nil {
t.Fatal(err)
}
}
repo, commit, err := gitrepo.TxtarRepoAndHead(txtarRepo)
if err != nil {
return err
}
files, err := Files(repo, commit)
if err != nil {
return err
}
for _, file := range files {
id := idstr.FindCVE(file.Filename)
t.Run(id, func(t *testing.T) {
cve, err := Parse[S](repo, file)
if err != nil {
t.Fatalf("Parse(%s)=%s", id, err)
}
mp, ok := testCVEs[id]
if !ok {
t.Fatalf("%s not found in testCVEs", id)
}
r := report.New(cve, pc, report.WithModulePath(mp),
report.WithCreated(testTime))
// Keep record of what lints would apply to each generated report.
r.LintAsNotes(pc)
b, err := yaml.Marshal(r)
if err != nil {
t.Fatal(err)
}
tf := filepath.Join(testdata, t.Name()+".txtar")
if update {
if err := test.WriteTxtar(tf, []txtar.File{
{
Name: id,
Data: b,
},
}, fmt.Sprintf("Expected output of %s.", t.Name())); err != nil {
t.Fatal(err)
}
}
ar, err := txtar.ParseFile(tf)
if err != nil {
t.Fatal(err)
}
for _, af := range ar.Files {
if af.Name != id {
t.Errorf("unexpected archive file %s", af.Name)
continue
}
want, got := string(b), string(af.Data)
if diff := cmp.Diff(want, got); diff != "" {
t.Errorf("%s content mismatch (-want, +got):\n%s", af.Name, diff)
}
}
})
}
return nil
}
// writeTxtarRepo downloads the given CVEs from the CVE list (v4 or v5) in url,
// and writes them as a txtar repo to filename.
//
// Intended for testing.
func writeTxtarRepo(ctx context.Context, url string, filename string, cveIDs []string) error {
var ref plumbing.ReferenceName
switch url {
case URLv5:
ref = plumbing.Main
default:
ref = plumbing.HEAD
}
repo, err := gitrepo.CloneAt(ctx, url, ref)
if err != nil {
return err
}
commit, err := gitrepo.HeadCommit(repo)
if err != nil {
return err
}
files, err := Files(repo, commit)
if err != nil {
return err
}
idToFile := make(map[string]*File)
for _, f := range files {
f := f
id := idstr.FindCVE(f.Filename)
if id != "" {
if _, ok := idToFile[id]; ok {
return fmt.Errorf("found duplicate record files for %s", id)
}
idToFile[id] = &f
}
}
arFiles := make([]txtar.File, 0, len(cveIDs))
arFiles = append(arFiles, txtar.File{
Name: "README.md",
Data: []byte("ignore me please\n\n"),
})
for _, cveID := range cveIDs {
f, ok := idToFile[cveID]
if !ok {
return fmt.Errorf("could not write %s based on %q: no file for %s found", filename, url, cveID)
}
b, err := f.ReadAll(repo)
if err != nil {
return err
}
arFiles = append(arFiles, txtar.File{
Name: path.Join(f.DirPath, f.Filename),
Data: b,
})
}
return test.WriteTxtar(filename, arFiles,
fmt.Sprintf("Repo in the shape of %q.\nUpdated with real data %s.\nAuto-generated; do not edit directly.",
url, time.Now().Truncate(24*time.Hour).Format(time.RFC3339)))
}
|
cvelistrepo
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/cvelistrepo/cvelistrepo_test.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package cvelistrepo
import (
"context"
"flag"
"fmt"
"os"
"testing"
"github.com/google/go-cmp/cmp"
"github.com/google/go-cmp/cmp/cmpopts"
"golang.org/x/vulndb/internal/cve4"
"golang.org/x/vulndb/internal/cve5"
"golang.org/x/vulndb/internal/gitrepo"
"golang.org/x/vulndb/internal/idstr"
"golang.org/x/vulndb/internal/report"
)
var update = flag.Bool("update", false, "update the .txtar files with real CVE data (this takes a while)")
var (
v4txtar = "testdata/v4.txtar"
v5txtar = "testdata/v5.txtar"
cveIDs = []string{
"CVE-2021-0001",
"CVE-2021-0010",
"CVE-2021-1384",
"CVE-2020-9283",
"CVE-2022-39213",
}
)
func TestMain(m *testing.M) {
flag.Parse()
if *update {
ctx := context.Background()
if err := writeTxtarRepo(ctx, URLv4, v4txtar, cveIDs); err != nil {
fail(err)
}
if err := writeTxtarRepo(ctx, URLv5, v5txtar, cveIDs); err != nil {
fail(err)
}
}
os.Exit(m.Run())
}
func fail(err error) {
fmt.Fprintln(os.Stderr, err)
os.Exit(1)
}
func TestFiles(t *testing.T) {
for _, tc := range []struct {
name string
txtarFile string
want []File
}{
{
name: "v4",
txtarFile: v4txtar,
want: []File{
{DirPath: "2020/9xxx", Filename: "CVE-2020-9283.json", Year: 2020, Number: 9283},
{DirPath: "2021/0xxx", Filename: "CVE-2021-0001.json", Year: 2021, Number: 1},
{DirPath: "2021/0xxx", Filename: "CVE-2021-0010.json", Year: 2021, Number: 10},
{DirPath: "2021/1xxx", Filename: "CVE-2021-1384.json", Year: 2021, Number: 1384},
{DirPath: "2022/39xxx", Filename: "CVE-2022-39213.json", Year: 2022, Number: 39213},
},
},
{
name: "v5",
txtarFile: v5txtar,
want: []File{
{DirPath: "cves/2020/9xxx", Filename: "CVE-2020-9283.json", Year: 2020, Number: 9283},
{DirPath: "cves/2021/0xxx", Filename: "CVE-2021-0001.json", Year: 2021, Number: 1},
{DirPath: "cves/2021/0xxx", Filename: "CVE-2021-0010.json", Year: 2021, Number: 10},
{DirPath: "cves/2021/1xxx", Filename: "CVE-2021-1384.json", Year: 2021, Number: 1384},
{DirPath: "cves/2022/39xxx", Filename: "CVE-2022-39213.json", Year: 2022, Number: 39213},
},
},
} {
t.Run(tc.name, func(t *testing.T) {
repo, commit, err := gitrepo.TxtarRepoAndHead(tc.txtarFile)
if err != nil {
t.Fatal(err)
}
got, err := Files(repo, commit)
if err != nil {
t.Fatal(err)
}
opt := cmpopts.IgnoreFields(File{}, "TreeHash", "BlobHash")
if diff := cmp.Diff(tc.want, got, cmp.AllowUnexported(File{}), opt); diff != "" {
t.Errorf("mismatch (-want, +got):\n%s", diff)
}
})
}
}
func TestFetchCVE(t *testing.T) {
testFetchCVE[*cve4.CVE](t, "v4", v4txtar)
testFetchCVE[*cve5.CVERecord](t, "v5", v5txtar)
}
func testFetchCVE[S report.Source](t *testing.T, name, txtarFile string) {
t.Run(name, func(t *testing.T) {
ctx := context.Background()
repo, _, err := gitrepo.TxtarRepoAndHead(txtarFile)
if err != nil {
t.Fatal(err)
}
for _, id := range cveIDs {
t.Run(id, func(t *testing.T) {
cve, err := FetchCVE[S](ctx, repo, id)
if err != nil {
t.Fatal(err)
}
if got, want := cve.SourceID(), id; got != want {
t.Errorf("FetchCVE(%s) ID = %s, want %s", id, got, want)
}
})
}
})
}
func TestParse(t *testing.T) {
testParse[*cve4.CVE](t, "v4", v4txtar)
testParse[*cve5.CVERecord](t, "v5", v5txtar)
}
func testParse[S report.Source](t *testing.T, name, txtarFile string) {
t.Run(name, func(t *testing.T) {
repo, commit, err := gitrepo.TxtarRepoAndHead(txtarFile)
if err != nil {
t.Fatal(err)
}
files, err := Files(repo, commit)
if err != nil {
t.Fatal(err)
}
for _, file := range files {
t.Run(file.Filename, func(t *testing.T) {
cve, err := Parse[S](repo, file)
if err != nil {
t.Fatal(err)
}
want := idstr.FindCVE(file.Filename)
if got := cve.SourceID(); got != want {
t.Errorf("ParseCVE(%s) ID = %s, want %s", file.Filename, got, want)
t.Log(cve)
}
})
}
})
}
|
testdata
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/cvelistrepo/testdata/v5.txtar
|
Copyright 2023 The Go Authors. All rights reserved.
Use of this source code is governed by a BSD-style
license that can be found in the LICENSE file.
Repo in the shape of "https://github.com/CVEProject/cvelistV5".
Updated with real data 2023-11-20T19:00:00-05:00.
Auto-generated; do not edit directly.
-- README.md --
ignore me please
-- cves/2021/0xxx/CVE-2021-0001.json --
{
"containers": {
"cna": {
"affected": [
{
"product": "Intel(R) IPP",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before version 2020 update 1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Observable timing discrepancy in Intel(R) IPP before version 2020 update 1 may allow authorized user to potentially enable information disclosure via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "information disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-09T19:01:55",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00477.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2021-0001",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) IPP",
"version": {
"version_data": [
{
"version_value": "before version 2020 update 1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Observable timing discrepancy in Intel(R) IPP before version 2020 update 1 may allow authorized user to potentially enable information disclosure via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "information disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00477.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00477.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2021-0001",
"datePublished": "2021-06-09T19:01:55",
"dateReserved": "2020-10-22T00:00:00",
"dateUpdated": "2021-06-09T19:01:55",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0"
}
-- cves/2021/0xxx/CVE-2021-0010.json --
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"state": "REJECTED",
"cveId": "CVE-2021-0010",
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"dateUpdated": "2023-05-16T00:00:00",
"dateRejected": "2023-05-16T00:00:00",
"dateReserved": "2020-10-22T00:00:00"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel",
"dateUpdated": "2023-05-16T00:00:00"
},
"rejectedReasons": [
{
"lang": "en",
"value": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
]
}
}
}
-- cves/2021/1xxx/CVE-2021-1384.json --
{
"containers": {
"cna": {
"affected": [
{
"product": "Cisco IOS XE Software ",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2021-03-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco IOx application hosting environment of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands into the underlying operating system as the root user. This vulnerability is due to incomplete validation of fields in the application packages loaded onto IOx. An attacker could exploit this vulnerability by creating a crafted application .tar file and loading it onto the device. A successful exploit could allow the attacker to perform command injection into the underlying operating system as the root user."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-04-22T19:37:18",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20210324 Cisco IOx for IOS XE Software Command Injection Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-cmdinj-RkSURGHG"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-h332-fj6p-2232"
}
],
"source": {
"advisory": "cisco-sa-iox-cmdinj-RkSURGHG",
"defect": [
[
"CSCvw64798"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco IOx for IOS XE Software Command Injection Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2021-03-24T16:00:00",
"ID": "CVE-2021-1384",
"STATE": "PUBLIC",
"TITLE": "Cisco IOx for IOS XE Software Command Injection Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS XE Software ",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in Cisco IOx application hosting environment of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands into the underlying operating system as the root user. This vulnerability is due to incomplete validation of fields in the application packages loaded onto IOx. An attacker could exploit this vulnerability by creating a crafted application .tar file and loading it onto the device. A successful exploit could allow the attacker to perform command injection into the underlying operating system as the root user."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
}
],
"impact": {
"cvss": {
"baseScore": "6.5",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N ",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20210324 Cisco IOx for IOS XE Software Command Injection Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-cmdinj-RkSURGHG"
},
{
"name": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-h332-fj6p-2232",
"refsource": "MISC",
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-h332-fj6p-2232"
}
]
},
"source": {
"advisory": "cisco-sa-iox-cmdinj-RkSURGHG",
"defect": [
[
"CSCvw64798"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2021-1384",
"datePublished": "2021-03-24T00:00:00",
"dateReserved": "2020-11-13T00:00:00",
"dateUpdated": "2022-04-22T19:37:18",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0"
}
-- cves/2020/9xxx/CVE-2020-9283.json --
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"state": "PUBLISHED",
"cveId": "CVE-2020-9283",
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"dateUpdated": "2023-06-16T00:00:00",
"dateReserved": "2020-02-19T00:00:00",
"datePublished": "2020-02-20T00:00:00"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2023-06-16T00:00:00"
},
"descriptions": [
{
"lang": "en",
"value": "golang.org/x/crypto before v0.0.0-20200220183623-bac4c82f6975 for Go allows a panic during signature verification in the golang.org/x/crypto/ssh package. A client can attack an SSH server that accepts public keys. Also, a server can attack any SSH client."
}
],
"affected": [
{
"vendor": "n/a",
"product": "n/a",
"versions": [
{
"version": "n/a",
"status": "affected"
}
]
}
],
"references": [
{
"url": "https://groups.google.com/forum/#%21topic/golang-announce/3L45YRc91SY"
},
{
"url": "http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html"
},
{
"name": "[debian-lts-announce] 20201007 [SECURITY] [DLA 2402-1] golang-go.crypto security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00014.html"
},
{
"name": "[debian-lts-announce] 20201116 [SECURITY] [DLA 2453-1] restic security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00027.html"
},
{
"name": "[debian-lts-announce] 20201118 [SECURITY] [DLA 2455-1] packer security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00031.html"
},
{
"name": "[debian-lts-announce] 20230616 [SECURITY] [DLA 3455-1] golang-go.crypto security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00017.html"
}
],
"problemTypes": [
{
"descriptions": [
{
"type": "text",
"lang": "en",
"description": "n/a"
}
]
}
]
}
}
}
-- cves/2022/39xxx/CVE-2022-39213.json --
{
"containers": {
"cna": {
"affected": [
{
"product": "go-cvss",
"vendor": "pandatix",
"versions": [
{
"status": "affected",
"version": ">= 0.2.0, < 0.4.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "go-cvss is a Go module to manipulate Common Vulnerability Scoring System (CVSS). In affected versions when a full CVSS v2.0 vector string is parsed using `ParseVector`, an Out-of-Bounds Read is possible due to a lack of tests. The Go module will then panic. The problem is patched in tag `v0.4.0`, by the commit `d9d478ff0c13b8b09ace030db9262f3c2fe031f4`. Users are advised to upgrade. Users unable to upgrade may avoid this issue by parsing only CVSS v2.0 vector strings that do not have all attributes defined (e.g. `AV:N/AC:L/Au:N/C:P/I:P/A:C/E:U/RL:OF/RC:C/CDP:MH/TD:H/CR:M/IR:M/AR:M`). As stated in [SECURITY.md](https://github.com/pandatix/go-cvss/blob/master/SECURITY.md), the CPE v2.3 to refer to this Go module is `cpe:2.3:a:pandatix:go_cvss:*:*:*:*:*:*:*:*`. The entry has already been requested to the NVD CPE dictionary."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125: Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-09-15T21:45:12",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/pandatix/go-cvss/security/advisories/GHSA-xhmf-mmv2-4hhx"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/pandatix/go-cvss/commit/d9d478ff0c13b8b09ace030db9262f3c2fe031f4"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/pandatix/go-cvss/blob/master/SECURITY.md"
}
],
"source": {
"advisory": "GHSA-xhmf-mmv2-4hhx",
"discovery": "UNKNOWN"
},
"title": "Out-of-bounds Read in go-cvss",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-39213",
"STATE": "PUBLIC",
"TITLE": "Out-of-bounds Read in go-cvss"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "go-cvss",
"version": {
"version_data": [
{
"version_value": ">= 0.2.0, < 0.4.0"
}
]
}
}
]
},
"vendor_name": "pandatix"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "go-cvss is a Go module to manipulate Common Vulnerability Scoring System (CVSS). In affected versions when a full CVSS v2.0 vector string is parsed using `ParseVector`, an Out-of-Bounds Read is possible due to a lack of tests. The Go module will then panic. The problem is patched in tag `v0.4.0`, by the commit `d9d478ff0c13b8b09ace030db9262f3c2fe031f4`. Users are advised to upgrade. Users unable to upgrade may avoid this issue by parsing only CVSS v2.0 vector strings that do not have all attributes defined (e.g. `AV:N/AC:L/Au:N/C:P/I:P/A:C/E:U/RL:OF/RC:C/CDP:MH/TD:H/CR:M/IR:M/AR:M`). As stated in [SECURITY.md](https://github.com/pandatix/go-cvss/blob/master/SECURITY.md), the CPE v2.3 to refer to this Go module is `cpe:2.3:a:pandatix:go_cvss:*:*:*:*:*:*:*:*`. The entry has already been requested to the NVD CPE dictionary."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-125: Out-of-bounds Read"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/pandatix/go-cvss/security/advisories/GHSA-xhmf-mmv2-4hhx",
"refsource": "CONFIRM",
"url": "https://github.com/pandatix/go-cvss/security/advisories/GHSA-xhmf-mmv2-4hhx"
},
{
"name": "https://github.com/pandatix/go-cvss/commit/d9d478ff0c13b8b09ace030db9262f3c2fe031f4",
"refsource": "MISC",
"url": "https://github.com/pandatix/go-cvss/commit/d9d478ff0c13b8b09ace030db9262f3c2fe031f4"
},
{
"name": "https://github.com/pandatix/go-cvss/blob/master/SECURITY.md",
"refsource": "MISC",
"url": "https://github.com/pandatix/go-cvss/blob/master/SECURITY.md"
}
]
},
"source": {
"advisory": "GHSA-xhmf-mmv2-4hhx",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2022-39213",
"datePublished": "2022-09-15T21:45:12",
"dateReserved": "2022-09-02T00:00:00",
"dateUpdated": "2022-09-15T21:45:12",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0"
}
|
testdata
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/cvelistrepo/testdata/NOTICE
|
# NOTICE
The `testdata` folder contains unmodified data from
[CVE List](https://github.com/CVEProject/cvelist),
and [CVE List V5](https://github.com/CVEProject/cvelistV5),
licensed under [CVE license](https://www.cve.org/Legal/TermsOfUse).
|
testdata
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/cvelistrepo/testdata/v4.txtar
|
Copyright 2023 The Go Authors. All rights reserved.
Use of this source code is governed by a BSD-style
license that can be found in the LICENSE file.
Repo in the shape of "https://github.com/CVEProject/cvelist".
Updated with real data 2023-11-20T19:00:00-05:00.
Auto-generated; do not edit directly.
-- README.md --
ignore me please
-- 2021/0xxx/CVE-2021-0001.json --
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-0001",
"ASSIGNER": "secure@intel.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Intel(R) IPP",
"version": {
"version_data": [
{
"version_value": "before version 2020 update 1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "information disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00477.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00477.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Observable timing discrepancy in Intel(R) IPP before version 2020 update 1 may allow authorized user to potentially enable information disclosure via local access."
}
]
}
}
-- 2021/0xxx/CVE-2021-0010.json --
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-0010",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
]
}
}
-- 2021/1xxx/CVE-2021-1384.json --
{
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2021-03-24T16:00:00",
"ID": "CVE-2021-1384",
"STATE": "PUBLIC",
"TITLE": "Cisco IOx for IOS XE Software Command Injection Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS XE Software ",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in Cisco IOx application hosting environment of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands into the underlying operating system as the root user. This vulnerability is due to incomplete validation of fields in the application packages loaded onto IOx. An attacker could exploit this vulnerability by creating a crafted application .tar file and loading it onto the device. A successful exploit could allow the attacker to perform command injection into the underlying operating system as the root user."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
}
],
"impact": {
"cvss": {
"baseScore": "6.5",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N ",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20210324 Cisco IOx for IOS XE Software Command Injection Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-cmdinj-RkSURGHG"
},
{
"refsource": "MISC",
"name": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-h332-fj6p-2232",
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-h332-fj6p-2232"
}
]
},
"source": {
"advisory": "cisco-sa-iox-cmdinj-RkSURGHG",
"defect": [
[
"CSCvw64798"
]
],
"discovery": "INTERNAL"
}
}
-- 2020/9xxx/CVE-2020-9283.json --
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-9283",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "golang.org/x/crypto before v0.0.0-20200220183623-bac4c82f6975 for Go allows a panic during signature verification in the golang.org/x/crypto/ssh package. A client can attack an SSH server that accepts public keys. Also, a server can attack any SSH client."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY",
"url": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html",
"url": "http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201007 [SECURITY] [DLA 2402-1] golang-go.crypto security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00014.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201116 [SECURITY] [DLA 2453-1] restic security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00027.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201118 [SECURITY] [DLA 2455-1] packer security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00031.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20230616 [SECURITY] [DLA 3455-1] golang-go.crypto security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00017.html"
}
]
}
}
-- 2022/39xxx/CVE-2022-39213.json --
{
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-39213",
"STATE": "PUBLIC",
"TITLE": "Out-of-bounds Read in go-cvss"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "go-cvss",
"version": {
"version_data": [
{
"version_value": ">= 0.2.0, < 0.4.0"
}
]
}
}
]
},
"vendor_name": "pandatix"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "go-cvss is a Go module to manipulate Common Vulnerability Scoring System (CVSS). In affected versions when a full CVSS v2.0 vector string is parsed using `ParseVector`, an Out-of-Bounds Read is possible due to a lack of tests. The Go module will then panic. The problem is patched in tag `v0.4.0`, by the commit `d9d478ff0c13b8b09ace030db9262f3c2fe031f4`. Users are advised to upgrade. Users unable to upgrade may avoid this issue by parsing only CVSS v2.0 vector strings that do not have all attributes defined (e.g. `AV:N/AC:L/Au:N/C:P/I:P/A:C/E:U/RL:OF/RC:C/CDP:MH/TD:H/CR:M/IR:M/AR:M`). As stated in [SECURITY.md](https://github.com/pandatix/go-cvss/blob/master/SECURITY.md), the CPE v2.3 to refer to this Go module is `cpe:2.3:a:pandatix:go_cvss:*:*:*:*:*:*:*:*`. The entry has already been requested to the NVD CPE dictionary."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-125: Out-of-bounds Read"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/pandatix/go-cvss/security/advisories/GHSA-xhmf-mmv2-4hhx",
"refsource": "CONFIRM",
"url": "https://github.com/pandatix/go-cvss/security/advisories/GHSA-xhmf-mmv2-4hhx"
},
{
"name": "https://github.com/pandatix/go-cvss/commit/d9d478ff0c13b8b09ace030db9262f3c2fe031f4",
"refsource": "MISC",
"url": "https://github.com/pandatix/go-cvss/commit/d9d478ff0c13b8b09ace030db9262f3c2fe031f4"
},
{
"name": "https://github.com/pandatix/go-cvss/blob/master/SECURITY.md",
"refsource": "MISC",
"url": "https://github.com/pandatix/go-cvss/blob/master/SECURITY.md"
}
]
},
"source": {
"advisory": "GHSA-xhmf-mmv2-4hhx",
"discovery": "UNKNOWN"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/osv/time.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package osv
import (
"encoding/json"
"time"
)
// Time is a wrapper for time.Time that marshals and unmarshals
// RFC3339 formatted UTC strings.
type Time struct {
time.Time
}
// MarshalJSON encodes the time as
// an RFC3339-formatted string in UTC (ending in "Z"),
// as required by the OSV specification.
func (t Time) MarshalJSON() ([]byte, error) {
return json.Marshal(t.UTC().Format(time.RFC3339))
}
// UnmarshalJSON decodes an RFC3339-formatted string
// into a Time struct. It errors if data
// is not a valid RFC3339-formatted string.
func (t *Time) UnmarshalJSON(data []byte) error {
var s string
if err := json.Unmarshal(data, &s); err != nil {
return err
}
time, err := time.Parse(time.RFC3339, s)
if err != nil {
return err
}
t.Time = time.UTC()
return nil
}
func (t Time) MarshalYAML() (interface{}, error) {
if !t.IsZero() {
return t.UTC().Format(time.RFC3339), nil
}
return t, nil
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/osv/time_test.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package osv
import (
"encoding/json"
"fmt"
"testing"
)
func TestMarshalUnmarshalTime(t *testing.T) {
tests := []struct {
name string
in string
want string
}{
{
name: "no offset",
in: "1999-01-01T00:00:00Z",
want: "1999-01-01T00:00:00Z",
},
{
// Unmarshal should remove the offset.
name: "offset",
in: "1999-01-01T01:00:00.000+01:00",
want: "1999-01-01T00:00:00Z",
},
}
for _, tc := range tests {
in := fmt.Sprintf(`{"time":%q}`, tc.in)
want := fmt.Sprintf(`{"time":%q}`, tc.want)
var timeStruct = struct {
Time Time `json:"time"`
}{}
if err := json.Unmarshal([]byte(in), &timeStruct); err != nil {
t.Fatalf("json.Unmarshal = %s, want success", err)
}
b, err := json.Marshal(timeStruct)
if err != nil {
t.Fatalf("json.Marshal = %s, want success", err)
}
if got := string(b); want != got {
t.Errorf("json.Marshal = %s, want %s", got, want)
}
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/osv/osv.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Package osv implements the Go OSV vulnerability format
// (https://go.dev/security/vuln/database#schema), which is a subset of
// the OSV shared vulnerability format
// (https://ossf.github.io/osv-schema), with database and
// ecosystem-specific meanings and fields.
//
// As this package is intended for use with the Go vulnerability
// database, only the subset of features which are used by that
// database are implemented (for instance, only the SEMVER affected
// range type is implemented).
package osv
// RangeType specifies the type of version range being recorded and
// defines the interpretation of the RangeEvent object's Introduced
// and Fixed fields.
//
// In this implementation, only the "SEMVER" type is allowed for
// standard ranges.
// However, the "ECOSYSTEM" type is acceptable for the
// "ecosystem_specific.custom_ranges" field.
//
// See https://ossf.github.io/osv-schema/#affectedrangestype-field.
type RangeType string
const (
// RangeTypeSemver indicates a semantic version as defined by
// SemVer 2.0.0, with no leading "v" prefix.
RangeTypeSemver RangeType = "SEMVER"
// RangeTypeEcosystem indicates arbitrary, uninterpreted strings
// specific to the package ecosystem, which does not necessarilty
// conform to SemVer 2.0's version ordering.
RangeTypeEcosystem RangeType = "ECOSYSTEM"
)
// Ecosystem identifies the overall library ecosystem.
// In this implementation, only the "Go" ecosystem is supported.
type Ecosystem string
// GoEcosystem indicates the Go ecosystem.
const GoEcosystem Ecosystem = "Go"
// Pseudo-module paths used to describe vulnerabilities
// in the Go standard library and toolchain.
const (
// GoStdModulePath is the pseudo-module path string used
// to describe vulnerabilities in the Go standard library.
GoStdModulePath = "stdlib"
// GoCmdModulePath is the pseudo-module path string used
// to describe vulnerabilities in the go command.
GoCmdModulePath = "toolchain"
)
// Module identifies the Go module containing the vulnerability.
// Note that this field is called "package" in the OSV specification.
//
// See https://ossf.github.io/osv-schema/#affectedpackage-field.
type Module struct {
// The Go module path. Required.
// For the Go standard library, this is "stdlib".
// For the Go toolchain, this is "toolchain."
Path string `json:"name"`
// The ecosystem containing the module. Required.
// This should always be "Go".
Ecosystem Ecosystem `json:"ecosystem"`
}
// RangeEvent describes a single module version that either
// introduces or fixes a vulnerability.
//
// Exactly one of Introduced and Fixed must be present. Other range
// event types (e.g, "last_affected" and "limit") are not supported in
// this implementation.
//
// See https://ossf.github.io/osv-schema/#affectedrangesevents-fields.
type RangeEvent struct {
// Introduced is a version that introduces the vulnerability.
// A special value, "0", represents a version that sorts before
// any other version, and should be used to indicate that the
// vulnerability exists from the "beginning of time".
Introduced string `json:"introduced,omitempty"`
// Fixed is a version that fixes the vulnerability.
Fixed string `json:"fixed,omitempty"`
}
// Range describes the affected versions of the vulnerable module.
//
// See https://ossf.github.io/osv-schema/#affectedranges-field.
type Range struct {
// Type is the version type that should be used to interpret the
// versions in Events. Required.
// In this implementation, only the "SEMVER" type is supported.
Type RangeType `json:"type"`
// Events is a list of versions representing the ranges in which
// the module is vulnerable. Required.
// The events should be sorted, and MUST represent non-overlapping
// ranges.
// There must be at least one RangeEvent containing a value for
// Introduced.
// See https://ossf.github.io/osv-schema/#examples for examples.
Events []RangeEvent `json:"events"`
}
// Reference type is a reference (link) type.
type ReferenceType string
const (
// ReferenceTypeAdvisory is a published security advisory for
// the vulnerability.
ReferenceTypeAdvisory = ReferenceType("ADVISORY")
// ReferenceTypeArticle is an article or blog post describing the vulnerability.
ReferenceTypeArticle = ReferenceType("ARTICLE")
// ReferenceTypeReport is a report, typically on a bug or issue tracker, of
// the vulnerability.
ReferenceTypeReport = ReferenceType("REPORT")
// ReferenceTypeFix is a source code browser link to the fix (e.g., a GitHub commit).
ReferenceTypeFix = ReferenceType("FIX")
// ReferenceTypePackage is a home web page for the package.
ReferenceTypePackage = ReferenceType("PACKAGE")
// ReferenceTypeEvidence is a demonstration of the validity of a vulnerability claim.
ReferenceTypeEvidence = ReferenceType("EVIDENCE")
// ReferenceTypeWeb is a web page of some unspecified kind.
ReferenceTypeWeb = ReferenceType("WEB")
)
// ReferenceTypes is the set of reference types defined in OSV.
var ReferenceTypes = []ReferenceType{
ReferenceTypeAdvisory,
ReferenceTypeArticle,
ReferenceTypeReport,
ReferenceTypeFix,
ReferenceTypePackage,
ReferenceTypeEvidence,
ReferenceTypeWeb,
}
// Reference is a reference URL containing additional information,
// advisories, issue tracker entries, etc., about the vulnerability.
//
// See https://ossf.github.io/osv-schema/#references-field.
type Reference struct {
// The type of reference. Required.
Type ReferenceType `json:"type"`
// The fully-qualified URL of the reference. Required.
URL string `json:"url"`
}
// Affected gives details about a module affected by the vulnerability.
//
// See https://ossf.github.io/osv-schema/#affected-fields.
type Affected struct {
// The affected Go module. Required.
// Note that this field is called "package" in the OSV specification.
Module Module `json:"package"`
// The Go module version ranges affected by the vulnerability.
Ranges []Range `json:"ranges,omitempty"`
// Details on the affected packages and symbols within the module.
EcosystemSpecific *EcosystemSpecific `json:"ecosystem_specific,omitempty"`
}
// Package contains additional information about an affected package.
// This is an ecosystem-specific field for the Go ecosystem.
type Package struct {
// Path is the package import path. Required.
Path string `json:"path"`
// GOOS is the execution operating system where the symbols appear, if
// known.
GOOS []string `json:"goos,omitempty"`
// GOARCH specifies the execution architecture where the symbols appear, if
// known.
GOARCH []string `json:"goarch,omitempty"`
// Symbols is a list of function and method names affected by
// this vulnerability. Methods are listed as <recv>.<method>.
//
// If included, only programs which use these symbols will be marked as
// vulnerable by `govulncheck`. If omitted, any program which imports this
// package will be marked vulnerable.
Symbols []string `json:"symbols,omitempty"`
}
// EcosystemSpecific contains additional information about the vulnerable
// module for the Go ecosystem.
//
// See https://go.dev/security/vuln/database#schema.
type EcosystemSpecific struct {
// Packages is the list of affected packages within the module.
Packages []Package `json:"imports,omitempty"`
// CustomRanges are the version ranges affected by the vulnerability
// which are not compatible with Go module version numbering
// (https://go.dev/doc/modules/version-numbers).
// These ranges may be displayed but are generally not consumable
// by tools like govulncheck which expect standard Go module versions.
CustomRanges []Range `json:"custom_ranges,omitempty"`
}
// Entry represents a vulnerability in the Go OSV format, documented
// in https://go.dev/security/vuln/database#schema.
// It is a subset of the OSV schema (https://ossf.github.io/osv-schema).
// Only fields that are published in the Go Vulnerability Database
// are supported.
type Entry struct {
// SchemaVersion is the OSV schema version used to encode this
// vulnerability.
SchemaVersion string `json:"schema_version,omitempty"`
// ID is a unique identifier for the vulnerability. Required.
// The Go vulnerability database issues IDs of the form
// GO-<YEAR>-<ENTRYID>.
ID string `json:"id"`
// Modified is the time the entry was last modified. Required.
Modified Time `json:"modified,omitempty"`
// Published is the time the entry should be considered to have
// been published.
Published Time `json:"published,omitempty"`
// Withdrawn is the time the entry should be considered to have
// been withdrawn. If the field is missing, then the entry has
// not been withdrawn.
Withdrawn *Time `json:"withdrawn,omitempty"`
// Aliases is a list of IDs for the same vulnerability in other
// databases.
Aliases []string `json:"aliases,omitempty"`
// Related is a list of IDs closely related to this vulnerability.
Related []string `json:"related,omitempty"`
// Summary contains a a one-line, English textual summary of the
// vulnerability.
Summary string `json:"summary,omitempty"`
// Details contains English textual details about the vulnerability.
Details string `json:"details"`
// Affected contains information on the modules and versions
// affected by the vulnerability.
Affected []Affected `json:"affected"`
// References contains links to more information about the
// vulnerability.
References []Reference `json:"references,omitempty"`
// Credits contains credits to entities that helped find or fix the
// vulnerability.
Credits []Credit `json:"credits,omitempty"`
// DatabaseSpecific contains additional information about the
// vulnerability, specific to the Go vulnerability database.
DatabaseSpecific *DatabaseSpecific `json:"database_specific,omitempty"`
}
// Credit represents a credit for the discovery, confirmation, patch, or
// other event in the life cycle of a vulnerability.
//
// See https://ossf.github.io/osv-schema/#credits-fields.
type Credit struct {
// Name is the name, label, or other identifier of the individual or
// entity being credited. Required.
Name string `json:"name"`
}
// DatabaseSpecific contains additional information about the
// vulnerability, specific to the Go vulnerability database.
//
// See https://go.dev/security/vuln/database#schema.
type DatabaseSpecific struct {
// The URL of the Go advisory for this vulnerability, of the form
// "https://pkg.go.dev/GO-YYYY-XXXX".
URL string `json:"url,omitempty"`
// The review status of this report (UNREVIEWED or REVIEWED).
ReviewStatus ReviewStatus `json:"review_status,omitempty"`
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/osv/review_status.go
|
// Copyright 2024 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package osv
import (
"encoding/json"
"fmt"
)
type ReviewStatus int
const (
ReviewStatusUnknown ReviewStatus = iota
ReviewStatusUnreviewed
ReviewStatusReviewed
)
var statusStrs = []string{
ReviewStatusUnknown: "",
ReviewStatusUnreviewed: "UNREVIEWED",
ReviewStatusReviewed: "REVIEWED",
}
func (r ReviewStatus) String() string {
if !r.IsValid() {
return fmt.Sprintf("INVALID(%d)", r)
}
return statusStrs[r]
}
func ReviewStatusValues() []string {
return statusStrs[1:]
}
func (r ReviewStatus) IsValid() bool {
return int(r) >= 0 && int(r) < len(statusStrs)
}
func ToReviewStatus(s string) (ReviewStatus, bool) {
for stat, str := range statusStrs {
if s == str {
return ReviewStatus(stat), true
}
}
return 0, false
}
func (r ReviewStatus) MarshalJSON() ([]byte, error) {
if !r.IsValid() {
return nil, fmt.Errorf("MarshalJSON: unrecognized review status: %d", r)
}
return json.Marshal(r.String())
}
func (r *ReviewStatus) UnmarshalJSON(b []byte) error {
var s string
if err := json.Unmarshal(b, &s); err != nil {
return err
}
if rs, ok := ToReviewStatus(s); ok {
*r = rs
return nil
}
return fmt.Errorf("UnmarshalJSON: unrecognized review status: %s", s)
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/osv/osv_test.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package osv_test
import (
"testing"
"golang.org/x/vulndb/internal/test"
)
func TestImports(t *testing.T) {
// package osv only allows non stdlib imports.
//
// This is intended to make it easy for anyone to copy and paste the
// JSON structs if needed.
test.VerifyImports(t)
}
|
pkgsite
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/pkgsite/client.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package pkgsite
import (
"context"
"encoding/json"
"fmt"
"io"
"net/http"
"net/http/httptest"
"os"
"path/filepath"
"strconv"
"sync"
"testing"
"time"
"golang.org/x/time/rate"
"golang.org/x/vulndb/internal/stdlib"
"golang.org/x/vulndb/internal/worker/log"
)
type Client struct {
url string
cache *cache
}
func Default() *Client {
return New(pkgsiteURL)
}
func New(url string) *Client {
return &Client{
url: url,
cache: newCache(),
}
}
func (pc *Client) SetKnownModules(known []string) {
pc.cache.setKnownModules(known)
}
// Limit pkgsite requests to this many per second.
const pkgsiteQPS = 20
var (
// The limiter used to throttle pkgsite requests.
// The second argument to rate.NewLimiter is the burst, which
// basically lets you exceed the rate briefly.
pkgsiteRateLimiter = rate.NewLimiter(rate.Every(1*time.Second/pkgsiteQPS), 3)
)
var pkgsiteURL = "https://pkg.go.dev"
// KnownModule reports whether pkgsite knows that path actually refers
// to a module or package path.
func (pc *Client) KnownModule(ctx context.Context, path string) (bool, error) {
return pc.lookupEndpoint(ctx, moduleEndpoint(path))
}
// KnownAtVersion reports whether pkgsite knows that the path exists at the given
// bare version.
func (pc *Client) KnownAtVersion(ctx context.Context, path, version string) (bool, error) {
prefix := "v"
if stdlib.Contains(path) {
prefix = "go"
}
return pc.lookupEndpoint(ctx, "/"+path+"@"+prefix+version)
}
func (pc *Client) lookupEndpoint(ctx context.Context, endpoint string) (bool, error) {
found, ok := pc.cache.lookup(endpoint)
if ok {
return found, nil
}
// Pause to maintain a max QPS.
if err := pkgsiteRateLimiter.Wait(ctx); err != nil {
return false, err
}
start := time.Now()
res, err := http.Head(pc.url + endpoint)
var status string
if err == nil {
status = strconv.Quote(res.Status)
}
log.With(
"latency", time.Since(start),
"status", status,
"error", err,
).Debugf(ctx, "checked if %s is known to pkgsite", endpoint)
if err != nil {
return false, err
}
known := res.StatusCode == http.StatusOK
pc.cache.add(endpoint, known)
return known, nil
}
func (pc *Client) URL() string {
return pc.url
}
func readKnown(r io.Reader) (map[string]bool, error) {
b, err := io.ReadAll(r)
if err != nil {
return nil, err
}
if len(b) == 0 {
return nil, fmt.Errorf("no data")
}
seen := make(map[string]bool)
if err := json.Unmarshal(b, &seen); err != nil {
return nil, err
}
return seen, nil
}
func (c *cache) writeKnown(w io.Writer) error {
c.mu.Lock()
defer c.mu.Unlock()
b, err := json.MarshalIndent(c.seen, "", " ")
if err != nil {
return err
}
_, err = w.Write(b)
return err
}
// cacheFile returns a default cache file that can be used as an input
// to testClient.
//
// For testing.
func cacheFile(t *testing.T) (*os.File, error) {
filename := filepath.Join("testdata", "pkgsite", t.Name()+".json")
if err := os.MkdirAll(filepath.Dir(filename), 0755); err != nil {
return nil, err
}
// If the file doesn't exist, or is empty, add an empty map.
fi, err := os.Stat(filename)
if err != nil || fi.Size() == 0 {
if err := os.WriteFile(filename, []byte("{}\n"), 0644); err != nil {
return nil, err
}
}
f, err := os.OpenFile(filename, os.O_RDWR, 0644)
if err != nil {
return nil, err
}
t.Cleanup(func() {
if err := f.Close(); err != nil {
t.Error(err)
}
})
return f, nil
}
// TestClient returns a pkgsite client that talks to either
// a fake server or the real pkg.go.dev, depending on the useRealPkgsite value.
//
// For testing.
func TestClient(t *testing.T, useRealPkgsite bool) (*Client, error) {
cf, err := cacheFile(t)
if err != nil {
return nil, err
}
return testClient(t, useRealPkgsite, cf)
}
func testClient(t *testing.T, useRealPkgsite bool, rw io.ReadWriter) (*Client, error) {
if useRealPkgsite {
c := Default()
t.Cleanup(func() {
err := c.cache.writeKnown(rw)
if err != nil {
t.Error(err)
}
})
return c, nil
}
known, err := readKnown(rw)
if err != nil {
return nil, fmt.Errorf("could not read known modules: %w", err)
}
s := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
if !known[r.URL.Path] {
http.Error(w, "unknown", http.StatusNotFound)
}
}))
t.Cleanup(s.Close)
return New(s.URL), nil
}
type cache struct {
mu sync.Mutex
// Endpoints already seen.
seen map[string]bool
// Does the cache contain all known endpoints
complete bool
}
func newCache() *cache {
return &cache{
seen: make(map[string]bool),
complete: false,
}
}
func (c *cache) setKnownModules(known []string) {
c.mu.Lock()
defer c.mu.Unlock()
for _, km := range known {
c.seen[moduleEndpoint(km)] = true
}
c.complete = true
}
func moduleEndpoint(path string) string {
return "/mod/" + path
}
func (c *cache) lookup(endpoint string) (known bool, ok bool) {
c.mu.Lock()
defer c.mu.Unlock()
// In the cache.
if known, ok := c.seen[endpoint]; ok {
return known, true
}
// Not in the cache, but the cache is complete, so this
// endpoint is not known.
if c.complete {
return false, true
}
// We can't make a statement about this endpoint.
return false, false
}
func (c *cache) add(endpoint string, known bool) {
c.mu.Lock()
defer c.mu.Unlock()
c.seen[endpoint] = known
}
|
pkgsite
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/pkgsite/client_test.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package pkgsite
import (
"context"
"flag"
"testing"
)
var usePkgsite = flag.Bool("pkgsite", false, "use pkg.go.dev for tests")
func TestKnown(t *testing.T) {
ctx := context.Background()
for _, test := range []struct {
name string
in string
want bool
}{
{name: "valid", in: "golang.org/x/mod", want: true},
{name: "invalid", in: "github.com/something/something", want: false},
} {
t.Run(test.name, func(t *testing.T) {
pc, err := TestClient(t, *usePkgsite)
if err != nil {
t.Fatal(err)
}
got, err := pc.KnownModule(ctx, test.in)
if err != nil {
t.Fatal(err)
}
if got != test.want {
t.Errorf("%s: got %t, want %t", test.in, got, test.want)
}
})
}
}
func TestKnownParallel(t *testing.T) {
ctx := context.Background()
pc, err := TestClient(t, *usePkgsite)
if err != nil {
t.Fatal(err)
}
for _, test := range []struct {
name string
in string
want bool
}{
{name: "valid", in: "golang.org/x/mod", want: true},
{name: "invalid", in: "github.com/something/something", want: false},
} {
test := test
t.Run(test.name, func(t *testing.T) {
t.Parallel()
got, err := pc.KnownModule(ctx, test.in)
if err != nil {
t.Fatal(err)
}
if got != test.want {
t.Errorf("%s: got %t, want %t", test.in, got, test.want)
}
})
}
}
|
pkgsite
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/pkgsite/testdata/pkgsite/TestKnownParallel.json
|
{
"/mod/github.com/something/something": false,
"/mod/golang.org/x/mod": true
}
|
TestKnown
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/pkgsite/testdata/pkgsite/TestKnown/invalid.json
|
{
"/mod/github.com/something/something": false
}
|
TestKnown
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/pkgsite/testdata/pkgsite/TestKnown/valid.json
|
{
"/mod/golang.org/x/mod": true
}
|
version
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/version/semver.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Package version provides shared utilities for manipulating
// Go semantic versions with no prefix.
package version
import (
"regexp"
"strings"
"golang.org/x/mod/semver"
)
// IsValid reports whether v is a valid unprefixed semantic version.
func IsValid(v string) bool {
return semver.IsValid("v" + v)
}
// Before reports whether v < v2, where v and v2 are unprefixed semantic
// versions.
func Before(v, v2 string) bool {
return semver.Compare("v"+v, "v"+v2) < 0
}
// Major returns the major version (e.g. "v2") of the
// unprefixed semantic version v.
func Major(v string) string {
return semver.Major("v" + v)
}
// Canonical returns the canonical, unprefixed form of the version v,
// which should be an unprefixed semantic version.
// Unlike semver.Canonical, this function preserves build tags.
func Canonical(v string) string {
sv := "v" + v
build := semver.Build(sv)
c := strings.TrimPrefix(semver.Canonical(sv), "v")
return c + build
}
// TrimPrefix removes the 'v' or 'go' prefix from the given
// semantic version v.
func TrimPrefix(v string) string {
v = strings.TrimPrefix(v, "v")
v = strings.TrimPrefix(v, "go")
return v
}
var commitHashRegex = regexp.MustCompile(`^[a-f0-9]+$`)
func IsCommitHash(v string) bool {
return commitHashRegex.MatchString(v)
}
|
gitrepo
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/gitrepo/gitrepo_test.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package gitrepo_test
import (
"fmt"
"testing"
"time"
"github.com/go-git/go-billy/v5"
"github.com/go-git/go-billy/v5/memfs"
"github.com/go-git/go-git/v5"
"github.com/go-git/go-git/v5/plumbing/object"
"github.com/go-git/go-git/v5/storage/memory"
"github.com/google/go-cmp/cmp"
"golang.org/x/vulndb/internal/gitrepo"
)
func TestAllCommitDates(t *testing.T) {
test := newTest(t)
want := map[string]gitrepo.Dates{
"files/1": gitrepo.Dates{
Oldest: time.Date(2020, 1, 1, 1, 0, 0, 0, time.UTC),
Newest: time.Date(2020, 1, 1, 1, 2, 0, 0, time.UTC),
},
"files/2": gitrepo.Dates{
Oldest: time.Date(2020, 1, 1, 1, 1, 0, 0, time.UTC),
Newest: time.Date(2020, 1, 1, 1, 3, 0, 0, time.UTC),
},
}
for name, dates := range want {
now := dates.Oldest
for {
if now.After(dates.Newest) {
now = dates.Newest
}
test.Commit("message", now, map[string]string{
name: fmt.Sprintf("commit at %v", now),
})
if now == dates.Newest {
break
}
now = now.Add(1 * time.Hour)
}
}
got, err := gitrepo.AllCommitDates(test.Repo, gitrepo.HeadReference, "files/")
if err != nil {
t.Fatal(err)
}
if diff := cmp.Diff(want, got); diff != "" {
t.Errorf("AllCommitDates returned unexpected result (-want,+got):\n%v", diff)
}
}
type gitTest struct {
t *testing.T
FS billy.Filesystem
Repo *git.Repository
}
func newTest(t *testing.T) *gitTest {
t.Helper()
mfs := memfs.New()
repo, err := git.Init(memory.NewStorage(), mfs)
if err != nil {
t.Fatal(err)
}
return &gitTest{
t: t,
FS: mfs,
Repo: repo,
}
}
func (test *gitTest) Commit(message string, when time.Time, files map[string]string) {
test.t.Helper()
wt, err := test.Repo.Worktree()
if err != nil {
test.t.Fatal(err)
}
for name, content := range files {
f, err := test.FS.Create(name)
if err != nil {
test.t.Fatal(err)
}
if _, err := f.Write([]byte(content)); err != nil {
test.t.Fatal(err)
}
if err := f.Close(); err != nil {
test.t.Fatal(err)
}
if _, err := wt.Add(name); err != nil {
test.t.Fatal(err)
}
}
if _, err := wt.Commit(message, &git.CommitOptions{All: true, Author: &object.Signature{
Name: "Author",
Email: "author@example.com",
When: when,
}}); err != nil {
test.t.Fatal(err)
}
}
|
gitrepo
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/gitrepo/gitrepo.go
|
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Package gitrepo provides operations on git repos.
package gitrepo
import (
"context"
"fmt"
"io"
"strings"
"time"
"github.com/go-git/go-billy/v5/memfs"
"github.com/go-git/go-git/v5"
"github.com/go-git/go-git/v5/plumbing"
"github.com/go-git/go-git/v5/plumbing/object"
"github.com/go-git/go-git/v5/storage/memory"
"golang.org/x/tools/txtar"
"golang.org/x/vulndb/internal/derrors"
"golang.org/x/vulndb/internal/observe"
"golang.org/x/vulndb/internal/worker/log"
)
// Clone returns a bare repo by cloning the repo at repoURL.
func Clone(ctx context.Context, repoURL string) (repo *git.Repository, err error) {
defer derrors.Wrap(&err, "gitrepo.Clone(%q)", repoURL)
ctx, span := observe.Start(ctx, "gitrepo.Clone")
defer span.End()
return CloneAt(ctx, repoURL, plumbing.HEAD)
}
// Clone returns a bare repo by cloning the repo at repoURL at the given ref.
func CloneAt(ctx context.Context, repoURL string, ref plumbing.ReferenceName) (repo *git.Repository, err error) {
log.Infof(ctx, "Cloning repo %q at %s", repoURL, ref)
return git.Clone(memory.NewStorage(), nil, &git.CloneOptions{
URL: repoURL,
ReferenceName: ref,
SingleBranch: true,
Depth: 1,
Tags: git.NoTags,
})
}
// PlainClone returns a (non-bare) repo with its history by cloning the repo at repoURL.
func PlainClone(ctx context.Context, dir, repoURL string) (repo *git.Repository, err error) {
defer derrors.Wrap(&err, "gitrepo.PlainClone(%q)", repoURL)
ctx, span := observe.Start(ctx, "gitrepo.PlainClone")
defer span.End()
log.Infof(ctx, "Plain cloning repo %q at HEAD", repoURL)
return git.PlainCloneContext(ctx, dir, false, &git.CloneOptions{
URL: repoURL,
ReferenceName: plumbing.HEAD,
SingleBranch: true, // allow branches other than master
Depth: 0, // pull in history
Tags: git.NoTags,
})
}
// PlainCloneWith returns a (non-bare) repo with its history by cloning the repo with the given options opt.
func PlainCloneWith(ctx context.Context, dir string, opts *git.CloneOptions) (repo *git.Repository, err error) {
defer derrors.Wrap(&err, "gitrepo.PlainCloneWith(%q)", opts.URL)
ctx, span := observe.Start(ctx, "gitrepo.PlainCloneWith")
defer span.End()
log.Infof(ctx, "Plain cloning repo %q at HEAD with options", opts.URL)
return git.PlainCloneContext(ctx, dir, false, opts)
}
// Open returns a repo by opening the repo at the local path dirpath.
func Open(ctx context.Context, dirpath string) (repo *git.Repository, err error) {
defer derrors.Wrap(&err, "gitrepo.Open(%q)", dirpath)
ctx, span := observe.Start(ctx, "gitrepo.Open")
defer span.End()
log.Infof(ctx, "Opening repo at %q", dirpath)
repo, err = git.PlainOpen(dirpath)
if err != nil {
return nil, err
}
return repo, nil
}
// CloneOrOpen clones repoPath if it is an HTTP(S) URL, or opens it from the
// local disk otherwise.
func CloneOrOpen(ctx context.Context, repoPath string) (*git.Repository, error) {
if strings.HasPrefix(repoPath, "http://") || strings.HasPrefix(repoPath, "https://") {
return Clone(ctx, repoPath)
}
return Open(ctx, repoPath)
}
// Root returns the root tree of the repo at HEAD.
func Root(repo *git.Repository) (root *object.Tree, err error) {
refName := plumbing.HEAD
ref, err := repo.Reference(refName, true)
if err != nil {
return nil, err
}
commit, err := repo.CommitObject(ref.Hash())
if err != nil {
return nil, err
}
return repo.TreeObject(commit.TreeHash)
}
// TxtarRepoAndHead reads a txtar repo into a single-commit repository,
// and returns the repo and its head commit.
// Intended for testing.
func TxtarRepoAndHead(file string) (*git.Repository, *object.Commit, error) {
repo, err := ReadTxtarRepo(file, time.Now())
if err != nil {
return nil, nil, err
}
commit, err := HeadCommit(repo)
if err != nil {
return nil, nil, err
}
return repo, commit, nil
}
// HeadCommit returns the commit at the repo HEAD.
func HeadCommit(repo *git.Repository) (*object.Commit, error) {
h, err := HeadHash(repo)
if err != nil {
return nil, err
}
commit, err := repo.CommitObject(h)
if err != nil {
return nil, err
}
return commit, nil
}
// ReadTxtarRepo converts a txtar file to a single-commit
// repo. It is intended for testing.
func ReadTxtarRepo(filename string, now time.Time) (_ *git.Repository, err error) {
defer derrors.Wrap(&err, "ReadTxtarRepo(%q)", filename)
ar, err := txtar.ParseFile(filename)
if err != nil {
return nil, err
}
return FromTxtarArchive(ar, now)
}
func FromTxtarArchive(ar *txtar.Archive, now time.Time) (_ *git.Repository, err error) {
mfs := memfs.New()
for _, f := range ar.Files {
file, err := mfs.Create(f.Name)
if err != nil {
return nil, err
}
if _, err := file.Write(f.Data); err != nil {
return nil, err
}
if err := file.Close(); err != nil {
return nil, err
}
}
repo, err := git.Init(memory.NewStorage(), mfs)
if err != nil {
return nil, err
}
wt, err := repo.Worktree()
if err != nil {
return nil, err
}
for _, f := range ar.Files {
if _, err := wt.Add(f.Name); err != nil {
return nil, err
}
}
_, err = wt.Commit("", &git.CommitOptions{All: true, Author: &object.Signature{
Name: "Joe Random",
Email: "joe@example.com",
When: now,
}})
if err != nil {
return nil, err
}
return repo, nil
}
// HeadHash returns the hash of the repo's HEAD.
func HeadHash(repo *git.Repository) (plumbing.Hash, error) {
ref, err := repo.Reference(plumbing.HEAD, true)
if err != nil {
return plumbing.ZeroHash, err
}
return ref.Hash(), nil
}
// ParseGitHubRepo parses a string of the form owner/repo or
// github.com/owner/repo.
func ParseGitHubRepo(s string) (owner, repoName string, err error) {
parts := strings.Split(s, "/")
switch len(parts) {
case 2:
return parts[0], parts[1], nil
case 3:
if parts[0] != "github.com" {
return "", "", fmt.Errorf("%q is not in the form {github.com/}owner/repo", s)
}
return parts[1], parts[2], nil
default:
return "", "", fmt.Errorf("%q is not in the form {github.com/}owner/repo", s)
}
}
// ReferenceName is a git reference.
type ReferenceName struct{ plumbing.ReferenceName }
var (
HeadReference = ReferenceName{plumbing.HEAD} // HEAD
MainReference = ReferenceName{plumbing.NewRemoteReferenceName("origin", "master")} // origin/master
)
// Dates is the oldest and newest commit timestamps for a file.
type Dates struct {
Oldest, Newest time.Time
}
// AllCommitDates returns the oldest and newest commit timestamps for every
// file in the repo at the given reference, where the filename begins with
// prefix. The supplied prefix should include the trailing /.
func AllCommitDates(repo *git.Repository, refName ReferenceName, prefix string) (dates map[string]Dates, err error) {
defer derrors.Wrap(&err, "AllCommitDates(%q)", prefix)
ref, err := repo.Reference(refName.ReferenceName, true)
if err != nil {
return nil, err
}
commit, err := repo.CommitObject(ref.Hash())
if err != nil {
return nil, err
}
dates = make(map[string]Dates)
iter := object.NewCommitPreorderIter(commit, nil, nil)
commit, err = iter.Next()
if err != nil {
return nil, err
}
for commit != nil {
parentCommit, err := iter.Next()
if err != nil {
if err != io.EOF {
return nil, err
}
parentCommit = nil
}
currentTree, err := commit.Tree()
if err != nil {
return nil, err
}
var parentTree *object.Tree
if parentCommit != nil {
parentTree, err = parentCommit.Tree()
if err != nil {
return nil, err
}
}
changes, err := object.DiffTree(currentTree, parentTree)
if err != nil {
return nil, err
}
for _, change := range changes {
name := change.To.Name
if change.From.Name != "" {
name = change.From.Name
}
when := commit.Committer.When.UTC()
if !strings.HasPrefix(name, prefix) {
continue
}
d := dates[name]
if d.Oldest.IsZero() || when.Before(d.Oldest) {
if d.Oldest.After(d.Newest) {
d.Newest = d.Oldest
}
d.Oldest = when
}
if when.After(d.Newest) {
d.Newest = when
}
dates[name] = d
}
commit = parentCommit
}
return dates, nil
}
|
genai
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/genai/suggest.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package genai
import (
"context"
_ "embed"
"encoding/json"
"errors"
"fmt"
)
type Input struct {
// The path of the affected module to include in the summary.
Module string
// The original description (can be copied from a GHSA or CVE)
// of the vulnerability.
Description string
}
type Suggestion struct {
// A short summary of the vulnerability.
Summary string
// A re-written description of the vulnerability.
Description string
}
type Client interface {
GenerateText(context.Context, string) ([]string, error)
}
// Suggest uses generative AI to generate suggestions for vulnerability
// reports based on the input.
func Suggest(ctx context.Context, c Client, in *Input) ([]*Suggestion, error) {
prompt, err := defaultPrompt(in)
if err != nil {
return nil, err
}
candidates, err := c.GenerateText(ctx, prompt)
if err != nil {
return nil, err
}
if len(candidates) == 0 {
return nil, errors.New("GenAI API returned no candidates")
}
var suggestions []*Suggestion
var candidateErr error
for _, c := range candidates {
s, err := parseSuggestion(c)
// Skip invalid candidates, but store the error in case
// we can't find anything valid.
if err != nil {
candidateErr = err
continue
}
suggestions = append(suggestions, s)
}
if len(suggestions) == 0 && candidateErr != nil {
return nil, fmt.Errorf("GenAI API returned no valid candidates: example error: %w", candidateErr)
}
return suggestions, nil
}
func parseSuggestion(str string) (*Suggestion, error) {
var s Suggestion
if err := json.Unmarshal([]byte(str), &s); err != nil {
return nil, fmt.Errorf("invalid candidate %q: unmarshal: %w", str, err)
}
if s.Summary == "" || s.Description == "" {
return nil, fmt.Errorf("invalid candidate %q: empty summary or description", str)
}
return &s, nil
}
|
genai
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/genai/suggest_test.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package genai
import (
"context"
"fmt"
"strings"
"testing"
_ "embed"
"github.com/google/go-cmp/cmp"
)
func TestSuggest(t *testing.T) {
tests := []struct {
name string
response []string
want []*Suggestion
}{
{
name: "basic",
response: []string{
`{"Summary":"summary","Description":"new description"}`,
`{"Summary":"another summary","Description":"another description"}`,
},
want: []*Suggestion{{
Summary: "summary",
Description: "new description",
},
{
Summary: "another summary",
Description: "another description",
},
},
},
{
name: "ignore invalid",
response: []string{`{"Summary":"summary","Description":"new description"}`,
`invalid JSON ignored`,
},
want: []*Suggestion{
{
Summary: "summary",
Description: "new description",
},
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// The input can be the same for each test because
// the response is hard-coded.
input := placeholderInput
// Make sure Suggest calls defaultPrompt (or its equivalent).
// A separate test checks that defaultPrompt is correct.
c := &testCli{
prompt: mustGetDefaultPrompt(input),
response: tt.response,
}
got, err := Suggest(context.Background(), c, input)
if err != nil {
t.Fatalf("Suggest() error = %v", err)
}
if diff := cmp.Diff(tt.want, got); diff != "" {
t.Errorf("Suggest() mismatch (-want +got):\n%s", diff)
}
})
}
}
func TestGenSuggestionsError(t *testing.T) {
tests := []struct {
name string
response []string
wantErr string
}{
{
name: "no response",
response: nil,
wantErr: "no candidates",
},
{
name: "unmarshal error",
response: []string{`Summary:"invalid",`, `more invalid JSON`},
wantErr: `unmarshal`,
},
{
name: "missing data",
response: []string{
// Valid JSON, but description is missing.
`{"Summary":"summary"}`,
},
wantErr: `empty summary or description`,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// The input can be the same for each test because
// the response is hard-coded.
input := placeholderInput
// Make sure Suggest calls defaultPrompt (or its equivalent).
// A separate test checks that defaultPrompt is correct.
c := &testCli{
prompt: mustGetDefaultPrompt(input),
response: tt.response,
}
_, gotErr := Suggest(context.Background(), c, input)
if gotErr == nil || !strings.Contains(gotErr.Error(), tt.wantErr) {
t.Fatalf("Suggest() error = %v, want err containing %s", gotErr, tt.wantErr)
}
})
}
}
func mustGetDefaultPrompt(in *Input) string {
prompt, err := defaultPrompt(in)
if err != nil {
panic(err)
}
return prompt
}
type testCli struct {
prompt string
response []string
}
func (c *testCli) GenerateText(_ context.Context, prompt string) ([]string, error) {
if diff := cmp.Diff(c.prompt, prompt); diff != "" {
return nil, fmt.Errorf("prompt mismatch (-want, +got):\n%s", diff)
}
return c.response, nil
}
|
genai
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/genai/prompt_test.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package genai
import "testing"
func TestNewPrompt(t *testing.T) {
type args struct {
in *Input
promptContext string
examples Examples
maxExamples int
}
tests := []struct {
name string
args args
want string
}{
{
name: "basic",
args: args{
in: &Input{
Module: "input/module",
Description: "original description of input",
},
promptContext: "Context for the prompt.",
examples: Examples{
&Example{
Input: Input{
Module: "example/module",
Description: "original description of example",
},
Suggestion: Suggestion{
Summary: "summary",
Description: "new description",
},
},
},
maxExamples: 2, // no effect since there is only one example
},
want: `Context for the prompt.
input: {"Module":"example/module","Description":"original description of example"}
output: {"Summary":"summary","Description":"new description"}
input: {"Module":"input/module","Description":"original description of input"}
output:`,
},
{
name: "trim examples",
args: args{
in: &Input{
Module: "input/module",
Description: "original description of input",
},
promptContext: "Context",
examples: Examples{
&Example{
Input: Input{
Module: "example/module",
Description: "original description of example",
},
Suggestion: Suggestion{
Summary: "summary",
Description: "new description",
},
},
// This example will be ignored because maxExamples = 1.
&Example{
Input: Input{
Module: "another/example/module",
Description: "original description of example 2",
},
Suggestion: Suggestion{
Summary: "summary 2",
Description: "new description 2",
},
},
},
maxExamples: 1,
},
want: `Context
input: {"Module":"example/module","Description":"original description of example"}
output: {"Summary":"summary","Description":"new description"}
input: {"Module":"input/module","Description":"original description of input"}
output:`,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
got, err := newPrompt(tt.args.in, tt.args.promptContext, tt.args.examples, tt.args.maxExamples)
if err != nil {
t.Fatalf("newPrompt() error = %v", err)
}
if got != tt.want {
t.Errorf("newPrompt() = %v, want %v", got, tt.want)
}
})
}
}
|
genai
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/genai/examples_test.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package genai
import (
"bytes"
"flag"
"path/filepath"
"strings"
"testing"
"github.com/google/go-cmp/cmp"
)
var update = flag.Bool("update", false, "update the data files based on the examples in data/examples.json")
func TestWriteCheckFiles(t *testing.T) {
tmp := t.TempDir()
es := Examples{
{
Input: Input{
Module: "foo",
Description: "a description",
},
Suggestion: Suggestion{
Summary: "an issue with foo",
Description: "a description of the issue with foo",
},
},
{
Input: Input{
Module: "bar",
Description: "something about bar",
},
Suggestion: Suggestion{
Summary: "bad bar",
Description: "something more about bar containing `backticks` and \"quotes\"",
},
},
}
if err := es.WriteFiles(tmp); err != nil {
t.Fatalf("WriteFiles err = %v", err)
}
if err := checkFiles(tmp, 2); err != nil {
t.Fatalf("CheckFiles err = %v", err)
}
wantErr := "fewer than 3 examples"
if err := checkFiles(tmp, 3); err == nil || !strings.Contains(err.Error(), wantErr) {
t.Fatalf("CheckFiles err = %v, want err containing %q", err, wantErr)
}
}
func TestCheckRealFiles(t *testing.T) {
folder := "."
if err := checkFiles(folder, defaultMaxExamples); err != nil {
if *update {
// If the .json file is valid, use it as a source of truth to update
// the other files.
es, err := readFile(filepath.Join(folder, dataFolder, jsonFile))
if err != nil {
t.Fatalf("could not update files: could not read %q: %v", jsonFile, err)
}
if err := es.WriteFiles(folder); err != nil {
t.Fatalf("could not update files: %v", err)
}
if err := checkFiles(folder, defaultMaxExamples); err != nil {
t.Fatalf("files still invalid after update: %v", err)
}
return
}
t.Fatal(err)
}
}
func TestWriteCSV(t *testing.T) {
tests := []struct {
name string
examples Examples
want string
}{
{
name: "empty",
examples: Examples{},
want: "",
},
{
name: "one example",
examples: Examples{
{
Input: Input{
Module: "foo",
Description: "a description",
},
Suggestion: Suggestion{
Summary: "an issue with foo",
Description: "a description of the issue with foo",
},
},
},
want: "\"{\"\"Module\"\":\"\"foo\"\",\"\"Description\"\":\"\"a description\"\"}\",\"{\"\"Summary\"\":\"\"an issue with foo\"\",\"\"Description\"\":\"\"a description of the issue with foo\"\"}\"\n",
},
{
name: "multiple examples",
examples: Examples{
{
Input: Input{
Module: "foo",
Description: "a description",
},
Suggestion: Suggestion{
Summary: "an issue with foo",
Description: "a description of the issue with foo",
},
},
{
Input: Input{
Module: "bar",
Description: "something about bar",
},
Suggestion: Suggestion{
Summary: "bad bar",
Description: "something more about bar containing `backticks` and \"quotes\"",
},
},
},
want: "\"{\"\"Module\"\":\"\"foo\"\",\"\"Description\"\":\"\"a description\"\"}\",\"{\"\"Summary\"\":\"\"an issue with foo\"\",\"\"Description\"\":\"\"a description of the issue with foo\"\"}\"\n\"{\"\"Module\"\":\"\"bar\"\",\"\"Description\"\":\"\"something about bar\"\"}\",\"{\"\"Summary\"\":\"\"bad bar\"\",\"\"Description\"\":\"\"something more about bar containing `backticks` and \\\"\"quotes\\\"\"\"\"}\"\n",
},
}
for _, test := range tests {
t.Run(test.name, func(t *testing.T) {
w := &bytes.Buffer{}
if err := test.examples.writeCSV(w); err != nil {
t.Fatalf("WriteCSV: %v", err)
}
if got := w.String(); got != test.want {
t.Errorf("WriteCSV: got %q, want %q", got, test.want)
}
})
}
}
func TestReadWriteJSON(t *testing.T) {
tests := []struct {
name string
examples Examples
jsonString string
}{
{
name: "empty",
examples: Examples{},
jsonString: "[]\n",
},
{
name: "one example",
examples: Examples{
{
Input: Input{
Module: "foo",
Description: "a description",
},
Suggestion: Suggestion{
Summary: "an issue with foo",
Description: "a description of the issue with foo",
},
},
},
jsonString: "[{\"Input\":{\"Module\":\"foo\",\"Description\":\"a description\"},\"Suggestion\":{\"Summary\":\"an issue with foo\",\"Description\":\"a description of the issue with foo\"}}]\n",
},
{
name: "multiple examples",
examples: Examples{
{
Input: Input{
Module: "foo",
Description: "a description",
},
Suggestion: Suggestion{
Summary: "an issue with foo",
Description: "a description of the issue with foo",
},
},
{
Input: Input{
Module: "bar",
Description: "something about bar",
},
Suggestion: Suggestion{
Summary: "bad bar",
Description: "something more about bar containing `backticks` and \"quotes\"",
},
},
},
jsonString: "[{\"Input\":{\"Module\":\"foo\",\"Description\":\"a description\"},\"Suggestion\":{\"Summary\":\"an issue with foo\",\"Description\":\"a description of the issue with foo\"}},{\"Input\":{\"Module\":\"bar\",\"Description\":\"something about bar\"},\"Suggestion\":{\"Summary\":\"bad bar\",\"Description\":\"something more about bar containing `backticks` and \\\"quotes\\\"\"}}]\n",
},
}
for _, test := range tests {
t.Run(test.name, func(t *testing.T) {
w := &bytes.Buffer{}
if err := test.examples.writeJSON(w); err != nil {
t.Fatalf("WriteJSON: %v", err)
}
if got := w.String(); got != test.jsonString {
t.Errorf("WriteJSON: got %q, want %q", got, test.jsonString)
}
r := strings.NewReader(test.jsonString)
var got Examples
if err := got.ReadJSON(r); err != nil {
t.Fatalf("ReadJSON() %v", err)
}
if diff := cmp.Diff(test.examples, got); diff != "" {
t.Errorf("ReadJSON() unexpected diff (-want,+got):\n%s", diff)
}
})
}
}
|
genai
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/genai/gemini.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package genai
import (
"context"
"fmt"
"os"
gemini "github.com/google/generative-ai-go/genai"
"google.golang.org/api/option"
)
type GeminiClient struct {
model
closer
}
type model interface {
GenerateContent(ctx context.Context, parts ...gemini.Part) (*gemini.GenerateContentResponse, error)
}
type closer interface {
Close() error
}
const (
geminiAPIKeyEnv = "GEMINI_API_KEY"
geminiModel = "gemini-pro"
)
func NewGeminiClient(ctx context.Context) (*GeminiClient, error) {
key := os.Getenv(geminiAPIKeyEnv)
if key == "" {
return nil, fmt.Errorf("Gemini API key (env var %s) not set. If you already have a key for the legacy PaLM API, you can use the same key for Gemini. Otherwise, you can get an API key at https://makersuite.google.com/app/apikey", geminiAPIKeyEnv)
}
client, err := gemini.NewClient(ctx, option.WithAPIKey(key))
if err != nil {
return nil, err
}
return &GeminiClient{
model: client.GenerativeModel(geminiModel),
closer: client,
}, nil
}
func (c *GeminiClient) GenerateText(ctx context.Context, prompt string) ([]string, error) {
response, err := c.model.GenerateContent(ctx, gemini.Text(prompt))
if err != nil {
return nil, err
}
var candidates []string
for _, c := range response.Candidates {
if c.Content != nil {
for _, p := range c.Content.Parts {
candidates = append(candidates, fmt.Sprintf("%s", p))
}
}
}
return candidates, nil
}
|
genai
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/genai/examples.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package genai
import (
"encoding/csv"
"encoding/json"
"fmt"
"io"
"os"
"path/filepath"
"strings"
"github.com/google/go-cmp/cmp"
)
// Examples represents a list of input/output pairs to be used
// as examples to follow by the Suggest function.
// Can be used to create few-shot prompts or fine-tune a model.
type Examples []*Example
type Example struct {
Input `json:"Input"`
Suggestion `json:"Suggestion"`
}
const (
dataFolder = "data"
promptFile = "example_prompt.txt"
csvFile = "examples.csv"
jsonFile = "examples.json"
)
// WriteFiles writes the examples to the given folder in the following formats:
// - <folder>/data/examples.json: a JSON array of the examples
// (used directly by the Suggest function)
// - <folder>/data/examples.csv: a CSV-formatted list of each example,
// where the input and output are comma-separated JSON objects.
// Can be used as an input to a Makersuite data prompt.
// - <folder>/data/prompt.txt: the prompt that will be used by Suggest
// (with placeholder data for the final input)
func (es Examples) WriteFiles(folder string) error {
dir := filepath.Join(folder, dataFolder)
if err := os.MkdirAll(dir, 0755); err != nil {
return fmt.Errorf("failed to create directory %q: %s", dir, err)
}
for filename, write := range map[string]func(w io.Writer) error{
promptFile: es.writePrompt,
csvFile: es.writeCSV,
jsonFile: es.writeJSON,
} {
f, err := os.Create(filepath.Join(folder, dataFolder, filename))
if err != nil {
return err
}
defer f.Close()
if err := write(f); err != nil {
return err
}
}
return nil
}
func checkFiles(folder string, minExamples int) error {
fpath := func(fname string) string {
return filepath.Join(folder, dataFolder, fname)
}
// Check the JSON file.
jsonExamples, err := readFile(fpath(jsonFile))
if err != nil {
return err
}
if len(jsonExamples) < minExamples {
return fmt.Errorf("%s has fewer than %d examples", jsonFile, minExamples)
}
// Check the CSV file.
csvExamples, err := readFile(fpath(csvFile))
if err != nil {
return err
}
if diff := cmp.Diff(csvExamples, jsonExamples); diff != "" {
return fmt.Errorf("CSV and JSON examples don't match (-csv +json):\n%s", diff)
}
// Check the example prompt.
b, err := os.ReadFile(fpath(promptFile))
if err != nil {
return fmt.Errorf("could not read %s: %v", promptFile, err)
}
gotPrompt := string(b)
if !strings.HasPrefix(gotPrompt, defaultPreamble) {
return fmt.Errorf("prompt in %s does not start with default preamble", promptFile)
}
wantPrompt, err := jsonExamples.placeholderPrompt()
if err != nil {
return err
}
if diff := cmp.Diff(wantPrompt, gotPrompt); diff != "" {
return fmt.Errorf("prompt mismatch (-want +got):\n%s", diff)
}
return nil
}
func (es *Examples) ReadJSON(r io.Reader) error {
d := json.NewDecoder(r)
return d.Decode(es)
}
func readFile(filename string) (Examples, error) {
file, err := os.Open(filename)
if err != nil {
return nil, err
}
defer file.Close()
var examples Examples
switch filepath.Ext(filename) {
case ".csv":
if err := examples.readCSV(file); err != nil {
return nil, err
}
case ".json":
if err := examples.ReadJSON(file); err != nil {
return nil, err
}
default:
return nil, fmt.Errorf("unsupported file type: %s", filename)
}
return examples, nil
}
var placeholderInput = &Input{
Module: "INPUT MODULE",
Description: "INPUT DESCRIPTION",
}
func (es Examples) placeholderPrompt() (string, error) {
return newPrompt(placeholderInput, defaultPreamble, es, defaultMaxExamples)
}
func (es Examples) writePrompt(w io.Writer) error {
prompt, err := es.placeholderPrompt()
if err != nil {
return err
}
_, err = w.Write([]byte(prompt))
return err
}
func (es Examples) writeCSV(w io.Writer) error {
cw := csv.NewWriter(w)
for _, e := range es {
in, out, err := e.marshal()
if err != nil {
return err
}
if err := cw.Write([]string{in, out}); err != nil {
return err
}
}
cw.Flush()
return cw.Error()
}
func (es *Examples) readCSV(r io.Reader) error {
cr := csv.NewReader(r)
records, err := cr.ReadAll()
if err != nil {
return err
}
for _, record := range records {
if len(record) != 2 {
return fmt.Errorf("unexpected CSV record: %v", record)
}
e, err := unmarshal(record[0], record[1])
if err != nil {
return err
}
*es = append(*es, e)
}
return nil
}
func (es Examples) writeJSON(w io.Writer) error {
e := json.NewEncoder(w)
return e.Encode(es)
}
func unmarshal(input string, output string) (*Example, error) {
var e Example
if err := json.Unmarshal([]byte(input), &e.Input); err != nil {
return nil, err
}
if err := json.Unmarshal([]byte(output), &e.Suggestion); err != nil {
return nil, err
}
return &e, nil
}
func (e *Example) marshal() (input string, output string, err error) {
ib, err := json.Marshal(e.Input)
if err != nil {
return "", "", err
}
ob, err := json.Marshal(e.Suggestion)
if err != nil {
return "", "", err
}
return string(ib), string(ob), nil
}
|
genai
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/genai/gemini_test.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package genai
import (
"context"
"testing"
gemini "github.com/google/generative-ai-go/genai"
"github.com/google/go-cmp/cmp"
)
func TestGemini(t *testing.T) {
c := testGeminiClient()
got, err := c.GenerateText(context.Background(), "say hello")
if err != nil {
t.Fatal(err)
}
want := []string{"Hello there! How can I assist you today?"}
if diff := cmp.Diff(want, got); diff != "" {
t.Errorf("GenerateText mismatch (-want, +got):\n%s", diff)
}
}
func testGeminiClient() *GeminiClient {
return &GeminiClient{
model: testModel{},
closer: testCloser{},
}
}
type testModel struct{}
func (_ testModel) GenerateContent(ctx context.Context, parts ...gemini.Part) (*gemini.GenerateContentResponse, error) {
// TODO(tatianabradley): Improve testing by replaying a real API response.
return &gemini.GenerateContentResponse{
Candidates: []*gemini.Candidate{{
Content: &gemini.Content{
Parts: []gemini.Part{
gemini.Text("Hello there! How can I assist you today?"),
},
},
}},
}, nil
}
type testCloser struct{}
func (_ testCloser) Close() error { return nil }
|
genai
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/genai/prompt.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package genai
import (
"bytes"
_ "embed"
"encoding/json"
"strings"
"text/template"
)
var (
//go:embed templates/preamble.txt
defaultPreamble string
//go:embed templates/prompt.tmpl
promptTmpl string
prompt = template.Must(template.New("prompt").Funcs(template.FuncMap{"toJSON": toJSON}).Parse(promptTmpl))
//go:embed data/examples.json
defaultExamples []byte
)
const defaultMaxExamples = 15
func defaultPrompt(in *Input) (string, error) {
var es Examples
if err := es.ReadJSON(bytes.NewReader(defaultExamples)); err != nil {
return "", err
}
return newPrompt(in, defaultPreamble, es, defaultMaxExamples)
}
func toJSON(v any) string {
b, err := json.Marshal(v)
if err != nil {
panic(err)
}
return string(b)
}
func newPrompt(in *Input, preamble string, examples Examples, maxExamples int) (string, error) {
if len(examples) > maxExamples {
examples = examples[:maxExamples]
}
var b strings.Builder
if err := prompt.Execute(&b, struct {
Preamble string
Examples Examples
Input *Input
}{
Preamble: preamble,
Examples: examples,
Input: in,
}); err != nil {
return "", err
}
return b.String(), nil
}
|
data
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/genai/data/examples.json
|
[{"Input":{"Module":"github.com/docker/distribution","Description":"### Impact\n\nSystems that rely on digest equivalence for image attestations may be vulnerable to type confusion.\n\n### Patches\n\nUpgrade to at least `v2.8.0-beta.1` if you are running `v2.x` release. If you use the code from the `main` branch, update at least to the commit after [b59a6f827947f9e0e67df0cfb571046de4733586](https://github.com/distribution/distribution/commit/b59a6f827947f9e0e67df0cfb571046de4733586).\n\n### Workarounds\n\nThere is no way to work around this issue without patching.\n\n### References\n\nDue to [an oversight in the OCI Image Specification](https://github.com/opencontainers/image-spec/pull/411) that removed the embedded `mediaType` field from manifests, a maliciously crafted OCI Container Image can cause registry clients to parse the same image in two different ways without modifying the image’s digest by modifying the `Content-Type` header returned by a registry. This can invalidate a common pattern of relying on container image digests for equivalence.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n* Open an issue in [distribution](https://github.com/distribution/distribution) \n* Open an issue in [distribution-spec](https://github.com/opencontainers/distribution-spec) \n* Email us at [cncf-distribution-security@lists.cncf.io](mailto:cncf-distribution-security@lists.cncf.io)\n"},"Suggestion":{"Summary":"Type confusion in github.com/docker/distribution","Description":"Systems that rely on digest equivalence for image attestations may be vulnerable to type confusion. A maliciously crafted OCI Container Image can cause registry clients to parse the same image in two different ways without modifying the image's digest, invalidating the common pattern of relying on container image digests for equivalence. This problem has been addressed in newer versions by improving validation in manifest unmarshalling."}},{"Input":{"Module":"github.com/pomerium/pomerium","Description":"### Impact\nChanges to the OIDC claims of a user after initial login are not reflected in policy evaluation when using [`allowed_idp_claims`](https://www.pomerium.com/reference/#allowed-idp-claims) as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions.\n\n### Patches\nv0.15.6\n\n### Workarounds\n- Clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated\n\n### References\nhttps://github.com/pomerium/pomerium/pull/2724\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [Pomerium](https://github.com/pomerium/pomerium)\n* Email us at [security@pomerium.com](mailto:security@pomerium.com)\n"},"Suggestion":{"Summary":"Incorrect authorization in github.com/pomerium/pomerium","Description":"Pomerium is an open source identity-aware access proxy. Changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using allowed_idp_claims as part of policy. If using allowed_idp_claims and a user's claims are changed, Pomerium can make incorrect authorization decisions. For users unable to upgrade clear data on databroker service by clearing redis or restarting the in-memory databroker to force claims to be updated."}},{"Input":{"Module":"github.com/blevesearch/bleve","Description":"### Impact\n_What kind of vulnerability is it? Who is impacted?_\n\nBleve includes HTTP utilities under bleve/http package, that are used by its sample application. \n(https://github.com/blevesearch/bleve-explorer)\nThese HTTP methods paves way for exploitation of a node’s filesystem where the bleve index resides, \nif the user has used bleve’s own HTTP (bleve/http) handlers for exposing the access to the indexes. \nFor instance, the CreateIndexHandler (http/index_create.go) and DeleteIndexHandler (http/index_delete.go) \nenable an attacker to create a bleve index (directory structure) anywhere where the user running the server \nhas the write permissions and to delete recursively any directory owned by the same user account.\n \nUsers who have used the bleve/http package for exposing access to bleve index without the explicit \nhandling for the Role Based Access Controls(RBAC) of the index assets would be impacted.\n\n\n### Patches\n_Has the problem been patched? What versions should users upgrade to?_\n\n**No**. The http package is purely intended to be used for demonstration purposes. \nAnd bleve is never designed to be handling the RBACs or it was ever advertised to be used in that way. \nHence the collaborators of this project have decided to stay away from adding any authentication or \nauthorization to bleve project at the moment.\n\n### Workarounds\n_Is there a way for users to fix or remediate the vulnerability without upgrading?_\n\nThe bleve/http package is mainly for demonstration purposes and it lacks exhaustive validation of the user \ninputs as well as any authentication and authorization measures. \nSo it is recommended to not use that in production use cases.\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue [here](https://github.com/blevesearch/bleve/issues).\n* Email us at [mailto:security@couchbase.com, fts-team@couchbase.com].\n"},"Suggestion":{"Summary":"No access control in github.com/blevesearch/bleve and bleve/v2","Description":"HTTP handlers provide unauthenticated access to the local filesystem. The Bleve http package is intended for demonstration purposes and contains no authentication, authorization, or validation of user inputs. Exposing handlers from this package can permit attackers to create files and delete directories."}},{"Input":{"Module":"github.com/cloudflare/circl","Description":"### Impact\nWhen sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether `crypto/rand.Read()` returns an error. In rare deployment cases (error thrown by the `Read()` function), this could lead to a predictable shared secret.\n\nThe tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides `crypto/rand.Reader`, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.\n\n\n### Patches\nThe fix was introduced in CIRCL v. 1.3.3\n"},"Suggestion":{"Summary":"Leaked shared secret and weak blinding in github.com/cloudflare/circl","Description":"When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret. The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20."}},{"Input":{"Module":"github.com/libp2p/go-libp2p","Description":"### Impact\nVersions older than `v0.18.0` of go-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of go-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack.\n\nIn the original version of the attack, the malicious node would continue opening new streams on a stream multiplexer that doesn’t provide sufficient back pressure (yamux or mplex). It is easy to defend against this one attack, but there are countless variations of this attack:\n* Opening streams and causing a non-trivial memory allocation (e.g., for multistream or protobuf parsing)\n* Creating a lot of sybil nodes and opening new connections across nodes\n\n### Patches (What to do as a go-libp2p consumer:)\n1. Update your go-libp2p dependency to go-libp2p v0.18.0 or greater (current version as of publish date is [v0.24.0](https://github.com/libp2p/go-libp2p/releases/tag/v0.24.0).)\n - Note: **It's recommend that you update to `v0.21.0` onwards** as you’ll get some useful functionality that will help in production environments like better metrics around resource usage, Grafana dashboards around resource usage, allow list support, and default autoscaling limits. [Please see the v0.21.0 release notes for more info.](https://github.com/libp2p/go-libp2p/releases/tag/v0.21.0))\n\n2. Determine appropriate limits for your application - go-libp2p sets up a resource manager with the default limits if none are provided. For default definitions please see [limits_defaults.go](https://github.com/libp2p/go-libp2p/blob/master/p2p/host/resource-manager/limit_defaults.go). These limits are also set to automatically scale, this is done using the [AutoScale method of the ScalingLimitConfig](https://github.com/libp2p/go-libp2p/blob/master/p2p/host/resource-manager/README.md#scaling-limits). We recommend you [tune your limits as described here](https://github.com/libp2p/go-libp2p/blob/master/p2p/host/resource-manager/README.md#how-to-tune-your-limits).\n\n3. Configure your node to be attack resilient. See [how to respond to an attack and identify misbehaving peers here](https://docs.libp2p.io/concepts/security/dos-mitigation/#responding-to-an-attack). Then setup automatic blocking with fail2ban using canonical libp2p log lines: [guide on how to do so here](https://docs.libp2p.io/concepts/security/dos-mitigation/#how-to-automate-blocking-with-fail2ban).\n\n#### Examples\n* Lotus’ integration can be found in https://github.com/filecoin-project/lotus/blob/master/node/modules/lp2p/rcmgr.go. Lotus reads user-configured resource limits from a limits.json file into the root directory. This allows users to share their resource manager configuration independent of any other configurations.\n* Kubo’s (formerly go-ipfs) integration can be found in https://github.com/ipfs/go-ipfs/blob/master/core/node/libp2p/rcmgr.go. Kubo reads the limits from the IPFS config file.\n\n**Note:** go-libp2p still implements the [connection manager](https://github.com/libp2p/go-libp2p/tree/master/p2p/net/connmgr) mentioned above. The connection manager is a component independent of the resource manager, which aims to keep the number of libp2p connections between a low and a high watermark. When modifying connection limits, it’s advantageous to keep the configuration of these components consistent, i.e., when setting a limit of N concurrent connections in the resource manager, the high watermark should be at most (and ideally slightly less) than N.\n\n### Workarounds\nAlthough there are no workarounds within go-libp2p, some range of attacks can be mitigated using OS tools (like manually blocking malicious peers using `iptables` or `ufw` ) or making use of a load balancer in front of libp2p nodes.\n\nHowever these require direct action \u0026 responsibility on your part and are no substitutes for upgrading go-libp2p. Therefore, we highly recommend upgrading your go-libp2p version for the way it enables tighter scoped limits and provides visibility into and easier reasoning about go-libp2p resource utilization.\n\n### References\nPlease see our DoS Mitigation page for more information on how to incorporate mitigation strategies, monitor your application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/. \n\nPlease see the related disclosure for rust-libp2p: https://github.com/libp2p/rust-libp2p/security/advisories/GHSA-jvgw-gccv-q5p8 and js-libp2p: https://github.com/libp2p/js-libp2p/security/advisories/GHSA-f44q-634c-jvwv\n\n#### For more information\n\nIf you have any questions or comments about this advisory email us at [security@libp2p.io](mailto:security@libp2p.io)"},"Suggestion":{"Summary":"Resource exhaustion in github.com/libp2p/go-libp2p","Description":"go-libp2p is vulnerable to targeted resource exhaustion attacks. These attacks target libp2p's connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory ultimately leading to the process getting killed by the host's operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of go-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack. It's recommend to update to v0.21.0 onwards to get some useful functionality that will help in production environments like better metrics around resource usage, Grafana dashboards around resource usage, allow list support, and default autoscaling limits."}},{"Input":{"Module":"github.com/supranational/blst","Description":"### Impact\n\nBlst versions v0.3.0 through 0.3.10 failed to perform a signature group-check if the call to `SigValidate` in the Go bindings was complemented with a check for infinity. Formally speaking, infinity, or the identity element of the elliptic curve group, is a member of the group, and the group-check should allow it. An initial review of blst users on GitHub did not uncover any use of this function with the complementary infinity check. This optional check was added as a convenience feature because despite infinity being a legitimate member of the group, individual signatures should never be infinite (as it is equivalent to having zero for the secret key), and observing one should raise a flag.\n\n### Description\n\nThe vulnerable function is declared as `SigValidate(sigInfcheck bool) bool` and if called with `sigInfcheck` argument set to `true`, the group-check was omitted. The group-check is required to be performed on untrusted input, because the pairing, the corner-stone operation of the signature scheme, is defined only on points that are members of a specific cyclic group, which is a subset of all the possible points on elliptic curves in question. Submitting an untrusted point outside the group opens up the possibility of accepting an alternative signature for a chosen message.\n\nIt should be noted that the SigValidate call is not the only way to perform the group-checks. There are optional checks integrated into various other verification methods, such as `Verify`, `AggregateVerify`, etc., as well as signature aggregation methods, such as `PairingAggregate*`. The reason why there are multiple options is that the group-check is a relatively expensive operation, and application developers are arguably entitled the freedom to choose when it's performed.\n\n### Patches\n\nThis issue has been resolved in the v0.3.11 release and users are advised to update if their application is affected or alternatively omit the complementary infinity check.\n\n### Credits\n\nA special thanks to Yunjong Jeong (@blukat29) for the discovery and disclosure of this vulnerability.\n"},"Suggestion":{"Summary":"Blst fails to perform group signature validation","Description":"When complemented with a check for infinity, blst skips performing a signature group-check. Formally speaking, infinity is the identity element of the elliptic curve group and as such it is a member of the group, so the group-check should be performed. The fix performs the check even in the presence of infinity."}},{"Input":{"Module":"github.com/argoproj/argo-cd/v2","Description":"### Impact\nAll versions of Argo CD starting with v2.6.0-rc1 have an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI). The user must have `applications, create` or `applications, update` RBAC access to reach the code which may produce the error.\n\nThe user is not guaranteed to be able to trigger the error message. They may attempt to spam the API with requests to trigger a rate limit error from the upstream repository. \n\nIf the user has `repositories, update` access, they may edit an existing repository to introduce a URL typo or otherwise force an error message. But if they have that level of access, they are probably intended to have access to the credentials anyway.\n\n### Patches\n\nA patch for this vulnerability has been released in the following Argo CD version:\n\n* v2.6.1\n\n### Workarounds\n\nThe only way to completely resolve the issue is to upgrade.\n\n#### Mitigations\n\nTo mitigate the issue, make sure that your repo credentials have only least necessary privileges. For example, the credentials should not have push access, and they should not have access to more resources than what Argo CD actually needs (for example, a whole GitHub org when only one repo is needed).\n\nTo further mitigate the impact of a leaked write-capable repo credential, you could [enable commit signature verification](https://argo-cd.readthedocs.io/en/stable/user-guide/gpg-verification/#enforcing-signature-verification). Even if someone could push a malicious commit, the commit would not by synced.\n\nYou should also enforce least privileges in Argo CD RBAC. Make sure users only have `repositories, update`, `applications, update`, or `applications, create` access if they absolutely need it.\n\n### References\n\n* The problem was initially reported in a [GitHub issue](https://github.com/argoproj/argo-cd/issues/12309)\n* [Argo CD RBAC configuration documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/)\n\n### For more information\n\n* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)\n* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd\n"},"Suggestion":{"Summary":"Repository access credential leak in github.com/argoproj/argo-cd/v2","Description":"Argo CD has an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI). The user must have `applications, create` or `applications, update` RBAC access to reach the code which may produce the error. The user is not guaranteed to be able to trigger the error message. They may attempt to spam the API with requests to trigger a rate limit error from the upstream repository. If the user has `repositories, update` access, they may edit an existing repository to introduce a URL typo or otherwise force an error message."}},{"Input":{"Module":"github.com/ethereum/go-ethereum","Description":"### Impact\n\nA vulnerability in the Geth EVM could cause a node to reject the canonical chain. \n\n### Description \n\nA memory-corruption bug within the EVM can cause a consensus error, where vulnerable nodes obtain a different `stateRoot` when processing a maliciously crafted transaction. This, in turn, would lead to the chain being split in two forks.\n\nAll Geth versions supporting the London hard fork are vulnerable (which predates London), so all users should update.\n\nThis bug was exploited on Mainnet at block 13107518, leading to a minority chain split. \n\n### Patches\n\nA patch is included in the `v1.10.8` release.\nThe exact patch to fix the issue is contained within this [commit](https://github.com/ethereum/go-ethereum/pull/23381/commits/4d4879cafd1b3c906fc184a8c4a357137465128f)\n\n### Workarounds\n\nNo workarounds exist, save to update and/or apply the patch commit. \n\n### References. \n\nPost-mortem [write-up](https://github.com/ethereum/go-ethereum/blob/master/docs/postmortems/2021-08-22-split-postmortem.md).\n\n### Credits\n\nThe bug was found by @guidovranken (working for [Sentnl](https://sentnl.io/) during an audit of the [Telos EVM](https://www.telos.net/evm)) and reported via bounty@ethereum.org.\n\n### For more information\nIf you have any questions or comments about this advisory:\n\n* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum/)\n* Email us at [security@ethereum.org](mailto:security@ethereum.org)\n"},"Suggestion":{"Summary":"Consensus flaw during block processing in github.com/ethereum/go-ethereum","Description":"A vulnerability in the Geth EVM can cause a node to reject the canonical chain. A memory-corruption bug within the EVM can cause a consensus error, where vulnerable nodes obtain a different stateRoot when processing a maliciously crafted transaction. This, in turn, would lead to the chain being split in two forks."}},{"Input":{"Module":"github.com/cometbft/cometbft","Description":"### Impact\n\nThe mempool maintains two data structures to keep track of outstanding transactions: a list and a map.\nThese two data structures are supposed to be in sync all the time in the sense that the map tracks the index (if any) of the transaction in the list. \n\nUnfortunately, it is possible to have them out of sync. When this happens, the list may contain several copies of the same transaction.\nBecause the map tracks a single index, it is then no longer possible to remove all the copies of the transaction from the list.\nThis happens even if the duplicated transaction is later committed in a block.\nThe only way to remove the transaction is by restarting the node.\n\nThese are the steps to cause the above duplication problem. Everything should happen within one height, that is no `FinalizeBlock` or `BeginBlock` ABCI calls should happen while these steps are reproduced:\n\n1. send transaction tx1 to the target full node via RPC\n2. send N more different transactions to the target full node, where N should be higher than the node's configured value for `cache_size` in `config.toml`\n3. send transaction tx1 again to the target full node\n\nOne of the copies of tx1 is now _stuck_ in the mempool's data structures. Effectively causing a memory leak, and having that node gossiping that transaction to its peers forever.\n\nThe above problem can be repeated on and on until a sizable number of transactions are stuck in the mempool, in order to try to bring down the target node.\n\nThis problem is present in releases: `v0.37.0`, and `v0.37.1`, as well as in `v0.34.28`, and all previous releases of the CometBFT repo. It will be fixed in releases `v0.34.29` and `v0.37.2`.\n\n### Patches\n\nThe PR containing the fix is [here](https://github.com/cometbft/cometbft/pull/890).\n\n\n### Workarounds\n\n* Increasing the value of `cache_size` in `config.toml` makes it very difficult to effectively attack a full node.\n* Not exposing the transaction submission RPC's would mitigate the probability of a successful attack, as the attacker would then have to create a modified (byzantine) full node to be able to perform the attack via p2p.\n\n### References\n\n* [PR](https://github.com/tendermint/tendermint/pull/2778) that introduced the map to track transactions in the mempool.\n* [PR](https://github.com/cometbft/cometbft/pull/890) containing the fix.\n"},"Suggestion":{"Summary":"Denial of service via OOM in github.com/cometbft/cometbft","Description":"A bug in the CometBFT middleware causes the mempool's two data structures to fall out of sync. This can lead to duplicate transactions that cannot be removed, even after they are committed in a block. The only way to remove the transaction is to restart the node. This can be exploited by an attacker to bring down a node by repeatedly submitting duplicate transactions."}},{"Input":{"Module":"github.com/containers/buildah","Description":"A bug was found in Buildah where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2).\n\nThis bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set.\n"},"Suggestion":{"Summary":"Incorrect default permissions in github.com/containers/buildah","Description":"Containers are created with non-empty inheritable Linux process capabilities, permitting programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug does not affect the container security sandbox, as the inheritable set never contains more capabilities than are included in the container's bounding set."}},{"Input":{"Module":"github.com/fluxcd/helm-controller/api","Description":"Flux controllers within the affected versions range are vulnerable to a denial of service attack. Users that have permissions to change Flux’s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout` (and structured variations of these fields), causing the entire object type to stop being processed.\n\nThe issue has two root causes: a) the Kubernetes type `metav1.Duration` not being fully compatible with the Go type `time.Duration` as explained on [upstream report](https://github.com/kubernetes/apimachinery/issues/131); b) lack of validation within Flux to restrict allowed values.\n\n### Workarounds\n\nAdmission controllers can be employed to restrict the values that can be used for fields `.spec.interval` and `.spec.timeout`, however upgrading to the latest versions is still the recommended mitigation.\n\n### Credits\n\nThis issue was reported by Alexander Block (@codablock) through the Flux security mailing list (as [recommended](https://fluxcd.io/security/#report-a-vulnerability)).\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n- Open an issue in any of the affected repositories.\n- Contact us at the CNCF Flux channel.\n\n### References\n\n- https://github.com/kubernetes/apimachinery/issues/131\n\n"},"Suggestion":{"Summary":"Denial of service in flux controllers in github.com/fluxcd modules","Description":"Flux controllers are vulnerable to a denial of service attack. Users that have permissions to change Flux's objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout` (and structured variations of these fields), causing the entire object type to stop being processed. The issue has two root causes: a) the Kubernetes type `metav1.Duration` is not fully compatible with the Go type `time.Duration` as explained in https://github.com/kubernetes/apimachinery/issues/131, and b) a lack of validation within Flux to restrict allowed values."}},{"Input":{"Module":"helm.sh/helm/v3","Description":"Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the _strvals_ package that can cause a stack overflow. In Go, a stack overflow cannot be recovered from. Applications that use functions from the _strvals_ package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.\n\n### Impact\n\nThe _strvals_ package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like `--set`, `--set-string`, and others that enable the user to pass in strings that are merged into the values. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing a stack overflow.\n\nApplications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from.\n\nThe Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes a stack overflow. Helm is not a long running service so the panic will not affect future uses of the Helm client.\n\n### Patches\n\nThis issue has been resolved in 3.10.3. \n\n### Workarounds\n\nSDK users can validate strings supplied by users won't create large arrays causing significant memory usage before passing them to the _strvals_ functions.\n\n### For more information\n\nHelm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored by CNCF."},"Suggestion":{"Summary":"Denial of service in string value parsing in helm.sh/helm/v3","Description":"Applications that use the strvals package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes an error that cannot be recovered from. The strvals package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like --set, --set-string, and others that enable the user to pass in strings that are merged into the values. The strvals package converts these strings into structures Go can work with. Some string inputs can cause can cause a stack overflow to be created causing a stack overflow error. Stack overflow errors cannot be recovered from. The Helm Client will panic with input to --set, --set-string, and other value setting flags that causes a stack overflow. Helm is not a long running service so the error will not affect future uses of the Helm client."}},{"Input":{"Module":"github.com/runatlantis/atlantis","Description":"The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 is vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge webhook events."},"Suggestion":{"Summary":"Timing attack in github.com/runatlantis/atlantis","Description":"Validation of Gitlab requests can leak secrets. The package github.com/runatlantis/atlantis/server/controllers/events uses a non-constant time comparison for secrets while validating a Gitlab request. This allows for a timing attack where an attacker can recover a secret and then forge the request."}},{"Input":{"Module":"github.com/rancher/wrangler","Description":"### Impact\n\nA denial of services (DoS) vulnerability was discovered in Wrangler Git package affecting versions up to and including `v1.0.0`.\n\nSpecially crafted Git credentials can result in a denial of service (DoS) attack on an application that uses Wrangler due to the exhaustion of the available memory and CPU resources. This is caused by a lack of input validation of Git credentials before they are used, which may lead to a denial of service in some cases. This issue can be triggered when accessing both private and public Git repositories. \n\n### Workarounds\n\nA workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.\n\n### Patches\n\nPatched versions include `v1.0.1` and later and the backported tags - `v0.7.4-security1`, `v0.8.5-security1` and `v0.8.11`.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.\n* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) or [Wrangler](https://github.com/rancher/wrangler/issues/new) repository.\n* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/)."},"Suggestion":{"Summary":"Denial of service when processing Git credentials in github.com/rancher/wrangler","Description":"A denial of service (DoS) vulnerability exists in the Wrangler Git package. Specially crafted Git credentials can result in a denial of service (DoS) attack on an application that uses Wrangler due to the exhaustion of the available memory and CPU resources. This is caused by a lack of input validation of Git credentials before they are used, which may lead to a denial of service in some cases. This issue can be triggered when accessing both private and public Git repositories. A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version."}},{"Input":{"Module":"github.com/containerd/imgcrypt","Description":"Imgcrypt implements a function `CheckAuthorization()` that is supposed to check whether a user is authorized to access an encrypted image given the keys that the user has provided on the command line that would enable decryption of the image. The check is to prevent that a user can start a container from an image that has previously been decrypted by another user on the same system and therefore a decrypted version of the image layers may be already available in the cache locally.\n\nThe failure occurs when an image with a ManifestList is used and the architecture of the local host is not the first one in the ManifestList. In the version prior to the fix, only the first architecture in the list was tested, which may not have its layers available locally (were not pulled) since it cannot be run on the host architecture. Therefore, the verdict on unavailable layers was that the image could be run anticipating that image run failure would occur later due to the layers not being available. However, this verdict to allow the image to run lead to other architectures in the ManifestList be able to run an image without providing keys if that image had previously been decrypted. The fixed version now skips over irrelevant architectures and tests the Manifest of the local architecture, if available.\n\nKnown projects that use the `CheckAuthorization()` of imgcrypt is for example the ctr-enc client tool provided by imgcrypt. In this implementation, the call to `CheckAuthorization()` is used on the client side and could therefore also be easily circumvented by a modified client tool not calling this function.\n\nIn relation to the vulnerability in ctr-enc, affected environments would have to allow different users to invoke ctr-enc indirectly using some sort of management stack that gives user indirect access to ctr-enc.\n\nThe patch has been applied to imgcrypt v1.1.4. Workarounds may include usage of different namespaces for each remote user."},"Suggestion":{"Summary":"Incorrect authorization in github.com/containerd/imgcrypt","Description":"The imgcrypt library provides API extensions for containerd to support encrypted container images and implements the ctd-decoder command line tool for use by containerd to decrypt encrypted container images. The imgcrypt function `CheckAuthorization` is supposed to check whether the current used is authorized to access an encrypted image and prevent the user from running an image that another user previously decrypted on the same system. In versions prior to 1.1.4, a failure occurs when an image with a ManifestList is used and the architecture of the local host is not the first one in the ManifestList. Only the first architecture in the list was tested, which may not have its layers available locally since it could not be run on the host architecture. Therefore, the verdict on unavailable layers was that the image could be run anticipating that image run failure would occur later due to the layers not being available. However, this verdict to allow the image to run enabled other architectures in the ManifestList to run an image without providing keys if that image had previously been decrypted. A patch has been applied to imgcrypt 1.1.4. Workarounds may include usage of different namespaces for each remote user."}},{"Input":{"Module":"github.com/gagliardetto/binary","Description":"### Impact\n\u003e _What kind of vulnerability is it? Who is impacted?_\n\nThe vulnerability is a memory allocation vulnerability that can be exploited to allocate slices in memory with (arbitrary) excessive size value, which can either exhaust available memory or crash the whole program.\n\nWhen using `github.com/gagliardetto/binary` to parse unchecked (or wrong type of) data from untrusted sources of input (e.g. the blockchain) into slices, it's possible to allocate memory with excessive size.\n\nWhen `dec.Decode(\u0026val)` method is used to parse data into a structure that is or contains slices of values, the length of the slice was previously read directly from the data itself without any checks on the size of it, and then a slice was allocated. This could lead to an overflow and an allocation of memory with excessive size value.\n\nExample:\n\n```go\npackage main\n\nimport (\n\t\"github.com/gagliardetto/binary\" // any version before v0.7.1 is vulnerable\n\t\"log\"\n)\n\ntype MyStruct struct {\n\tField1 []byte // field is a slice (could be a slice of any type)\n}\n\nfunc main() {\n\t// Let's assume that the data is coming from the blockchain:\n\tdata := []byte{0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10}\n\t\n\tvar val MyStruct\n\t// - To determine the size of the val.Field1 slice, the decoder will read the length\n\t// of the slice from the data itself without any checks on the size of it.\n\t//\n\t// - This could lead to an allocation of memory with excessive size value.\n\t// Which means: []byte{0x01, 0x02, 0x03, 0x04} will be read as the length\n\t// of the slice (= 67305985) and then an allocation of memory with 67305985 bytes will be made.\n\t//\n\tdec := binary.NewBorshDecoder(data)\n\terr := dec.Decode(\u0026val) // or binary.UnmarshalBorsh(\u0026val, data) or binary.UnmarshalBin(\u0026val, data) etc.\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n}\n```\n\n### Patches\n\u003e _Has the problem been patched? What versions should users upgrade to?_\n\nThe vulnerability has been patched in `github.com/gagliardetto/binary` `v0.7.1`\n\nUsers should upgrade to `v0.7.1` or higher.\n\nTo upgrade to `v0.7.1` or higher, run:\n\n```bash\ngo get github.com/gagliardetto/binary@v0.7.1\n\n# or\n\ngo get github.com/gagliardetto/binary@latest\n```\n\n### Workarounds\n\u003e _Is there a way for users to fix or remediate the vulnerability without upgrading?_\n\nA workaround is not to rely on the `dec.Decode(\u0026val)` function to parse the data, but to use a custom `UnmarshalWithDecoder()` method that reads and checks the length of any slice.\n\n### References\n\u003e _Are there any links users can visit to find out more?_\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [github.com/gagliardetto/binary](https://github.com/gagliardetto/binary)\n* DM me on [twitter](https://twitter.com/immaterial_ink)\n"},"Suggestion":{"Summary":"Resource exhaustion in github.com/gagliardetto/binary","Description":"A memory allocation vulnerability can be exploited to allocate arbitrarily large slices, which can exhaust available memory or crash the program. When parsing data from untrusted sources of input (e.g. the blockchain), the length of the slice to allocate is read directly from the data itself without any checks, which could lead to an allocation of excessive memory."}},{"Input":{"Module":"helm.sh/helm/v3","Description":"A Helm contributor discovered an information disclosure vulnerability using the `getHostByName` template function.\n\n### Impact\n\n`getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart.\n\nInformation passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject `getHostByName` into a chart in order to disclose values to a malicious DNS server.\n\n### Patches\n\nThe issue has been fixed in Helm 3.11.1.\n\n### Workarounds\n\nPrior to using a chart with Helm verify the `getHostByName` function is not being used in a template to disclose any information you do not want passed to DNS servers.\n\n### For more information\n\nHelm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Philipp Stehle at SAP."},"Suggestion":{"Summary":"Information disclosure in helm.sh/helm/v3","Description":"An information disclosure vulnerability exists in the `getHostByName` template function. `getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart. Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject `getHostByName` into a chart in order to disclose values to a malicious DNS server."}},{"Input":{"Module":"github.com/ipfs/go-unixfsnode","Description":"## Impact\n\nTrying to read malformed HAMT sharded directories can cause panics and virtual memory leaks.\nIf you are reading untrusted user input, an attacker can then trigger a panic.\n\nThis is caused by a bogus fanout parameter in the HAMT directory nodes.\nThis includes checks returned in [ipfs/go-bitfield GHSA-2h6c-j3gf-xp9r](https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r), as well as limiting the fanout to \u003c= 1024 (to avoid attempts of arbitrary sized allocations).\n\n## Patches\n- https://github.com/ipfs/go-unixfsnode/commit/91b3d39d33ef0cd2aff2c95d50b2329350944b68\n- https://github.com/ipfs/go-unixfsnode/commit/a4ed723727e0bdc2277158337c2fc0d82802d122\n\n## References\n\n* https://github.com/ipfs/go-unixfs/security/advisories/GHSA-q264-w97q-q778\n* https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r\n"},"Suggestion":{"Summary":"Denial of service via HAMT decoding panic in github.com/ipfs/go-unixfsnode","Description":"Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by a bogus fanout parameter in the HAMT directory nodes. There are no known workarounds (users are advised to upgrade)."}},{"Input":{"Module":"github.com/ipfs/go-unixfs","Description":"### Impact\nTrying to read malformed HAMT sharded directories can cause panics and virtual memory leaks.\nIf you are reading untrusted user input, an attacker can then trigger a panic.\n\nThis is caused by bogus `fanout` parameter in the HAMT directory nodes.\nThis include checks returned in [ipfs/go-bitfield GHSA-2h6c-j3gf-xp9r](https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r), as well as limiting the `fanout` to `\u003c= 1024` (to avoid attempts of arbitrary sized allocations).\n\n### Patches\n- https://github.com/ipfs/go-unixfs/commit/dbcc43ec3e2db0d01e8d80c55040bba3cf22cb4b\n\n### Workarounds\nDo not feed untrusted user data to the decoding functions.\n\n### References\n- https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r\n"},"Suggestion":{"Summary":"Denial of service via HAMT decoding panic in github.com/ipfs/go-unixfs","Description":"Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by bogus `fanout` parameter in the HAMT directory nodes. A workaround is to not feed untrusted user data to the decoding functions."}},{"Input":{"Module":"github.com/google/go-attestation","Description":"### Impact\n\nAn improper input validation vulnerability in go-attestation before 0.4.0 allows local users to provide a maliciously-formed Quote over no/some PCRs, causing `AKPublic.Verify` to succeed despite the inconsistency. Subsequent use of the same set of PCR values in `Eventlog.Verify` lacks the authentication performed by quote verification, meaning a local attacker could couple this vulnerability with a maliciously-crafted TCG log in `Eventlog.Verify` to spoof events in the TCG log, hence defeating remotely-attested measured-boot.\n\n### Patches\nThis issue is resolved in version 0.4.0. If your usage of this library verifies PCRs using multiple quotes, make sure to use the new method `AKPublic.VerifyAll()` instead of `AKPublic.Verify`."},"Suggestion":{"Summary":"Improper input validation in github.com/google/go-attestation","Description":"A local attacker can defeat remotely-attested measured boot. Improper input validation in AKPublic.Verify can cause it to succeed when provided with a maliciously-formed Quote over no/some PCRs. Subsequent use of the same set of PCR values in Eventlog.Verify lacks the authentication performed by quote verification, meaning a local attacker can couple this vulnerability with a maliciously-formed TCG log in Eventlog.Verify to spoof events in the TCG log, defeating remotely-attested measured-boot."}},{"Input":{"Module":"github.com/containerd/containerd","Description":"### Impact\n\nA bug was found in containerd where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container.\n\nDownstream applications that use the containerd client library may be affected as well.\n\n### Patches\nThis bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions.\n\n### Workarounds\n\nEnsure that the `\"USER $USERNAME\"` Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to `ENTRYPOINT [\"su\", \"-\", \"user\"]` to allow `su` to properly set up supplementary groups.\n\n### References\n\n- https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/\n- Docker/Moby: CVE-2022-36109, fixed in Docker 20.10.18\n- CRI-O: CVE-2022-2995, fixed in CRI-O 1.25.0\n- Podman: CVE-2022-2989, fixed in Podman 3.0.1 and 4.2.0\n- Buildah: CVE-2022-2990, fixed in Buildah 1.27.1\n\nNote that CVE IDs apply to a particular implementation, even if an issue is common.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)\n* Email us at [security@containerd.io](mailto:security@containerd.io)\n\nTo report a security issue in containerd:\n* [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new)\n* Email us at [security@containerd.io](mailto:security@containerd.io)"},"Suggestion":{"Summary":"Privilege escalation via supplementary groups in github.com/containerd/containerd","Description":"Supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases and potentially escalate privileges in the container. Uses of the containerd client library may also have improperly setup supplementary groups."}},{"Input":{"Module":"github.com/ipfs/go-merkledag","Description":"### Impact\n\nA `ProtoNode` may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns.\n\nA `ProtoNode` should only be able to encode to valid DAG-PB, attempting to encode invalid DAG-PB forms will result in an error from the codec. Manipulation of an existing (newly created or decoded) `ProtoNode` using the modifier methods did not account for certain states that would place the `ProtoNode` into an unencodeable form.\n\nDue to conformance with the [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) and [`github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, certain methods, which internally require a re-encode if state has changed, will panic due to the inability to return an error.\n\nAdditionally, use of the `ProtoNode#SetCidBuilder()` method to set a non-functioning `CidBuilder` (such as one that refers to a multihash where an implementation of that hash function is not available) may cause the same methods to panic as a new CID is required but cannot be created.\n\n### Patches\n\nReleases involving fixes for this issue are [v0.8.0](https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0) and [v0.8.1](https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1). The recommended minimum version is **v0.8.1**.\n\n* Additional checks are performed on `ProtoNode` state changes to avoid the possibility of creating unencodeable forms, errors are returned where this is the case.\n* The builder passed in to `SetCidBuilder()` is inspected to attempt to determine if it is usable to generate CIDs, otherwise an error is returned.\n* The panics have been removed and replaced with default values (empty byte slice for `RawData()` and a default zero-bytes DAG-PB CID for methods involving CIDs).\n\n### Workarounds\n\nThese workarounds are available when using impacted versions to avoid panic conditions, and may be generally appropriate in order to provide meaningful feedback to users and avoid generating bad, or unexpected encoded data:\n\n* Sanitise inputs when allowing user-input to set a new `CidBuilder` on a `ProtoNode`.\n* Sanitise `Tsize` (`Link#Size`) values such that they are a reasonable byte-size for sub-DAGs where derived from user-input.\n\n### References\n\n* https://github.com/ipfs/kubo/issues/9297\n* https://github.com/ipfs/go-merkledag/issues/90\n* https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0\n* https://github.com/ipfs/go-merkledag/pull/91\n* https://github.com/ipfs/go-merkledag/pull/92\n* https://github.com/ipfs/go-merkledag/pull/93\n* https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1\n\n\n### Credit\n\nThanks to [@mrd0ll4r](https://github.com/mrd0ll4r) for reporting the original error to Kubo!"},"Suggestion":{"Summary":"Panic in github.com/ipfs/go-merkledag","Description":"A ProtoNode may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns. Additionally, use of the ProtoNode.SetCidBuilder() method to set non-functioning CidBuilder (such as one that refers to a multihash where an implementation of that hash function is not available) may cause the same methods to panic as a new CID is required but cannot be created."}},{"Input":{"Module":"github.com/prometheus/client_golang","Description":"This is the Go client library for Prometheus. It has two separate parts, one for instrumenting application code, and one for creating clients that talk to the Prometheus HTTP API. client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients.\n\n### Impact\n\nHTTP server susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods.\n\n### Affected Configuration\n\nIn order to be affected, an instrumented software must\n\n* Use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`.\n* Do not filter any specific methods (e.g GET) before middleware.\n* Pass metric with `method` label name to our middleware.\n* Not have any firewall/LB/proxy that filters away requests with unknown `method`.\n\n### Patches\n\n* https://github.com/prometheus/client_golang/pull/962\n* https://github.com/prometheus/client_golang/pull/987\n\n### Workarounds\n\nIf you cannot upgrade to [v1.11.1 or above](https://github.com/prometheus/client_golang/releases/tag/v1.11.1), in order to stop being affected you can:\n\n* Remove `method` label name from counter/gauge you use in the InstrumentHandler.\n* Turn off affected promhttp handlers.\n* Add custom middleware before promhttp handler that will sanitize the request method given by Go http.Request.\n* Use a reverse proxy or web application firewall, configured to only allow a limited set of methods.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Open an issue in https://github.com/prometheus/client_golang\n* Email us at `prometheus-team@googlegroups.com`\n"},"Suggestion":{"Summary":"Uncontrolled resource consumption in github.com/prometheus/client_golang","Description":"The Prometheus client_golang HTTP server is vulnerable to a denial of service attack when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of the promhttp.InstrumentHandler* middleware except `RequestsInFlight`; not filter any specific methods (e.g GET) before middleware; pass a metric with a \"method\" label name to a middleware; and not have any firewall/LB/proxy that filters away requests with unknown \"method\"."}},{"Input":{"Module":"github.com/containers/storage","Description":"A deadlock vulnerability was found in `github.com/containers/storage` in versions before 1.28.1. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS)."},"Suggestion":{"Summary":"Denial of service via deadlock in github.com/containers/storage","Description":"Due to a goroutine deadlock, using github.com/containers/storage/pkg/archive.DecompressStream on a xz archive returns a reader which will hang indefinitely when Close is called. An attacker can use this to cause denial of service if they are able to cause the caller to attempt to decompress an archive they control."}},{"Input":{"Module":"github.com/pion/webrtc/v3","Description":"### Impact\nData channel communication was incorrectly allowed with users who have failed DTLS certificate verification.\n\nThis attack requires \n* Attacker knows the ICE password. \n* Only take place during PeerConnection handshake.\n\nThis attack can be detected by monitoring `PeerConnectionState` in all versions of Pion WebRTC.\n\n### Patches\nUsers should upgrade to v3.0.15. \n\nThe exact patch is https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e\n\n### Workarounds\nUsers should listen for when `PeerConnectionState` changes to `PeerConnectionStateFailed`. When it enters this state users should not continue using the PeerConnection.\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in https://github.com/pion/webrtc\n* Email us at [team@pion.ly](mailto:team@pion.ly)\n\nThank you to https://github.com/Gaukas for discovering this."},"Suggestion":{"Summary":"Authorization bypass in github.com/pion/webrtc/v3","Description":"Due to improper error handling, DTLS connections were not killed when certificate verification failed, causing users who did not check the connection state to continue to use the connection. This could allow allow an attacker which holds the ICE password, but not a valid certificate, to bypass this restriction."}},{"Input":{"Module":"github.com/russellhaering/gosaml2","Description":"### Impact\nSAML Service Providers using this library for SAML authentication support are likely susceptible to Denial of Service attacks. A bug in this library enables attackers to craft a `deflate`-compressed request which will consume significantly more memory during processing than the size of the original request. This may eventually lead to memory exhaustion and the process being killed.\n\n### Mitigation\nThe maximum compression ratio achievable with `deflate` is 1032:1, so by limiting the size of bodies passed to gosaml2, limiting the rate and concurrency of calls, and ensuring that lots of memory is available to the process it _may_ be possible to help Go's garbage collector \"keep up\".\n\nImplementors are encouraged not to rely on this.\n\n### Patches\nThis issue is addressed in v0.9.0"},"Suggestion":{"Summary":"Denial of service via deflate decompression bomb in github.com/russellhaering/gosaml2","Description":"A bug in SAML authentication library can result in Denial of Service attacks. Attackers can craft a `deflate`-compressed request which will consume significantly more memory during processing than the size of the original request. This may eventually lead to memory exhaustion and the process being killed."}},{"Input":{"Module":"github.com/hashicorp/vault","Description":"HashiCorp Vault's implementation of Shamir's secret sharing used precomputed table lookups, and was vulnerable to cache-timing attacks. An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9."},"Suggestion":{"Summary":"Cache-timing attacks in Shamir's secret sharing in github.com/hashicorp/vault","Description":"HashiCorp Vault's implementation of Shamir's secret sharing uses precomputed table lookups, and is vulnerable to cache-timing attacks. An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares."}},{"Input":{"Module":"github.com/rancher/wrangler","Description":"### Impact\n\nA command injection vulnerability was discovered in Wrangler's Git package affecting versions up to and including `v1.0.0`.\n\nWrangler's Git package uses the underlying Git binary present in the host OS or container image to execute Git operations. Specially crafted commands can be passed to Wrangler that will change their behavior and cause confusion when executed through Git, resulting in command injection in the underlying host.\n\n### Workarounds\n\nA workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.\n\n### Patches\n\nPatched versions include `v1.0.1` and later and the backported tags - `v0.7.4-security1`, `v0.8.5-security1` and `v0.8.11`.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.\n* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) or [Wrangler](https://github.com/rancher/wrangler/issues/new) repository.\n* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/)."},"Suggestion":{"Summary":"Command injection in github.com/rancher/wrangler","Description":"A command injection vulnerability exists in the Wrangler Git package. Specially crafted commands can be passed to Wrangler that will change their behavior and cause confusion when executed through Git, resulting in command injection in the underlying host. A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version."}},{"Input":{"Module":"github.com/open-policy-agent/opa","Description":"### Impact\n\nThe Rego compiler provides a (deprecated) `WithUnsafeBuiltins` function, which allows users to provide a set of built-in functions that should be deemed unsafe — and as such rejected — by the compiler if encountered in the policy compilation stage. A bypass of this protection has been found, where the use of the `with` keyword to mock such a built-in function (a feature introduced in OPA v0.40.0), isn’t taken into account by `WithUnsafeBuiltins`.\n\nThe same method is exposed via `rego.UnsafeBuiltins` in the `github.com/open-policy-agent/opa/rego` package.\n\nWhen provided e.g. the `http.send` built-in function to `WithUnsafeBuiltins`, the following policy would still compile, and call the `http.send` function with the arguments provided to the `is_object` function when evaluated:\n\n```rego\npackage policy\n\nfoo := is_object({\n \"method\": \"get\", \n \"url\": \"https://www.openpolicyagent.org\"\n})\n\nallow := r {\n r := foo with is_object as http.send\n}\n```\n\nBoth built-in functions and user provided (i.e. custom) functions are mockable using this construct.\n\nIn addition to `http.send`, the `opa.runtime` built-in function is commonly considered unsafe in integrations where policy provided by untrusted parties is evaluated, as it risks exposing configuration, or environment variables, potentially carrying sensitive information.\n\n#### Affected Users\n\n**All of these conditions have to be met** to create an adverse effect:\n\n* Use the Go API for policy evaluation (not the OPA server, or the Go SDK)\n* Make use of the `WithUnsafeBuiltins` method in order to deny certain built-in functions, like e.g. `http.send`, from being used in policy evaluation.\n* Allow policy evaluation of policies provided by untrusted parties.\n* The policies evaluated include the `with` keyword to rewrite/mock a built-in, or custom, function to that of another built-in function, such as `http.send`.\n\n**Additionally, the OPA Query API** is affected:\n* If the OPA [Query API](https://www.openpolicyagent.org/docs/latest/rest-api/#query-api) is exposed to the public, and it is relied on `http.send` to be unavailable in that context. Exposing the OPA API to the public without proper [authentication and authorization](https://www.openpolicyagent.org/docs/latest/security/#authentication-and-authorization) in place is generally advised against.\n\n### Patches\nv0.43.1, v0.44.0\n\n### Workarounds\n\nThe `WithUnsafeBuiltins` function has been considered deprecated since the introduction of the [capabilities](https://www.openpolicyagent.org/docs/latest/deployments/#capabilities) feature in OPA v0.23.0 . While the function was commented as deprecated, the format of the comment was however not following the [convention](https://zchee.github.io/golang-wiki/Deprecated/) for deprecated functions, and might not have been picked up by tooling like editors. This has now been fixed. Users are still encouraged to use the capabilities feature over the deprecated `WithUnsafeBuiltins` function.\n\n**If you cannot upgrade**, consider using capabilities instead:\n\nCode like this using the `github.com/open-policy-agent/opa/ast` package:\n```go\n// VULNERABLE with OPA \u003c= 0.43.0\nunsafeBuiltins := map[string]struct{}{\n\tast.HTTPSend.Name: struct{}{},\n}\ncompiler := ast.NewCompiler().WithUnsafeBuiltins(unsafeBuiltins)\n```\n\nneeds to be changed to this:\n```go\ncaps := ast.CapabilitiesForThisVersion()\nvar j int\nfor i, bi := range caps.Builtins {\n\tif bi.Name == ast.HTTPSend.Name {\n\t\tj = i\n\t\tbreak\n\t}\n}\ncaps.Builtins[j] = caps.Builtins[len(caps.Builtins)-1] // put last element into position j\ncaps.Builtins = caps.Builtins[:len(caps.Builtins)-1] // truncate slice\n\ncompiler := ast.NewCompiler().WithCapabilities(caps)\n```\n\nWhen using the `github.com/open-policy-agent/opa/rego` package:\n\n```go\n// VULNERABLE with OPA \u003c= 0.43.0\nr := rego.New(\n\t// other options omitted\n\trego.UnsafeBuiltins(map[string]struct{}{ast.HTTPSend.Name: struct{}{}}),\n)\n```\n\nneeds to be changed to\n```go\nr := rego.New(\n\t// other options omitted\n\trego.Capabilities(caps),\n)\n```\nwith `caps` defined above.\n\nNote that in the process, some error messages will change: `http.send` in this example will no longer be \"unsafe\" and thus forbidden, but it will simply become an \"unknown function\".\n\n### References\n\n* Fix commit on `main`: https://github.com/open-policy-agent/opa/commit/25a597bc3f4985162e7f65f9c36599f4f8f55823\n* Fix commit in 0.43.1 release: https://github.com/open-policy-agent/opa/commit/3e8c754ed007b22393cf65e48751ad9f6457fee8, release page for 0.43.1: https://github.com/open-policy-agent/opa/releases/tag/v0.43.1\n* Function mocking feature introduced in https://github.com/open-policy-agent/opa/pull/4540 and https://github.com/open-policy-agent/opa/pull/4616 \n* Documentation on the [capabilities](https://www.openpolicyagent.org/docs/latest/deployments/#capabilities) feature, which is the preferred way of providing a list of allowed built-in functions. The capabilities feature is **not** affected by this vulnerability.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Open an issue in [Community Discussions](https://github.com/open-policy-agent/community/discussions/categories/opa-and-rego)\n* Ask in Slack: https://slack.openpolicyagent.org/\n"},"Suggestion":{"Summary":"Protection bypass in github.com/open-policy-agent/opa","Description":"Open Policy Agent (OPA) is an open source, general-purpose policy engine. The Rego compiler provides a (deprecated) `WithUnsafeBuiltins` function, which allows users to provide a set of built-in functions that should be deemed unsafe and rejected by the compiler if encountered in the policy compilation stage. A bypass of this protection is possible when using the `with` keyword to mock a built-in function that isn't taken into account by `WithUnsafeBuiltins`."}},{"Input":{"Module":"go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp","Description":"### Impact\n\nThe [v0.38.0](https://github.com/open-telemetry/opentelemetry-go-contrib/releases/tag/v1.13.0) release of [`go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp`](https://github.com/open-telemetry/opentelemetry-go-contrib/blob/463c2e7cd69d25f40b0a595b05394eeb26c68ae2/instrumentation/net/http/otelhttp/handler.go#L218) uses the [`httpconv.ServerRequest`](https://github.com/open-telemetry/opentelemetry-go/blob/v1.12.0/semconv/internal/v2/http.go#L159) function to annotate metric measurements for the `http.server.request_content_length`, `http.server.response_content_length`, and `http.server.duration` instruments.\n\nThe `ServerRequest` function sets the `http.target` attribute value to be the whole request URI (including the query string)[^1]. The metric instruments do not \"forget\" previous measurement attributes when `cumulative` temporality is used, this means the cardinality of the measurements allocated is directly correlated with the unique URIs handled. If the query string is constantly random, this will result in a constant increase in memory allocation that can be used in a denial-of-service attack.\n\nPseudo-attack:\n```\nfor infinite loop {\n r := generate_random_string()\n do_http_request(\"/some/path?random=\"+r)\n}\n```\n\n### Patches\n- `go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp` - v0.39.0\n- `go.opentelemetry.io/contrib/instrumentation/github.com/astaxie/beego/otelbeego` - v0.39.0\n\n[^1]: https://github.com/open-telemetry/opentelemetry-go/blob/6cb5718eaaed5c408c3bf4ad1aecee5c20ccdaa9/semconv/internal/v2/http.go#L202-L208"},"Suggestion":{"Summary":"Denial of service in go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp","Description":"The otelhttp package of opentelemetry-go-contrib is vulnerable to a denial-of-service attack. The otelhttp package uses the httpconv.ServerRequest function to annotate metric measurements for the http.server.request_content_length, http.server.response_content_length, and http.server.duration instruments. The ServerRequest function sets the http.target attribute value to be the whole request URI (including the query string). The metric instruments do not \"forget\" previous measurement attributes when \"cumulative\" temporality is used, meaning that the cardinality of the measurements allocated is directly correlated with the unique URIs handled. If the query string is constantly random, this will result in a constant increase in memory allocation that can be used in a denial-of-service attack."}},{"Input":{"Module":"github.com/cometbft/cometbft","Description":"### Impact\nAn internal modification to the way struct `PeerState` is serialized to JSON introduced a deadlock when new function MarshallJSON is called. This function can be called from two places:\n\n1. Via logs\n * Setting the `consensus` logging module to \"debug\" level (should not happen in production), and\n * Setting the log output format to JSON\n2. Via RPC `dump_consensus_state` \n\nCase 1 above, which should not be hit in production, will eventually hit the deadlock in most goroutines, effectively halting the node.\n\nIn case 2, only the data structures related to the first peer will be deadlocked, together with the thread(s) dealing with the RPC request(s). This means that only one of the channels of communication to the node's peers will be blocked. Eventually the peer will timeout and excluded from the list (typically after 2 minutes). The goroutines involved in the deadlock will not be garbage collected, but they will not interfere with the system after the peer is excluded.\n\nThe theoretical worst case for case 2, is a network with only two validator nodes. In this case, each of the nodes only has one `PeerState` struct. If `dump_consensus_state` is called in either node (or both), the chain will halt until the peer connections time out, after which the nodes will reconnect (with different `PeerState` structs) and the chain will progress again. Then, the same process can be repeated.\n\nAs the number of nodes in a network increases, and thus, the number of peer struct each node maintains, the possibility of reproducing the perturbation visible with 2 nodes decreases. Only the first `PeerState` struct will deadlock, and not the others (RPC `dump_consensus_state` accesses them in a for loop, so the deadlock at the first iteration causes the rest of the iterations of that \"for\" loop to never be reached).\n\nThis regression was introduced in versions `v0.34.28` and `v0.37.1`, and will be fixed in `v0.34.29` and `v0.37.2`.\n\n### Patches\nThe PR containing the fix is [here](https://github.com/cometbft/cometbft/pull/865), and the corresponding issue is [here](https://github.com/cometbft/cometbft/pull/863)\n\n### Workarounds\nFor case 1 (hitting the deadlock via logs)\n* either don't set the log output to \"json\", leave at \"plain\",\n* or don't set the consensus logging module to \"debug\", leave it at \"info\" or higher.\n\nFor case 2 (hitting the deadlock via RPC `dump_consensus_state`)\n* do not expose `dump_consensus_state` RPC endpoint to the public internet (e.g., via rules in your nginx setup)\n\n### References\n\n* [Issue](https://github.com/cometbft/cometbft/pull/863) that introduced the deadlock\n* [Issue](https://github.com/cometbft/cometbft/pull/524) reporting the bug via logs\n"},"Suggestion":{"Summary":"Deadlock in github.com/cometbft/cometbft/consensus","Description":"An internal modification to the way PeerState is serialized to JSON introduced a deadlock when the new function MarshalJSON is called. This function can be called in two ways. The first is via logs, by setting the consensus logging module to \"debug\" level (which should not happen in production), and setting the log output format to JSON. The second is via RPC dump_consensus_state."}},{"Input":{"Module":"helm.sh/helm/v3","Description":"Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the `_repo_` package that can cause a segmentation violation. Applications that use functions from the `_repo_` package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.\n\n### Impact\n\nThe `_repo_` package contains a handler that processes the index file of a repository. For example, the Helm client adds references to chart repositories where charts are managed. The `_repo_` package parses the index file of the repository and loads it into structures Go can work with. Some index files can cause array data structures to be created causing a memory violation.\n\nApplications that use the `_repo_` package in the Helm SDK to parse an index file can suffer a Denial of Service when that input causes a panic that cannot be recovered from.\n\nThe Helm Client will panic with an index file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.\n\n### Patches\n\nThis issue has been resolved in 3.10.3. \n\n### Workarounds\n\nSDK users can validate index files that are correctly formatted before passing them to the `_repo_` functions.\n\n### For more information\n\nHelm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored by CNCF."},"Suggestion":{"Summary":"Denial of service via repository index file in helm.sh/helm/v3","Description":"Applications that use the repo package in the Helm SDK to parse an index file can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The repo package contains a handler that processes the index file of a repository. For example, the Helm client adds references to chart repositories where charts are managed. The repo package parses the index file of the repository and loads it into memory. Some index files can cause array data structures to be created causing a memory violation. The Helm Client will panic with an index file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client."}},{"Input":{"Module":"github.com/tendermint/tendermint","Description":"### Description \n\nTendermint Core v0.34.0 introduced a new way of handling evidence of misbehavior. As part of this, [we added a new `Timestamp` field to `Evidence` structs](https://github.com/tendermint/tendermint/pull/5219). This timestamp would be calculated using the same algorithm that is used when a block is created and proposed. (This algorithm relies on the timestamp of the last commit from this specific block.) \n\nIn Tendermint Core v0.34.0-v0.34.2, the `consensus` reactor is responsible for forming `DuplicateVoteEvidence` whenever double signs are observed. However, the current block is still “in flight” when it is being formed by the `consensus` reactor. It hasn’t been finalized through network consensus yet. This means that different nodes in the network may observe different “last commits” when assigning a timestamp to `DuplicateVoteEvidence.`\n\nIn turn, different nodes could form `DuplicateVoteEvidence` objects at the same height but with different timestamps. One `DuplicateVoteEvidence` object (with one timestamp) will then eventually get finalized in the block, but this means that any `DuplicateVoteEvidence` with a different timestamp is considered invalid. Any node that formed invalid `DuplicateVoteEvidence` will continue to propose invalid evidence; its peers may see this, and choose to disconnect from this node. This bug means that double signs are DoS vectors in Tendermint Core v0.34.0-v0.34.2. \n\nTendermint Core v0.34.3 is a security release which fixes this bug. As of v0.34.3, `DuplicateVoteEvidence` is no longer formed by the `consensus` reactor; rather, the `consensus` reactor passes the `Vote`s themselves into the `EvidencePool`, which is now responsible for forming `DuplicateVoteEvidence`. The `EvidencePool` has timestamp info that should be consistent across the network, which means that `DuplicateVoteEvidence` formed in this reactor should have consistent timestamps. \n\nThis release changes the API between the `consensus` and `evidence` reactors. \n\n### Impact\n\nThis is a denial-of-service vector which impacts networks running Tendermint Core v0.34.0 - v0.34.2.\n\n### Remediation\n\nThis problem has been patched in Tendermint Core v0.34.3. Networks running impacted versions of Tendermint Core should update immediately.\n\n### Workarounds\n\nThere are no workarounds, other than upgrading to a patched version of Tendermint Core.\n\n### Credits \n\n* Crypto.com (@cyril-crypto, @brianatcrypto, @tomtau and @yihuang) for finding and submitting this vulnerability\n* @melekes and @cmwaters for identifying the root cause and patching the problem \n\n### For more information\n\nIf you have any questions or comments about this advisory:\n* Open an issue in [tendermint/tendermint](https://github.com/tendermint/tendermint)\n* Email us at [security@tendermint.com](mailto:security@tendermint.com)"},"Suggestion":{"Summary":"Uncontrolled resource consumption during consensus in github.com/tendermint/tendermint","Description":"Mishandling of timestamps during consensus process can cause a denial of service. While reaching consensus, different tendermint nodes can observe a different timestamp for a consensus evidence. This mismatch can cause the evidence to be invalid, upon which the node producing the evidence will be asked to generate a new evidence. This new evidence will be the same, which means it will again be rejected by other nodes involved in the consensus. This loop will continue until the peer nodes decide to disconnect from the node producing the evidence."}},{"Input":{"Module":"github.com/libp2p/go-libp2p","Description":"### Summary\nIn go-libp2p, by using signed peer records a malicious actor can store an arbitrary amount of data in a remote node’s memory. This memory does not get garbage collected and so the victim can run out of memory and crash.\n\nIt is feasible to do this at scale. An attacker would have to transfer ~1/2 as much memory it wants to occupy (2x amplification factor).\n\nThe attacker can perform this attack over time as the target node’s memory will not be garbage collected.\n\nThis can occur because when a signed peer record is received, only the signature validity check is performed but the sender signature is not checked. Signed peer records from randomly generated peers can be sent by a malicious actor. A target node will accept the peer record as long as the signature is valid, and then stored in the peer store.\n\nThere is cleanup logic in the peer store that cleans up data when a peer disconnects, but this cleanup is never triggered for the fake peer (from which signed peer records were accepted) because it was never “connected”.\n\n### Impact\nIf users of go-libp2p in production are not monitoring memory consumption over time, it could be a silent attack i.e. the attacker could bring down nodes over a period of time (how long depends on the node resources i.e. a go-libp2p node on a virtual server with 4 gb of memory takes about 90 sec to bring down; on a larger server, it might take a bit longer.)\n\n### Patches\nUpdate your go-libp2p dependency to the latest release, v0.30.0 at the time of writing.\n\nIf you'd like to stay on the 0.27.x release, we strongly recommend users to update to go-libp2p [0.27.7](https://github.com/libp2p/go-libp2p/releases/tag/v0.27.7). Though this OOM issue was fixed in 0.27.4, there were subsequent patch releases afterwards (important fixes for other issues unrelated to the OOM).\n\n### Workarounds\nNone"},"Suggestion":{"Summary":"libp2p nodes vulnerable to OOM attack","Description":"A malicious actor can store an arbitrary amount of data in the memory of a remote node by sending the node a message with a signed peer record. Signed peer records from randomly generated peers can be sent by a malicious actor. This memory does not get garbage collected and so the remote node can run out of memory (OOM)."}},{"Input":{"Module":"github.com/goreleaser/nfpm/v2","Description":"### Summary\nWhen building packages directly from source control, file permissions on the checked-in files are not maintained. \n\n### Details\nWhen building packages directly from source control, file permissions on the checked-in files are not maintained. When nfpm packaged the files (without extra config for enforcing its own permissions) files could go out with bad permissions (chmod 666 or 777).\n\n### PoC\nCreate a default nfpm structure. \n\nWithin the test folder, create 3 files named `chmod-XXX.sh`. Each script has file \npermissions set corresponding with their file names (`chmod-777.sh` = `chmod 777`). Below each \nfile and permissions can be seen.\n\n```console\n$ ls -lart test \ntotal 24\n-rwxrwxrwx 1 user group 11 May 19 13:15 chmod-777.sh\n-rw-rw-rw- 1 user group 11 May 19 13:16 chmod-666.sh\ndrwxr-xr-x 5 user group 160 May 19 13:19 .\n-rw-rw-r-- 1 user group 11 May 19 13:19 chmod-664.sh\ndrwxr-xr-x 10 user group 320 May 19 13:29 ..\n```\n\nBelow is the snippet nfpm configuration file of the contents of the package. The test folder \nand files has no extra config for enforcing permissions. \n\n```yaml\ncontents:\n- src: foo-binary\n dst: /usr/bin/bar\n- src: bar-config.conf\n dst: /etc/foo-binary/bar-config.conf\n type: config\n- src: test\n dst: /etc/test/scripts\n```\n\nThe next step is to create a deb package.\n\n```console\n$ nfpm package -p deb # Create dep package\nusing deb packager...\ncreated package: foo_1.0.0_arm64.deb\n```\n\nWhen on a Ubuntu VM, install the foo package which was created\n\n```console\n$ sudo dpkg -i foo_1.0.0_arm64.deb # Installing deb package within Ubuntu\nSelecting previously unselected package foo.\n(Reading database ... 67540 files and directories currently installed.)\nPreparing to unpack foo_1.0.0_arm64.deb ...\nUnpacking foo (1.0.0) ...\nSetting up foo (1.0.0) ...\n```\n\nLooking at `/etc/test/scripts` and viewing the permissions. Permissions are passed exactly the same as the source.\n\n```console\n$ ls -lart /etc/test/scripts\ntotal 20\n-rwxrwxrwx 1 root root 11 May 22 12:15 chmod-777.sh\n-rw-rw-rw- 1 root root 11 May 22 12:16 chmod-666.sh\n-rw-rw-r-- 1 root root 11 May 22 12:19 chmod-664.sh\ndrwxr-xr-x 3 root root 4096 May 22 13:00 ..\ndrwxr-xr-x 2 root root 4096 May 22 13:00 .\n```\n\n\n## Solution\nTo prevent world-writable files from making it into the packages, add the ability to override the default permissions of packaged files using a umask config option in the packaging spec file. This feature in nfpm would allow applying a global umask across any files being packaged, therefore, with the correct configuration, preventing world-writable files without needing to list permissions on each and every file in the package\n\n\n### Impact\n\nVulnerability is https://cwe.mitre.org/data/definitions/276.html\nhttps://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\n\nAnyone using nfpm for creating packages and not checking/setting file permissions before packaging could result in bad permissions for files/folders."},"Suggestion":{"Summary":"Incorrect permissions in github.com/goreleaser/nfpm/v2","Description":"When nfpm packages files without additional configuration to enforce its own permissions, the files could be packaged with incorrect permissions (chmod 666 or 777). Anyone who uses nfpm to create packages and does not check or set file permissions before packaging could result in files or folders being packaged with incorrect permissions."}},{"Input":{"Module":"github.com/ipfs/go-bitfield","Description":"### Impact\nWhen feeding untrusted user input into the size parameter of `NewBitfield` and `FromBytes` functions, an attacker can trigger `panic`s.\n\nThis happen when the `size` is a not a multiple of `8` or is negative.\nThere were already a note in the `NewBitfield` documentation:\n\u003e ```\n\u003e Panics if size is not a multiple of 8.\n\u003e ````\n\nBut it incomplete and missing from `FromBytes`'s documentation.\n\nThis has been replaced by returning an `(Bitfield, error)` and returning a non nil error if the size is wrong.\n\n### Patches\n- https://github.com/ipfs/go-bitfield/commit/5e1d256fe043fc4163343ccca83862c69c52e579\n\n### Workarounds\n- Ensure `size%8 == 0 \u0026\u0026 size \u003e= 0` yourself before calling `NewBitfield` or `FromBytes`\n\n### References\n- https://github.com/ipfs/go-unixfs/security/advisories/GHSA-q264-w97q-q778\n"},"Suggestion":{"Summary":"Denial of service via malformed size parameters in github.com/ipfs/go-bitfield","Description":"When feeding untrusted user input into the size parameter of `NewBitfield` and FromBytes functions, an attacker can trigger panics. This happens when the size is a not a multiple of 8 or is negative. A workaround is to ensure size%8 == 0 \u0026\u0026 size \u003e= 0 yourself before calling NewBitfield or FromBytes."}},{"Input":{"Module":"helm.sh/helm/v3","Description":"Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the `_chartutil_` package that can cause a segmentation violation. Applications that use functions from the `_chartutil_` package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.\n\n### Impact\n\nThe `_chartutil_` package contains a parser that loads a JSON Schema validation file. For example, the Helm client when rendering a chart will validate its values with the schema file. The `_chartutil_` package parses the schema file and loads it into structures Go can work with. Some schema files can cause array data structures to be created causing a memory violation.\n\nApplications that use the `_chartutil_` package in the Helm SDK to parse a schema file can suffer a Denial of Service when that input causes a panic that cannot be recovered from.\n\nThe Helm Client will panic with a schema file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.\n\n### Patches\n\nThis issue has been resolved in 3.10.3. \n\n### Workarounds\n\nSDK users can validate schema files that are correctly formatted before passing them to the `_chartutil_` functions.\n\n### For more information\n\nHelm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored by CNCF."},"Suggestion":{"Summary":"Denial of service via schema file in helm.sh/helm/v3","Description":"Certain JSON schema validation files can cause a Helm Client to panic, leading to a possible denial of service. The chartutil package contains a parser that loads a JSON Schema validation file. For example, the Helm client when rendering a chart will validate its values with the schema file. The chartutil package parses the schema file and loads it into memory, but some schema files can cause array data structures to be created causing a memory violation. The Helm Client will panic with a schema file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client."}},{"Input":{"Module":"github.com/codenotary/immudb","Description":"### Impact\n\nIn certain scenario a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operations resulting in acceptance of an invalid state value.\n\nThis vulnerability only affects immudb client SDKs, the immudb server itself is not affected by this vulnerability.\n\n### Detailed description\n\nimmudb uses Merkle Tree enhanced with additional linear part to perform consistency proofs between two transactions. The linear part is built from the last leaf node of the Merkle Tree compensating for transactions that were not yet consumed by the Merkle Tree calculation.\n\nThe Merkle Tree part is then used to perform proofs for things that are in transaction range covered by the Merkle Tree where the linear part is used to check those that are not yet in the Merkle Tree.\n\nWhen doing consistency checks between two immudb states, the linear proof part is not fully checked. In fact only the first (last Merkle Tree leaf) and the last (current DB state value) are checked against new Merkle Tree without ensuring that elements in the middle of that chain are correctly added as Merkle Tree leafs.\n\nThis lack of check means that the database can present different set of hashes on the linear proof part to what would later be used once those become part of the Merkle Tree. This property can be exploited by the database to expose two different transaction entries depending on the other transaction that the user requested consistency proof for.\n\nIn practice this could lead to a following scenario:\n\n* a client requests a verified write operation\n* the server responds with a proof for the transaction\n* client stores the state value retrieved from the server and expects it to be a confirmation of that write and all the history of the database before that transaction\n* a series of validated read / write operations is performed by the client, each accompanied by a successfully validated consistency proof and update of the client state\n* the client requests verified get operation on the transaction it has written before (and that was verified with a proof from the server)\n* the server replies with a completely different transaction that can be properly validated according to the currently stored db state on the client side\n\n### Patches\n\nThe following Go SDK versions is not vulnerable:\n\n| **SDK** | **Version** |\n|-------|------------|\n| [go](pkg.go.dev/github.com/codenotary/immudb/pkg/client) | 1.4.1 |\n\n### Workarounds\n\nInvalid proofs can not be generated in a normal immudb server and will be detected by a genuine replica server.\nTo ensure that the server does not produce invalid proofs and to check that the history presented by the server\ndoes not contain falsified transactions, one should run a genuine immudb replica server in a safe environment\nand fully synchronize all databases with the primary.\n\n### References\n\n* https://github.com/codenotary/immudb/tree/master/docs/security/vulnerabilities/linear-fake\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Open a discussion in [immudb Discussions](https://github.com/codenotary/immudb/discussions/new)\n* Email us at [immudb-security@codenotary.com](mailto:immudb-security@codenotary.com)\n"},"Suggestion":{"Summary":"Insufficient verification of proofs in github.com/codenotary/immudb","Description":"In certain scenarios, a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operations resulting in acceptance of an invalid state value. This vulnerability only affects immudb client SDKs, the immudb server itself is not affected by this vulnerability."}},{"Input":{"Module":"github.com/containernetworking/cni","Description":"An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as \"../\" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability."},"Suggestion":{"Summary":"Improper limitation of path name in github.com/containernetworking/cni","Description":"The FindInPath function is vulnerable to directory traversal attacks, potentially permitting attackers to execute arbitrary binaries. This function does not sanitize its plugin parameter, so parameter names containing \"../\" or other such elements may reference arbitrary locations on the filesystem."}},{"Input":{"Module":"github.com/pion/dtls/v2","Description":"### Impact\nA DTLS Client could provide a Certificate that it doesn't posses the private key for and Pion DTLS wouldn't reject it. \n\nThis issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can't be trusted when using a Pion DTLS server prior to v2.1.5\n\n### Patches\nUpgrade to Pion DTLS v2.1.5\n\n### Workarounds\nNo workarounds available, upgrade to Pion DTLS v2.1.5\n\n### References\nThank you to [Juho Nurminen](https://github.com/jupenur) and the Mattermost team for discovering and reporting this. \n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [Pion DTLS](http://github.com/pion/dtls)\n* Email us at [team@pion.ly](mailto:team@pion.ly)"},"Suggestion":{"Summary":"Improper validation of client certificates in github.com/pion/dtls/v2","Description":"Client-provided certificates are not correctly validated, and must not be trusted. DTLS client certificates must be accompanied by proof that the client possesses the private key for the certificate. The Pion DTLS server accepted client certificates unaccompanied by this proof, permitting an attacker to present any certificate and have it accepted as valid."}},{"Input":{"Module":"mellium.im/sasl","Description":"An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication."},"Suggestion":{"Summary":"Authentication failure in mellium.im/sasl","Description":"An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication."}},{"Input":{"Module":"github.com/crossplane/crossplane-runtime","Description":"### Summary\n\nFuzz testing on `crossplane/crossplane`, by Ada Logics and sponsored by the CNCF, identified input to a function in the `fieldpath` package that can cause an out of memory panic. Applications that use the `Paved` type's `SetValue` method with user provided input without proper validation might use excessive amounts of memory and cause an out of memory panic.\n\n### Details\n\nIn the `fieldpath` package, the `SetValue` method of the `Paved` type sets a value on the inner object according to the provided path, without validating it first. This allows setting values in slices at any specific index and the code will grow the target array up to the required size. The index is currently capped at max uint32 (4294967295) given how indexes are parsed, but that is still an unnecessarily large value.\n\n### Workaround\n\nUsers can parse and validate the path before passing it to the `SetValue` method of the `Paved` type, constraining the index size as deemed appropriate.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored by CNCF."},"Suggestion":{"Summary":"Out-of-memory panic in github.com/crossplane/crossplane-runtime","Description":"An out of memory panic vulnerability exists in the crossplane-runtime libraries. Applications that use the Paved type's SetValue method with user-provided input that is not properly validated might use excessive amounts of memory and cause an out of memory panic. In the fieldpath package, the Paved.SetValue method sets a value on the Paved object according to the provided path, without any validation. This allows setting values in slices at any provided index, which grows the target array up to the requested index. The index is currently capped at max uint32 (4294967295), a large value. If callers do not validate paths' indexes on their own, this could allow users to consume arbitrary amounts of memory. Applications that do not use the Paved type's SetValue method are not affected. Users unable to upgrade can work around this issue by parsing and validating the path before passing it to the SetValue method of the Paved type, constraining the index size as deemed appropriate."}},{"Input":{"Module":"helm.sh/helm/v3","Description":"Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the `_strvals_` package that can cause an out of memory panic. Out of memory panics cannot be recovered from. Applications that use functions from the `_strvals_` package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.\n\n### Impact\n\nThe `_strvals_` package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like `--set`, `--set-string`, and others that enable the user to pass in strings that are merged into the values. The `_strvals_` package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic.\n\nApplications that use the `_strvals_` package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from.\n\nThe Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.\n\n### Patches\n\nThis issue has been resolved in 3.9.4. \n\n### Workarounds\n\nSDK users can validate strings supplied by users won't create large arrays causing significant memory usage before passing them to the `_strvals_` functions.\n\n### For more information\n\nHelm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored by CNCF."},"Suggestion":{"Summary":"Denial of service through string value parsing in helm.sh/helm/v3","Description":"Applications that use the strvals package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The strvals package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like --set, --set-string, and others that enable the user to pass in strings that are merged into the values. The strvals package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. The Helm Client will panic with input to --set, --set-string, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client."}},{"Input":{"Module":"github.com/codenotary/immudb","Description":"### Impact\n\nimmudb client SDKs use server's UUID to distinguish between different server instance so that the client can connect to different immudb instances and keep the state for multiple servers. SDK does not validate this uuid and can accept any value reported by the server. A malicious server can change the reported UUID tricking the client to treat it as a different server thus accepting a state completely irrelevant to the one previously retrieved from the server.\n\n### Patches\n\nThe following Go SDK versions are not vulnerable:\n\n| **SDK** | **Version** |\n|-------|------------|\n| [go](pkg.go.dev/github.com/codenotary/immudb/pkg/client) | 1.4.1 |\n\n### Workarounds\n\nWhen initializing an immudb client object, a custom state handler can be used to store the state. Providing custom implementation that ignores the server UUID can be used to ensure that even if the server changes the UUID, client will still consider it to be the same server.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Open a discussion in [immudb Discussions](https://github.com/codenotary/immudb/discussions/new)\n* Email us at [immudb-security@codenotary.com](mailto:immudb-security@codenotary.com)\n"},"Suggestion":{"Summary":"Improper validation of UUIDs in github.com/codenotary/immudb","Description":"A malicious server can trick a client into treating it as a different server by changing the reported UUID. immudb client SDKs use the server's UUID to distinguish between different server instance so that the client can connect to different immudb instances and keep the state for multiple servers. The SDK does not validate this UUID and accepts any value reported by the server. A malicious server can therefore change the reported UUID and trick the client into treating it as a different server."}}]
|
data
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/genai/data/examples.csv
|
"{""Module"":""github.com/docker/distribution"",""Description"":""### Impact\n\nSystems that rely on digest equivalence for image attestations may be vulnerable to type confusion.\n\n### Patches\n\nUpgrade to at least `v2.8.0-beta.1` if you are running `v2.x` release. If you use the code from the `main` branch, update at least to the commit after [b59a6f827947f9e0e67df0cfb571046de4733586](https://github.com/distribution/distribution/commit/b59a6f827947f9e0e67df0cfb571046de4733586).\n\n### Workarounds\n\nThere is no way to work around this issue without patching.\n\n### References\n\nDue to [an oversight in the OCI Image Specification](https://github.com/opencontainers/image-spec/pull/411) that removed the embedded `mediaType` field from manifests, a maliciously crafted OCI Container Image can cause registry clients to parse the same image in two different ways without modifying the image’s digest by modifying the `Content-Type` header returned by a registry. This can invalidate a common pattern of relying on container image digests for equivalence.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n* Open an issue in [distribution](https://github.com/distribution/distribution) \n* Open an issue in [distribution-spec](https://github.com/opencontainers/distribution-spec) \n* Email us at [cncf-distribution-security@lists.cncf.io](mailto:cncf-distribution-security@lists.cncf.io)\n""}","{""Summary"":""Type confusion in github.com/docker/distribution"",""Description"":""Systems that rely on digest equivalence for image attestations may be vulnerable to type confusion. A maliciously crafted OCI Container Image can cause registry clients to parse the same image in two different ways without modifying the image's digest, invalidating the common pattern of relying on container image digests for equivalence. This problem has been addressed in newer versions by improving validation in manifest unmarshalling.""}"
"{""Module"":""github.com/pomerium/pomerium"",""Description"":""### Impact\nChanges to the OIDC claims of a user after initial login are not reflected in policy evaluation when using [`allowed_idp_claims`](https://www.pomerium.com/reference/#allowed-idp-claims) as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions.\n\n### Patches\nv0.15.6\n\n### Workarounds\n- Clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated\n\n### References\nhttps://github.com/pomerium/pomerium/pull/2724\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [Pomerium](https://github.com/pomerium/pomerium)\n* Email us at [security@pomerium.com](mailto:security@pomerium.com)\n""}","{""Summary"":""Incorrect authorization in github.com/pomerium/pomerium"",""Description"":""Pomerium is an open source identity-aware access proxy. Changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using allowed_idp_claims as part of policy. If using allowed_idp_claims and a user's claims are changed, Pomerium can make incorrect authorization decisions. For users unable to upgrade clear data on databroker service by clearing redis or restarting the in-memory databroker to force claims to be updated.""}"
"{""Module"":""github.com/blevesearch/bleve"",""Description"":""### Impact\n_What kind of vulnerability is it? Who is impacted?_\n\nBleve includes HTTP utilities under bleve/http package, that are used by its sample application. \n(https://github.com/blevesearch/bleve-explorer)\nThese HTTP methods paves way for exploitation of a node’s filesystem where the bleve index resides, \nif the user has used bleve’s own HTTP (bleve/http) handlers for exposing the access to the indexes. \nFor instance, the CreateIndexHandler (http/index_create.go) and DeleteIndexHandler (http/index_delete.go) \nenable an attacker to create a bleve index (directory structure) anywhere where the user running the server \nhas the write permissions and to delete recursively any directory owned by the same user account.\n \nUsers who have used the bleve/http package for exposing access to bleve index without the explicit \nhandling for the Role Based Access Controls(RBAC) of the index assets would be impacted.\n\n\n### Patches\n_Has the problem been patched? What versions should users upgrade to?_\n\n**No**. The http package is purely intended to be used for demonstration purposes. \nAnd bleve is never designed to be handling the RBACs or it was ever advertised to be used in that way. \nHence the collaborators of this project have decided to stay away from adding any authentication or \nauthorization to bleve project at the moment.\n\n### Workarounds\n_Is there a way for users to fix or remediate the vulnerability without upgrading?_\n\nThe bleve/http package is mainly for demonstration purposes and it lacks exhaustive validation of the user \ninputs as well as any authentication and authorization measures. \nSo it is recommended to not use that in production use cases.\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue [here](https://github.com/blevesearch/bleve/issues).\n* Email us at [mailto:security@couchbase.com, fts-team@couchbase.com].\n""}","{""Summary"":""No access control in github.com/blevesearch/bleve and bleve/v2"",""Description"":""HTTP handlers provide unauthenticated access to the local filesystem. The Bleve http package is intended for demonstration purposes and contains no authentication, authorization, or validation of user inputs. Exposing handlers from this package can permit attackers to create files and delete directories.""}"
"{""Module"":""github.com/cloudflare/circl"",""Description"":""### Impact\nWhen sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether `crypto/rand.Read()` returns an error. In rare deployment cases (error thrown by the `Read()` function), this could lead to a predictable shared secret.\n\nThe tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides `crypto/rand.Reader`, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.\n\n\n### Patches\nThe fix was introduced in CIRCL v. 1.3.3\n""}","{""Summary"":""Leaked shared secret and weak blinding in github.com/cloudflare/circl"",""Description"":""When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret. The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.""}"
"{""Module"":""github.com/libp2p/go-libp2p"",""Description"":""### Impact\nVersions older than `v0.18.0` of go-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of go-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack.\n\nIn the original version of the attack, the malicious node would continue opening new streams on a stream multiplexer that doesn’t provide sufficient back pressure (yamux or mplex). It is easy to defend against this one attack, but there are countless variations of this attack:\n* Opening streams and causing a non-trivial memory allocation (e.g., for multistream or protobuf parsing)\n* Creating a lot of sybil nodes and opening new connections across nodes\n\n### Patches (What to do as a go-libp2p consumer:)\n1. Update your go-libp2p dependency to go-libp2p v0.18.0 or greater (current version as of publish date is [v0.24.0](https://github.com/libp2p/go-libp2p/releases/tag/v0.24.0).)\n - Note: **It's recommend that you update to `v0.21.0` onwards** as you’ll get some useful functionality that will help in production environments like better metrics around resource usage, Grafana dashboards around resource usage, allow list support, and default autoscaling limits. [Please see the v0.21.0 release notes for more info.](https://github.com/libp2p/go-libp2p/releases/tag/v0.21.0))\n\n2. Determine appropriate limits for your application - go-libp2p sets up a resource manager with the default limits if none are provided. For default definitions please see [limits_defaults.go](https://github.com/libp2p/go-libp2p/blob/master/p2p/host/resource-manager/limit_defaults.go). These limits are also set to automatically scale, this is done using the [AutoScale method of the ScalingLimitConfig](https://github.com/libp2p/go-libp2p/blob/master/p2p/host/resource-manager/README.md#scaling-limits). We recommend you [tune your limits as described here](https://github.com/libp2p/go-libp2p/blob/master/p2p/host/resource-manager/README.md#how-to-tune-your-limits).\n\n3. Configure your node to be attack resilient. See [how to respond to an attack and identify misbehaving peers here](https://docs.libp2p.io/concepts/security/dos-mitigation/#responding-to-an-attack). Then setup automatic blocking with fail2ban using canonical libp2p log lines: [guide on how to do so here](https://docs.libp2p.io/concepts/security/dos-mitigation/#how-to-automate-blocking-with-fail2ban).\n\n#### Examples\n* Lotus’ integration can be found in https://github.com/filecoin-project/lotus/blob/master/node/modules/lp2p/rcmgr.go. Lotus reads user-configured resource limits from a limits.json file into the root directory. This allows users to share their resource manager configuration independent of any other configurations.\n* Kubo’s (formerly go-ipfs) integration can be found in https://github.com/ipfs/go-ipfs/blob/master/core/node/libp2p/rcmgr.go. Kubo reads the limits from the IPFS config file.\n\n**Note:** go-libp2p still implements the [connection manager](https://github.com/libp2p/go-libp2p/tree/master/p2p/net/connmgr) mentioned above. The connection manager is a component independent of the resource manager, which aims to keep the number of libp2p connections between a low and a high watermark. When modifying connection limits, it’s advantageous to keep the configuration of these components consistent, i.e., when setting a limit of N concurrent connections in the resource manager, the high watermark should be at most (and ideally slightly less) than N.\n\n### Workarounds\nAlthough there are no workarounds within go-libp2p, some range of attacks can be mitigated using OS tools (like manually blocking malicious peers using `iptables` or `ufw` ) or making use of a load balancer in front of libp2p nodes.\n\nHowever these require direct action \u0026 responsibility on your part and are no substitutes for upgrading go-libp2p. Therefore, we highly recommend upgrading your go-libp2p version for the way it enables tighter scoped limits and provides visibility into and easier reasoning about go-libp2p resource utilization.\n\n### References\nPlease see our DoS Mitigation page for more information on how to incorporate mitigation strategies, monitor your application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/. \n\nPlease see the related disclosure for rust-libp2p: https://github.com/libp2p/rust-libp2p/security/advisories/GHSA-jvgw-gccv-q5p8 and js-libp2p: https://github.com/libp2p/js-libp2p/security/advisories/GHSA-f44q-634c-jvwv\n\n#### For more information\n\nIf you have any questions or comments about this advisory email us at [security@libp2p.io](mailto:security@libp2p.io)""}","{""Summary"":""Resource exhaustion in github.com/libp2p/go-libp2p"",""Description"":""go-libp2p is vulnerable to targeted resource exhaustion attacks. These attacks target libp2p's connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory ultimately leading to the process getting killed by the host's operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of go-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack. It's recommend to update to v0.21.0 onwards to get some useful functionality that will help in production environments like better metrics around resource usage, Grafana dashboards around resource usage, allow list support, and default autoscaling limits.""}"
"{""Module"":""github.com/supranational/blst"",""Description"":""### Impact\n\nBlst versions v0.3.0 through 0.3.10 failed to perform a signature group-check if the call to `SigValidate` in the Go bindings was complemented with a check for infinity. Formally speaking, infinity, or the identity element of the elliptic curve group, is a member of the group, and the group-check should allow it. An initial review of blst users on GitHub did not uncover any use of this function with the complementary infinity check. This optional check was added as a convenience feature because despite infinity being a legitimate member of the group, individual signatures should never be infinite (as it is equivalent to having zero for the secret key), and observing one should raise a flag.\n\n### Description\n\nThe vulnerable function is declared as `SigValidate(sigInfcheck bool) bool` and if called with `sigInfcheck` argument set to `true`, the group-check was omitted. The group-check is required to be performed on untrusted input, because the pairing, the corner-stone operation of the signature scheme, is defined only on points that are members of a specific cyclic group, which is a subset of all the possible points on elliptic curves in question. Submitting an untrusted point outside the group opens up the possibility of accepting an alternative signature for a chosen message.\n\nIt should be noted that the SigValidate call is not the only way to perform the group-checks. There are optional checks integrated into various other verification methods, such as `Verify`, `AggregateVerify`, etc., as well as signature aggregation methods, such as `PairingAggregate*`. The reason why there are multiple options is that the group-check is a relatively expensive operation, and application developers are arguably entitled the freedom to choose when it's performed.\n\n### Patches\n\nThis issue has been resolved in the v0.3.11 release and users are advised to update if their application is affected or alternatively omit the complementary infinity check.\n\n### Credits\n\nA special thanks to Yunjong Jeong (@blukat29) for the discovery and disclosure of this vulnerability.\n""}","{""Summary"":""Blst fails to perform group signature validation"",""Description"":""When complemented with a check for infinity, blst skips performing a signature group-check. Formally speaking, infinity is the identity element of the elliptic curve group and as such it is a member of the group, so the group-check should be performed. The fix performs the check even in the presence of infinity.""}"
"{""Module"":""github.com/argoproj/argo-cd/v2"",""Description"":""### Impact\nAll versions of Argo CD starting with v2.6.0-rc1 have an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI). The user must have `applications, create` or `applications, update` RBAC access to reach the code which may produce the error.\n\nThe user is not guaranteed to be able to trigger the error message. They may attempt to spam the API with requests to trigger a rate limit error from the upstream repository. \n\nIf the user has `repositories, update` access, they may edit an existing repository to introduce a URL typo or otherwise force an error message. But if they have that level of access, they are probably intended to have access to the credentials anyway.\n\n### Patches\n\nA patch for this vulnerability has been released in the following Argo CD version:\n\n* v2.6.1\n\n### Workarounds\n\nThe only way to completely resolve the issue is to upgrade.\n\n#### Mitigations\n\nTo mitigate the issue, make sure that your repo credentials have only least necessary privileges. For example, the credentials should not have push access, and they should not have access to more resources than what Argo CD actually needs (for example, a whole GitHub org when only one repo is needed).\n\nTo further mitigate the impact of a leaked write-capable repo credential, you could [enable commit signature verification](https://argo-cd.readthedocs.io/en/stable/user-guide/gpg-verification/#enforcing-signature-verification). Even if someone could push a malicious commit, the commit would not by synced.\n\nYou should also enforce least privileges in Argo CD RBAC. Make sure users only have `repositories, update`, `applications, update`, or `applications, create` access if they absolutely need it.\n\n### References\n\n* The problem was initially reported in a [GitHub issue](https://github.com/argoproj/argo-cd/issues/12309)\n* [Argo CD RBAC configuration documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/)\n\n### For more information\n\n* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)\n* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd\n""}","{""Summary"":""Repository access credential leak in github.com/argoproj/argo-cd/v2"",""Description"":""Argo CD has an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI). The user must have `applications, create` or `applications, update` RBAC access to reach the code which may produce the error. The user is not guaranteed to be able to trigger the error message. They may attempt to spam the API with requests to trigger a rate limit error from the upstream repository. If the user has `repositories, update` access, they may edit an existing repository to introduce a URL typo or otherwise force an error message.""}"
"{""Module"":""github.com/ethereum/go-ethereum"",""Description"":""### Impact\n\nA vulnerability in the Geth EVM could cause a node to reject the canonical chain. \n\n### Description \n\nA memory-corruption bug within the EVM can cause a consensus error, where vulnerable nodes obtain a different `stateRoot` when processing a maliciously crafted transaction. This, in turn, would lead to the chain being split in two forks.\n\nAll Geth versions supporting the London hard fork are vulnerable (which predates London), so all users should update.\n\nThis bug was exploited on Mainnet at block 13107518, leading to a minority chain split. \n\n### Patches\n\nA patch is included in the `v1.10.8` release.\nThe exact patch to fix the issue is contained within this [commit](https://github.com/ethereum/go-ethereum/pull/23381/commits/4d4879cafd1b3c906fc184a8c4a357137465128f)\n\n### Workarounds\n\nNo workarounds exist, save to update and/or apply the patch commit. \n\n### References. \n\nPost-mortem [write-up](https://github.com/ethereum/go-ethereum/blob/master/docs/postmortems/2021-08-22-split-postmortem.md).\n\n### Credits\n\nThe bug was found by @guidovranken (working for [Sentnl](https://sentnl.io/) during an audit of the [Telos EVM](https://www.telos.net/evm)) and reported via bounty@ethereum.org.\n\n### For more information\nIf you have any questions or comments about this advisory:\n\n* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum/)\n* Email us at [security@ethereum.org](mailto:security@ethereum.org)\n""}","{""Summary"":""Consensus flaw during block processing in github.com/ethereum/go-ethereum"",""Description"":""A vulnerability in the Geth EVM can cause a node to reject the canonical chain. A memory-corruption bug within the EVM can cause a consensus error, where vulnerable nodes obtain a different stateRoot when processing a maliciously crafted transaction. This, in turn, would lead to the chain being split in two forks.""}"
"{""Module"":""github.com/cometbft/cometbft"",""Description"":""### Impact\n\nThe mempool maintains two data structures to keep track of outstanding transactions: a list and a map.\nThese two data structures are supposed to be in sync all the time in the sense that the map tracks the index (if any) of the transaction in the list. \n\nUnfortunately, it is possible to have them out of sync. When this happens, the list may contain several copies of the same transaction.\nBecause the map tracks a single index, it is then no longer possible to remove all the copies of the transaction from the list.\nThis happens even if the duplicated transaction is later committed in a block.\nThe only way to remove the transaction is by restarting the node.\n\nThese are the steps to cause the above duplication problem. Everything should happen within one height, that is no `FinalizeBlock` or `BeginBlock` ABCI calls should happen while these steps are reproduced:\n\n1. send transaction tx1 to the target full node via RPC\n2. send N more different transactions to the target full node, where N should be higher than the node's configured value for `cache_size` in `config.toml`\n3. send transaction tx1 again to the target full node\n\nOne of the copies of tx1 is now _stuck_ in the mempool's data structures. Effectively causing a memory leak, and having that node gossiping that transaction to its peers forever.\n\nThe above problem can be repeated on and on until a sizable number of transactions are stuck in the mempool, in order to try to bring down the target node.\n\nThis problem is present in releases: `v0.37.0`, and `v0.37.1`, as well as in `v0.34.28`, and all previous releases of the CometBFT repo. It will be fixed in releases `v0.34.29` and `v0.37.2`.\n\n### Patches\n\nThe PR containing the fix is [here](https://github.com/cometbft/cometbft/pull/890).\n\n\n### Workarounds\n\n* Increasing the value of `cache_size` in `config.toml` makes it very difficult to effectively attack a full node.\n* Not exposing the transaction submission RPC's would mitigate the probability of a successful attack, as the attacker would then have to create a modified (byzantine) full node to be able to perform the attack via p2p.\n\n### References\n\n* [PR](https://github.com/tendermint/tendermint/pull/2778) that introduced the map to track transactions in the mempool.\n* [PR](https://github.com/cometbft/cometbft/pull/890) containing the fix.\n""}","{""Summary"":""Denial of service via OOM in github.com/cometbft/cometbft"",""Description"":""A bug in the CometBFT middleware causes the mempool's two data structures to fall out of sync. This can lead to duplicate transactions that cannot be removed, even after they are committed in a block. The only way to remove the transaction is to restart the node. This can be exploited by an attacker to bring down a node by repeatedly submitting duplicate transactions.""}"
"{""Module"":""github.com/containers/buildah"",""Description"":""A bug was found in Buildah where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2).\n\nThis bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set.\n""}","{""Summary"":""Incorrect default permissions in github.com/containers/buildah"",""Description"":""Containers are created with non-empty inheritable Linux process capabilities, permitting programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug does not affect the container security sandbox, as the inheritable set never contains more capabilities than are included in the container's bounding set.""}"
"{""Module"":""github.com/fluxcd/helm-controller/api"",""Description"":""Flux controllers within the affected versions range are vulnerable to a denial of service attack. Users that have permissions to change Flux’s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout` (and structured variations of these fields), causing the entire object type to stop being processed.\n\nThe issue has two root causes: a) the Kubernetes type `metav1.Duration` not being fully compatible with the Go type `time.Duration` as explained on [upstream report](https://github.com/kubernetes/apimachinery/issues/131); b) lack of validation within Flux to restrict allowed values.\n\n### Workarounds\n\nAdmission controllers can be employed to restrict the values that can be used for fields `.spec.interval` and `.spec.timeout`, however upgrading to the latest versions is still the recommended mitigation.\n\n### Credits\n\nThis issue was reported by Alexander Block (@codablock) through the Flux security mailing list (as [recommended](https://fluxcd.io/security/#report-a-vulnerability)).\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n- Open an issue in any of the affected repositories.\n- Contact us at the CNCF Flux channel.\n\n### References\n\n- https://github.com/kubernetes/apimachinery/issues/131\n\n""}","{""Summary"":""Denial of service in flux controllers in github.com/fluxcd modules"",""Description"":""Flux controllers are vulnerable to a denial of service attack. Users that have permissions to change Flux's objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout` (and structured variations of these fields), causing the entire object type to stop being processed. The issue has two root causes: a) the Kubernetes type `metav1.Duration` is not fully compatible with the Go type `time.Duration` as explained in https://github.com/kubernetes/apimachinery/issues/131, and b) a lack of validation within Flux to restrict allowed values.""}"
"{""Module"":""helm.sh/helm/v3"",""Description"":""Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the _strvals_ package that can cause a stack overflow. In Go, a stack overflow cannot be recovered from. Applications that use functions from the _strvals_ package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.\n\n### Impact\n\nThe _strvals_ package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like `--set`, `--set-string`, and others that enable the user to pass in strings that are merged into the values. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing a stack overflow.\n\nApplications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from.\n\nThe Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes a stack overflow. Helm is not a long running service so the panic will not affect future uses of the Helm client.\n\n### Patches\n\nThis issue has been resolved in 3.10.3. \n\n### Workarounds\n\nSDK users can validate strings supplied by users won't create large arrays causing significant memory usage before passing them to the _strvals_ functions.\n\n### For more information\n\nHelm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored by CNCF.""}","{""Summary"":""Denial of service in string value parsing in helm.sh/helm/v3"",""Description"":""Applications that use the strvals package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes an error that cannot be recovered from. The strvals package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like --set, --set-string, and others that enable the user to pass in strings that are merged into the values. The strvals package converts these strings into structures Go can work with. Some string inputs can cause can cause a stack overflow to be created causing a stack overflow error. Stack overflow errors cannot be recovered from. The Helm Client will panic with input to --set, --set-string, and other value setting flags that causes a stack overflow. Helm is not a long running service so the error will not affect future uses of the Helm client.""}"
"{""Module"":""github.com/runatlantis/atlantis"",""Description"":""The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 is vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge webhook events.""}","{""Summary"":""Timing attack in github.com/runatlantis/atlantis"",""Description"":""Validation of Gitlab requests can leak secrets. The package github.com/runatlantis/atlantis/server/controllers/events uses a non-constant time comparison for secrets while validating a Gitlab request. This allows for a timing attack where an attacker can recover a secret and then forge the request.""}"
"{""Module"":""github.com/rancher/wrangler"",""Description"":""### Impact\n\nA denial of services (DoS) vulnerability was discovered in Wrangler Git package affecting versions up to and including `v1.0.0`.\n\nSpecially crafted Git credentials can result in a denial of service (DoS) attack on an application that uses Wrangler due to the exhaustion of the available memory and CPU resources. This is caused by a lack of input validation of Git credentials before they are used, which may lead to a denial of service in some cases. This issue can be triggered when accessing both private and public Git repositories. \n\n### Workarounds\n\nA workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.\n\n### Patches\n\nPatched versions include `v1.0.1` and later and the backported tags - `v0.7.4-security1`, `v0.8.5-security1` and `v0.8.11`.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.\n* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) or [Wrangler](https://github.com/rancher/wrangler/issues/new) repository.\n* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).""}","{""Summary"":""Denial of service when processing Git credentials in github.com/rancher/wrangler"",""Description"":""A denial of service (DoS) vulnerability exists in the Wrangler Git package. Specially crafted Git credentials can result in a denial of service (DoS) attack on an application that uses Wrangler due to the exhaustion of the available memory and CPU resources. This is caused by a lack of input validation of Git credentials before they are used, which may lead to a denial of service in some cases. This issue can be triggered when accessing both private and public Git repositories. A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.""}"
"{""Module"":""github.com/containerd/imgcrypt"",""Description"":""Imgcrypt implements a function `CheckAuthorization()` that is supposed to check whether a user is authorized to access an encrypted image given the keys that the user has provided on the command line that would enable decryption of the image. The check is to prevent that a user can start a container from an image that has previously been decrypted by another user on the same system and therefore a decrypted version of the image layers may be already available in the cache locally.\n\nThe failure occurs when an image with a ManifestList is used and the architecture of the local host is not the first one in the ManifestList. In the version prior to the fix, only the first architecture in the list was tested, which may not have its layers available locally (were not pulled) since it cannot be run on the host architecture. Therefore, the verdict on unavailable layers was that the image could be run anticipating that image run failure would occur later due to the layers not being available. However, this verdict to allow the image to run lead to other architectures in the ManifestList be able to run an image without providing keys if that image had previously been decrypted. The fixed version now skips over irrelevant architectures and tests the Manifest of the local architecture, if available.\n\nKnown projects that use the `CheckAuthorization()` of imgcrypt is for example the ctr-enc client tool provided by imgcrypt. In this implementation, the call to `CheckAuthorization()` is used on the client side and could therefore also be easily circumvented by a modified client tool not calling this function.\n\nIn relation to the vulnerability in ctr-enc, affected environments would have to allow different users to invoke ctr-enc indirectly using some sort of management stack that gives user indirect access to ctr-enc.\n\nThe patch has been applied to imgcrypt v1.1.4. Workarounds may include usage of different namespaces for each remote user.""}","{""Summary"":""Incorrect authorization in github.com/containerd/imgcrypt"",""Description"":""The imgcrypt library provides API extensions for containerd to support encrypted container images and implements the ctd-decoder command line tool for use by containerd to decrypt encrypted container images. The imgcrypt function `CheckAuthorization` is supposed to check whether the current used is authorized to access an encrypted image and prevent the user from running an image that another user previously decrypted on the same system. In versions prior to 1.1.4, a failure occurs when an image with a ManifestList is used and the architecture of the local host is not the first one in the ManifestList. Only the first architecture in the list was tested, which may not have its layers available locally since it could not be run on the host architecture. Therefore, the verdict on unavailable layers was that the image could be run anticipating that image run failure would occur later due to the layers not being available. However, this verdict to allow the image to run enabled other architectures in the ManifestList to run an image without providing keys if that image had previously been decrypted. A patch has been applied to imgcrypt 1.1.4. Workarounds may include usage of different namespaces for each remote user.""}"
"{""Module"":""github.com/gagliardetto/binary"",""Description"":""### Impact\n\u003e _What kind of vulnerability is it? Who is impacted?_\n\nThe vulnerability is a memory allocation vulnerability that can be exploited to allocate slices in memory with (arbitrary) excessive size value, which can either exhaust available memory or crash the whole program.\n\nWhen using `github.com/gagliardetto/binary` to parse unchecked (or wrong type of) data from untrusted sources of input (e.g. the blockchain) into slices, it's possible to allocate memory with excessive size.\n\nWhen `dec.Decode(\u0026val)` method is used to parse data into a structure that is or contains slices of values, the length of the slice was previously read directly from the data itself without any checks on the size of it, and then a slice was allocated. This could lead to an overflow and an allocation of memory with excessive size value.\n\nExample:\n\n```go\npackage main\n\nimport (\n\t\""github.com/gagliardetto/binary\"" // any version before v0.7.1 is vulnerable\n\t\""log\""\n)\n\ntype MyStruct struct {\n\tField1 []byte // field is a slice (could be a slice of any type)\n}\n\nfunc main() {\n\t// Let's assume that the data is coming from the blockchain:\n\tdata := []byte{0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10}\n\t\n\tvar val MyStruct\n\t// - To determine the size of the val.Field1 slice, the decoder will read the length\n\t// of the slice from the data itself without any checks on the size of it.\n\t//\n\t// - This could lead to an allocation of memory with excessive size value.\n\t// Which means: []byte{0x01, 0x02, 0x03, 0x04} will be read as the length\n\t// of the slice (= 67305985) and then an allocation of memory with 67305985 bytes will be made.\n\t//\n\tdec := binary.NewBorshDecoder(data)\n\terr := dec.Decode(\u0026val) // or binary.UnmarshalBorsh(\u0026val, data) or binary.UnmarshalBin(\u0026val, data) etc.\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n}\n```\n\n### Patches\n\u003e _Has the problem been patched? What versions should users upgrade to?_\n\nThe vulnerability has been patched in `github.com/gagliardetto/binary` `v0.7.1`\n\nUsers should upgrade to `v0.7.1` or higher.\n\nTo upgrade to `v0.7.1` or higher, run:\n\n```bash\ngo get github.com/gagliardetto/binary@v0.7.1\n\n# or\n\ngo get github.com/gagliardetto/binary@latest\n```\n\n### Workarounds\n\u003e _Is there a way for users to fix or remediate the vulnerability without upgrading?_\n\nA workaround is not to rely on the `dec.Decode(\u0026val)` function to parse the data, but to use a custom `UnmarshalWithDecoder()` method that reads and checks the length of any slice.\n\n### References\n\u003e _Are there any links users can visit to find out more?_\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [github.com/gagliardetto/binary](https://github.com/gagliardetto/binary)\n* DM me on [twitter](https://twitter.com/immaterial_ink)\n""}","{""Summary"":""Resource exhaustion in github.com/gagliardetto/binary"",""Description"":""A memory allocation vulnerability can be exploited to allocate arbitrarily large slices, which can exhaust available memory or crash the program. When parsing data from untrusted sources of input (e.g. the blockchain), the length of the slice to allocate is read directly from the data itself without any checks, which could lead to an allocation of excessive memory.""}"
"{""Module"":""helm.sh/helm/v3"",""Description"":""A Helm contributor discovered an information disclosure vulnerability using the `getHostByName` template function.\n\n### Impact\n\n`getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart.\n\nInformation passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject `getHostByName` into a chart in order to disclose values to a malicious DNS server.\n\n### Patches\n\nThe issue has been fixed in Helm 3.11.1.\n\n### Workarounds\n\nPrior to using a chart with Helm verify the `getHostByName` function is not being used in a template to disclose any information you do not want passed to DNS servers.\n\n### For more information\n\nHelm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Philipp Stehle at SAP.""}","{""Summary"":""Information disclosure in helm.sh/helm/v3"",""Description"":""An information disclosure vulnerability exists in the `getHostByName` template function. `getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart. Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject `getHostByName` into a chart in order to disclose values to a malicious DNS server.""}"
"{""Module"":""github.com/ipfs/go-unixfsnode"",""Description"":""## Impact\n\nTrying to read malformed HAMT sharded directories can cause panics and virtual memory leaks.\nIf you are reading untrusted user input, an attacker can then trigger a panic.\n\nThis is caused by a bogus fanout parameter in the HAMT directory nodes.\nThis includes checks returned in [ipfs/go-bitfield GHSA-2h6c-j3gf-xp9r](https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r), as well as limiting the fanout to \u003c= 1024 (to avoid attempts of arbitrary sized allocations).\n\n## Patches\n- https://github.com/ipfs/go-unixfsnode/commit/91b3d39d33ef0cd2aff2c95d50b2329350944b68\n- https://github.com/ipfs/go-unixfsnode/commit/a4ed723727e0bdc2277158337c2fc0d82802d122\n\n## References\n\n* https://github.com/ipfs/go-unixfs/security/advisories/GHSA-q264-w97q-q778\n* https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r\n""}","{""Summary"":""Denial of service via HAMT decoding panic in github.com/ipfs/go-unixfsnode"",""Description"":""Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by a bogus fanout parameter in the HAMT directory nodes. There are no known workarounds (users are advised to upgrade).""}"
"{""Module"":""github.com/ipfs/go-unixfs"",""Description"":""### Impact\nTrying to read malformed HAMT sharded directories can cause panics and virtual memory leaks.\nIf you are reading untrusted user input, an attacker can then trigger a panic.\n\nThis is caused by bogus `fanout` parameter in the HAMT directory nodes.\nThis include checks returned in [ipfs/go-bitfield GHSA-2h6c-j3gf-xp9r](https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r), as well as limiting the `fanout` to `\u003c= 1024` (to avoid attempts of arbitrary sized allocations).\n\n### Patches\n- https://github.com/ipfs/go-unixfs/commit/dbcc43ec3e2db0d01e8d80c55040bba3cf22cb4b\n\n### Workarounds\nDo not feed untrusted user data to the decoding functions.\n\n### References\n- https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r\n""}","{""Summary"":""Denial of service via HAMT decoding panic in github.com/ipfs/go-unixfs"",""Description"":""Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by bogus `fanout` parameter in the HAMT directory nodes. A workaround is to not feed untrusted user data to the decoding functions.""}"
"{""Module"":""github.com/google/go-attestation"",""Description"":""### Impact\n\nAn improper input validation vulnerability in go-attestation before 0.4.0 allows local users to provide a maliciously-formed Quote over no/some PCRs, causing `AKPublic.Verify` to succeed despite the inconsistency. Subsequent use of the same set of PCR values in `Eventlog.Verify` lacks the authentication performed by quote verification, meaning a local attacker could couple this vulnerability with a maliciously-crafted TCG log in `Eventlog.Verify` to spoof events in the TCG log, hence defeating remotely-attested measured-boot.\n\n### Patches\nThis issue is resolved in version 0.4.0. If your usage of this library verifies PCRs using multiple quotes, make sure to use the new method `AKPublic.VerifyAll()` instead of `AKPublic.Verify`.""}","{""Summary"":""Improper input validation in github.com/google/go-attestation"",""Description"":""A local attacker can defeat remotely-attested measured boot. Improper input validation in AKPublic.Verify can cause it to succeed when provided with a maliciously-formed Quote over no/some PCRs. Subsequent use of the same set of PCR values in Eventlog.Verify lacks the authentication performed by quote verification, meaning a local attacker can couple this vulnerability with a maliciously-formed TCG log in Eventlog.Verify to spoof events in the TCG log, defeating remotely-attested measured-boot.""}"
"{""Module"":""github.com/containerd/containerd"",""Description"":""### Impact\n\nA bug was found in containerd where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container.\n\nDownstream applications that use the containerd client library may be affected as well.\n\n### Patches\nThis bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions.\n\n### Workarounds\n\nEnsure that the `\""USER $USERNAME\""` Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to `ENTRYPOINT [\""su\"", \""-\"", \""user\""]` to allow `su` to properly set up supplementary groups.\n\n### References\n\n- https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/\n- Docker/Moby: CVE-2022-36109, fixed in Docker 20.10.18\n- CRI-O: CVE-2022-2995, fixed in CRI-O 1.25.0\n- Podman: CVE-2022-2989, fixed in Podman 3.0.1 and 4.2.0\n- Buildah: CVE-2022-2990, fixed in Buildah 1.27.1\n\nNote that CVE IDs apply to a particular implementation, even if an issue is common.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)\n* Email us at [security@containerd.io](mailto:security@containerd.io)\n\nTo report a security issue in containerd:\n* [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new)\n* Email us at [security@containerd.io](mailto:security@containerd.io)""}","{""Summary"":""Privilege escalation via supplementary groups in github.com/containerd/containerd"",""Description"":""Supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases and potentially escalate privileges in the container. Uses of the containerd client library may also have improperly setup supplementary groups.""}"
"{""Module"":""github.com/ipfs/go-merkledag"",""Description"":""### Impact\n\nA `ProtoNode` may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns.\n\nA `ProtoNode` should only be able to encode to valid DAG-PB, attempting to encode invalid DAG-PB forms will result in an error from the codec. Manipulation of an existing (newly created or decoded) `ProtoNode` using the modifier methods did not account for certain states that would place the `ProtoNode` into an unencodeable form.\n\nDue to conformance with the [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) and [`github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, certain methods, which internally require a re-encode if state has changed, will panic due to the inability to return an error.\n\nAdditionally, use of the `ProtoNode#SetCidBuilder()` method to set a non-functioning `CidBuilder` (such as one that refers to a multihash where an implementation of that hash function is not available) may cause the same methods to panic as a new CID is required but cannot be created.\n\n### Patches\n\nReleases involving fixes for this issue are [v0.8.0](https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0) and [v0.8.1](https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1). The recommended minimum version is **v0.8.1**.\n\n* Additional checks are performed on `ProtoNode` state changes to avoid the possibility of creating unencodeable forms, errors are returned where this is the case.\n* The builder passed in to `SetCidBuilder()` is inspected to attempt to determine if it is usable to generate CIDs, otherwise an error is returned.\n* The panics have been removed and replaced with default values (empty byte slice for `RawData()` and a default zero-bytes DAG-PB CID for methods involving CIDs).\n\n### Workarounds\n\nThese workarounds are available when using impacted versions to avoid panic conditions, and may be generally appropriate in order to provide meaningful feedback to users and avoid generating bad, or unexpected encoded data:\n\n* Sanitise inputs when allowing user-input to set a new `CidBuilder` on a `ProtoNode`.\n* Sanitise `Tsize` (`Link#Size`) values such that they are a reasonable byte-size for sub-DAGs where derived from user-input.\n\n### References\n\n* https://github.com/ipfs/kubo/issues/9297\n* https://github.com/ipfs/go-merkledag/issues/90\n* https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0\n* https://github.com/ipfs/go-merkledag/pull/91\n* https://github.com/ipfs/go-merkledag/pull/92\n* https://github.com/ipfs/go-merkledag/pull/93\n* https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1\n\n\n### Credit\n\nThanks to [@mrd0ll4r](https://github.com/mrd0ll4r) for reporting the original error to Kubo!""}","{""Summary"":""Panic in github.com/ipfs/go-merkledag"",""Description"":""A ProtoNode may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns. Additionally, use of the ProtoNode.SetCidBuilder() method to set non-functioning CidBuilder (such as one that refers to a multihash where an implementation of that hash function is not available) may cause the same methods to panic as a new CID is required but cannot be created.""}"
"{""Module"":""github.com/prometheus/client_golang"",""Description"":""This is the Go client library for Prometheus. It has two separate parts, one for instrumenting application code, and one for creating clients that talk to the Prometheus HTTP API. client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients.\n\n### Impact\n\nHTTP server susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods.\n\n### Affected Configuration\n\nIn order to be affected, an instrumented software must\n\n* Use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`.\n* Do not filter any specific methods (e.g GET) before middleware.\n* Pass metric with `method` label name to our middleware.\n* Not have any firewall/LB/proxy that filters away requests with unknown `method`.\n\n### Patches\n\n* https://github.com/prometheus/client_golang/pull/962\n* https://github.com/prometheus/client_golang/pull/987\n\n### Workarounds\n\nIf you cannot upgrade to [v1.11.1 or above](https://github.com/prometheus/client_golang/releases/tag/v1.11.1), in order to stop being affected you can:\n\n* Remove `method` label name from counter/gauge you use in the InstrumentHandler.\n* Turn off affected promhttp handlers.\n* Add custom middleware before promhttp handler that will sanitize the request method given by Go http.Request.\n* Use a reverse proxy or web application firewall, configured to only allow a limited set of methods.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Open an issue in https://github.com/prometheus/client_golang\n* Email us at `prometheus-team@googlegroups.com`\n""}","{""Summary"":""Uncontrolled resource consumption in github.com/prometheus/client_golang"",""Description"":""The Prometheus client_golang HTTP server is vulnerable to a denial of service attack when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of the promhttp.InstrumentHandler* middleware except `RequestsInFlight`; not filter any specific methods (e.g GET) before middleware; pass a metric with a \""method\"" label name to a middleware; and not have any firewall/LB/proxy that filters away requests with unknown \""method\"".""}"
"{""Module"":""github.com/containers/storage"",""Description"":""A deadlock vulnerability was found in `github.com/containers/storage` in versions before 1.28.1. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS).""}","{""Summary"":""Denial of service via deadlock in github.com/containers/storage"",""Description"":""Due to a goroutine deadlock, using github.com/containers/storage/pkg/archive.DecompressStream on a xz archive returns a reader which will hang indefinitely when Close is called. An attacker can use this to cause denial of service if they are able to cause the caller to attempt to decompress an archive they control.""}"
"{""Module"":""github.com/pion/webrtc/v3"",""Description"":""### Impact\nData channel communication was incorrectly allowed with users who have failed DTLS certificate verification.\n\nThis attack requires \n* Attacker knows the ICE password. \n* Only take place during PeerConnection handshake.\n\nThis attack can be detected by monitoring `PeerConnectionState` in all versions of Pion WebRTC.\n\n### Patches\nUsers should upgrade to v3.0.15. \n\nThe exact patch is https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e\n\n### Workarounds\nUsers should listen for when `PeerConnectionState` changes to `PeerConnectionStateFailed`. When it enters this state users should not continue using the PeerConnection.\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in https://github.com/pion/webrtc\n* Email us at [team@pion.ly](mailto:team@pion.ly)\n\nThank you to https://github.com/Gaukas for discovering this.""}","{""Summary"":""Authorization bypass in github.com/pion/webrtc/v3"",""Description"":""Due to improper error handling, DTLS connections were not killed when certificate verification failed, causing users who did not check the connection state to continue to use the connection. This could allow allow an attacker which holds the ICE password, but not a valid certificate, to bypass this restriction.""}"
"{""Module"":""github.com/russellhaering/gosaml2"",""Description"":""### Impact\nSAML Service Providers using this library for SAML authentication support are likely susceptible to Denial of Service attacks. A bug in this library enables attackers to craft a `deflate`-compressed request which will consume significantly more memory during processing than the size of the original request. This may eventually lead to memory exhaustion and the process being killed.\n\n### Mitigation\nThe maximum compression ratio achievable with `deflate` is 1032:1, so by limiting the size of bodies passed to gosaml2, limiting the rate and concurrency of calls, and ensuring that lots of memory is available to the process it _may_ be possible to help Go's garbage collector \""keep up\"".\n\nImplementors are encouraged not to rely on this.\n\n### Patches\nThis issue is addressed in v0.9.0""}","{""Summary"":""Denial of service via deflate decompression bomb in github.com/russellhaering/gosaml2"",""Description"":""A bug in SAML authentication library can result in Denial of Service attacks. Attackers can craft a `deflate`-compressed request which will consume significantly more memory during processing than the size of the original request. This may eventually lead to memory exhaustion and the process being killed.""}"
"{""Module"":""github.com/hashicorp/vault"",""Description"":""HashiCorp Vault's implementation of Shamir's secret sharing used precomputed table lookups, and was vulnerable to cache-timing attacks. An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9.""}","{""Summary"":""Cache-timing attacks in Shamir's secret sharing in github.com/hashicorp/vault"",""Description"":""HashiCorp Vault's implementation of Shamir's secret sharing uses precomputed table lookups, and is vulnerable to cache-timing attacks. An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares.""}"
"{""Module"":""github.com/rancher/wrangler"",""Description"":""### Impact\n\nA command injection vulnerability was discovered in Wrangler's Git package affecting versions up to and including `v1.0.0`.\n\nWrangler's Git package uses the underlying Git binary present in the host OS or container image to execute Git operations. Specially crafted commands can be passed to Wrangler that will change their behavior and cause confusion when executed through Git, resulting in command injection in the underlying host.\n\n### Workarounds\n\nA workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.\n\n### Patches\n\nPatched versions include `v1.0.1` and later and the backported tags - `v0.7.4-security1`, `v0.8.5-security1` and `v0.8.11`.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.\n* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) or [Wrangler](https://github.com/rancher/wrangler/issues/new) repository.\n* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).""}","{""Summary"":""Command injection in github.com/rancher/wrangler"",""Description"":""A command injection vulnerability exists in the Wrangler Git package. Specially crafted commands can be passed to Wrangler that will change their behavior and cause confusion when executed through Git, resulting in command injection in the underlying host. A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.""}"
"{""Module"":""github.com/open-policy-agent/opa"",""Description"":""### Impact\n\nThe Rego compiler provides a (deprecated) `WithUnsafeBuiltins` function, which allows users to provide a set of built-in functions that should be deemed unsafe — and as such rejected — by the compiler if encountered in the policy compilation stage. A bypass of this protection has been found, where the use of the `with` keyword to mock such a built-in function (a feature introduced in OPA v0.40.0), isn’t taken into account by `WithUnsafeBuiltins`.\n\nThe same method is exposed via `rego.UnsafeBuiltins` in the `github.com/open-policy-agent/opa/rego` package.\n\nWhen provided e.g. the `http.send` built-in function to `WithUnsafeBuiltins`, the following policy would still compile, and call the `http.send` function with the arguments provided to the `is_object` function when evaluated:\n\n```rego\npackage policy\n\nfoo := is_object({\n \""method\"": \""get\"", \n \""url\"": \""https://www.openpolicyagent.org\""\n})\n\nallow := r {\n r := foo with is_object as http.send\n}\n```\n\nBoth built-in functions and user provided (i.e. custom) functions are mockable using this construct.\n\nIn addition to `http.send`, the `opa.runtime` built-in function is commonly considered unsafe in integrations where policy provided by untrusted parties is evaluated, as it risks exposing configuration, or environment variables, potentially carrying sensitive information.\n\n#### Affected Users\n\n**All of these conditions have to be met** to create an adverse effect:\n\n* Use the Go API for policy evaluation (not the OPA server, or the Go SDK)\n* Make use of the `WithUnsafeBuiltins` method in order to deny certain built-in functions, like e.g. `http.send`, from being used in policy evaluation.\n* Allow policy evaluation of policies provided by untrusted parties.\n* The policies evaluated include the `with` keyword to rewrite/mock a built-in, or custom, function to that of another built-in function, such as `http.send`.\n\n**Additionally, the OPA Query API** is affected:\n* If the OPA [Query API](https://www.openpolicyagent.org/docs/latest/rest-api/#query-api) is exposed to the public, and it is relied on `http.send` to be unavailable in that context. Exposing the OPA API to the public without proper [authentication and authorization](https://www.openpolicyagent.org/docs/latest/security/#authentication-and-authorization) in place is generally advised against.\n\n### Patches\nv0.43.1, v0.44.0\n\n### Workarounds\n\nThe `WithUnsafeBuiltins` function has been considered deprecated since the introduction of the [capabilities](https://www.openpolicyagent.org/docs/latest/deployments/#capabilities) feature in OPA v0.23.0 . While the function was commented as deprecated, the format of the comment was however not following the [convention](https://zchee.github.io/golang-wiki/Deprecated/) for deprecated functions, and might not have been picked up by tooling like editors. This has now been fixed. Users are still encouraged to use the capabilities feature over the deprecated `WithUnsafeBuiltins` function.\n\n**If you cannot upgrade**, consider using capabilities instead:\n\nCode like this using the `github.com/open-policy-agent/opa/ast` package:\n```go\n// VULNERABLE with OPA \u003c= 0.43.0\nunsafeBuiltins := map[string]struct{}{\n\tast.HTTPSend.Name: struct{}{},\n}\ncompiler := ast.NewCompiler().WithUnsafeBuiltins(unsafeBuiltins)\n```\n\nneeds to be changed to this:\n```go\ncaps := ast.CapabilitiesForThisVersion()\nvar j int\nfor i, bi := range caps.Builtins {\n\tif bi.Name == ast.HTTPSend.Name {\n\t\tj = i\n\t\tbreak\n\t}\n}\ncaps.Builtins[j] = caps.Builtins[len(caps.Builtins)-1] // put last element into position j\ncaps.Builtins = caps.Builtins[:len(caps.Builtins)-1] // truncate slice\n\ncompiler := ast.NewCompiler().WithCapabilities(caps)\n```\n\nWhen using the `github.com/open-policy-agent/opa/rego` package:\n\n```go\n// VULNERABLE with OPA \u003c= 0.43.0\nr := rego.New(\n\t// other options omitted\n\trego.UnsafeBuiltins(map[string]struct{}{ast.HTTPSend.Name: struct{}{}}),\n)\n```\n\nneeds to be changed to\n```go\nr := rego.New(\n\t// other options omitted\n\trego.Capabilities(caps),\n)\n```\nwith `caps` defined above.\n\nNote that in the process, some error messages will change: `http.send` in this example will no longer be \""unsafe\"" and thus forbidden, but it will simply become an \""unknown function\"".\n\n### References\n\n* Fix commit on `main`: https://github.com/open-policy-agent/opa/commit/25a597bc3f4985162e7f65f9c36599f4f8f55823\n* Fix commit in 0.43.1 release: https://github.com/open-policy-agent/opa/commit/3e8c754ed007b22393cf65e48751ad9f6457fee8, release page for 0.43.1: https://github.com/open-policy-agent/opa/releases/tag/v0.43.1\n* Function mocking feature introduced in https://github.com/open-policy-agent/opa/pull/4540 and https://github.com/open-policy-agent/opa/pull/4616 \n* Documentation on the [capabilities](https://www.openpolicyagent.org/docs/latest/deployments/#capabilities) feature, which is the preferred way of providing a list of allowed built-in functions. The capabilities feature is **not** affected by this vulnerability.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Open an issue in [Community Discussions](https://github.com/open-policy-agent/community/discussions/categories/opa-and-rego)\n* Ask in Slack: https://slack.openpolicyagent.org/\n""}","{""Summary"":""Protection bypass in github.com/open-policy-agent/opa"",""Description"":""Open Policy Agent (OPA) is an open source, general-purpose policy engine. The Rego compiler provides a (deprecated) `WithUnsafeBuiltins` function, which allows users to provide a set of built-in functions that should be deemed unsafe and rejected by the compiler if encountered in the policy compilation stage. A bypass of this protection is possible when using the `with` keyword to mock a built-in function that isn't taken into account by `WithUnsafeBuiltins`.""}"
"{""Module"":""go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp"",""Description"":""### Impact\n\nThe [v0.38.0](https://github.com/open-telemetry/opentelemetry-go-contrib/releases/tag/v1.13.0) release of [`go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp`](https://github.com/open-telemetry/opentelemetry-go-contrib/blob/463c2e7cd69d25f40b0a595b05394eeb26c68ae2/instrumentation/net/http/otelhttp/handler.go#L218) uses the [`httpconv.ServerRequest`](https://github.com/open-telemetry/opentelemetry-go/blob/v1.12.0/semconv/internal/v2/http.go#L159) function to annotate metric measurements for the `http.server.request_content_length`, `http.server.response_content_length`, and `http.server.duration` instruments.\n\nThe `ServerRequest` function sets the `http.target` attribute value to be the whole request URI (including the query string)[^1]. The metric instruments do not \""forget\"" previous measurement attributes when `cumulative` temporality is used, this means the cardinality of the measurements allocated is directly correlated with the unique URIs handled. If the query string is constantly random, this will result in a constant increase in memory allocation that can be used in a denial-of-service attack.\n\nPseudo-attack:\n```\nfor infinite loop {\n r := generate_random_string()\n do_http_request(\""/some/path?random=\""+r)\n}\n```\n\n### Patches\n- `go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp` - v0.39.0\n- `go.opentelemetry.io/contrib/instrumentation/github.com/astaxie/beego/otelbeego` - v0.39.0\n\n[^1]: https://github.com/open-telemetry/opentelemetry-go/blob/6cb5718eaaed5c408c3bf4ad1aecee5c20ccdaa9/semconv/internal/v2/http.go#L202-L208""}","{""Summary"":""Denial of service in go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp"",""Description"":""The otelhttp package of opentelemetry-go-contrib is vulnerable to a denial-of-service attack. The otelhttp package uses the httpconv.ServerRequest function to annotate metric measurements for the http.server.request_content_length, http.server.response_content_length, and http.server.duration instruments. The ServerRequest function sets the http.target attribute value to be the whole request URI (including the query string). The metric instruments do not \""forget\"" previous measurement attributes when \""cumulative\"" temporality is used, meaning that the cardinality of the measurements allocated is directly correlated with the unique URIs handled. If the query string is constantly random, this will result in a constant increase in memory allocation that can be used in a denial-of-service attack.""}"
"{""Module"":""github.com/cometbft/cometbft"",""Description"":""### Impact\nAn internal modification to the way struct `PeerState` is serialized to JSON introduced a deadlock when new function MarshallJSON is called. This function can be called from two places:\n\n1. Via logs\n * Setting the `consensus` logging module to \""debug\"" level (should not happen in production), and\n * Setting the log output format to JSON\n2. Via RPC `dump_consensus_state` \n\nCase 1 above, which should not be hit in production, will eventually hit the deadlock in most goroutines, effectively halting the node.\n\nIn case 2, only the data structures related to the first peer will be deadlocked, together with the thread(s) dealing with the RPC request(s). This means that only one of the channels of communication to the node's peers will be blocked. Eventually the peer will timeout and excluded from the list (typically after 2 minutes). The goroutines involved in the deadlock will not be garbage collected, but they will not interfere with the system after the peer is excluded.\n\nThe theoretical worst case for case 2, is a network with only two validator nodes. In this case, each of the nodes only has one `PeerState` struct. If `dump_consensus_state` is called in either node (or both), the chain will halt until the peer connections time out, after which the nodes will reconnect (with different `PeerState` structs) and the chain will progress again. Then, the same process can be repeated.\n\nAs the number of nodes in a network increases, and thus, the number of peer struct each node maintains, the possibility of reproducing the perturbation visible with 2 nodes decreases. Only the first `PeerState` struct will deadlock, and not the others (RPC `dump_consensus_state` accesses them in a for loop, so the deadlock at the first iteration causes the rest of the iterations of that \""for\"" loop to never be reached).\n\nThis regression was introduced in versions `v0.34.28` and `v0.37.1`, and will be fixed in `v0.34.29` and `v0.37.2`.\n\n### Patches\nThe PR containing the fix is [here](https://github.com/cometbft/cometbft/pull/865), and the corresponding issue is [here](https://github.com/cometbft/cometbft/pull/863)\n\n### Workarounds\nFor case 1 (hitting the deadlock via logs)\n* either don't set the log output to \""json\"", leave at \""plain\"",\n* or don't set the consensus logging module to \""debug\"", leave it at \""info\"" or higher.\n\nFor case 2 (hitting the deadlock via RPC `dump_consensus_state`)\n* do not expose `dump_consensus_state` RPC endpoint to the public internet (e.g., via rules in your nginx setup)\n\n### References\n\n* [Issue](https://github.com/cometbft/cometbft/pull/863) that introduced the deadlock\n* [Issue](https://github.com/cometbft/cometbft/pull/524) reporting the bug via logs\n""}","{""Summary"":""Deadlock in github.com/cometbft/cometbft/consensus"",""Description"":""An internal modification to the way PeerState is serialized to JSON introduced a deadlock when the new function MarshalJSON is called. This function can be called in two ways. The first is via logs, by setting the consensus logging module to \""debug\"" level (which should not happen in production), and setting the log output format to JSON. The second is via RPC dump_consensus_state.""}"
"{""Module"":""helm.sh/helm/v3"",""Description"":""Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the `_repo_` package that can cause a segmentation violation. Applications that use functions from the `_repo_` package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.\n\n### Impact\n\nThe `_repo_` package contains a handler that processes the index file of a repository. For example, the Helm client adds references to chart repositories where charts are managed. The `_repo_` package parses the index file of the repository and loads it into structures Go can work with. Some index files can cause array data structures to be created causing a memory violation.\n\nApplications that use the `_repo_` package in the Helm SDK to parse an index file can suffer a Denial of Service when that input causes a panic that cannot be recovered from.\n\nThe Helm Client will panic with an index file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.\n\n### Patches\n\nThis issue has been resolved in 3.10.3. \n\n### Workarounds\n\nSDK users can validate index files that are correctly formatted before passing them to the `_repo_` functions.\n\n### For more information\n\nHelm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored by CNCF.""}","{""Summary"":""Denial of service via repository index file in helm.sh/helm/v3"",""Description"":""Applications that use the repo package in the Helm SDK to parse an index file can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The repo package contains a handler that processes the index file of a repository. For example, the Helm client adds references to chart repositories where charts are managed. The repo package parses the index file of the repository and loads it into memory. Some index files can cause array data structures to be created causing a memory violation. The Helm Client will panic with an index file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.""}"
"{""Module"":""github.com/tendermint/tendermint"",""Description"":""### Description \n\nTendermint Core v0.34.0 introduced a new way of handling evidence of misbehavior. As part of this, [we added a new `Timestamp` field to `Evidence` structs](https://github.com/tendermint/tendermint/pull/5219). This timestamp would be calculated using the same algorithm that is used when a block is created and proposed. (This algorithm relies on the timestamp of the last commit from this specific block.) \n\nIn Tendermint Core v0.34.0-v0.34.2, the `consensus` reactor is responsible for forming `DuplicateVoteEvidence` whenever double signs are observed. However, the current block is still “in flight” when it is being formed by the `consensus` reactor. It hasn’t been finalized through network consensus yet. This means that different nodes in the network may observe different “last commits” when assigning a timestamp to `DuplicateVoteEvidence.`\n\nIn turn, different nodes could form `DuplicateVoteEvidence` objects at the same height but with different timestamps. One `DuplicateVoteEvidence` object (with one timestamp) will then eventually get finalized in the block, but this means that any `DuplicateVoteEvidence` with a different timestamp is considered invalid. Any node that formed invalid `DuplicateVoteEvidence` will continue to propose invalid evidence; its peers may see this, and choose to disconnect from this node. This bug means that double signs are DoS vectors in Tendermint Core v0.34.0-v0.34.2. \n\nTendermint Core v0.34.3 is a security release which fixes this bug. As of v0.34.3, `DuplicateVoteEvidence` is no longer formed by the `consensus` reactor; rather, the `consensus` reactor passes the `Vote`s themselves into the `EvidencePool`, which is now responsible for forming `DuplicateVoteEvidence`. The `EvidencePool` has timestamp info that should be consistent across the network, which means that `DuplicateVoteEvidence` formed in this reactor should have consistent timestamps. \n\nThis release changes the API between the `consensus` and `evidence` reactors. \n\n### Impact\n\nThis is a denial-of-service vector which impacts networks running Tendermint Core v0.34.0 - v0.34.2.\n\n### Remediation\n\nThis problem has been patched in Tendermint Core v0.34.3. Networks running impacted versions of Tendermint Core should update immediately.\n\n### Workarounds\n\nThere are no workarounds, other than upgrading to a patched version of Tendermint Core.\n\n### Credits \n\n* Crypto.com (@cyril-crypto, @brianatcrypto, @tomtau and @yihuang) for finding and submitting this vulnerability\n* @melekes and @cmwaters for identifying the root cause and patching the problem \n\n### For more information\n\nIf you have any questions or comments about this advisory:\n* Open an issue in [tendermint/tendermint](https://github.com/tendermint/tendermint)\n* Email us at [security@tendermint.com](mailto:security@tendermint.com)""}","{""Summary"":""Uncontrolled resource consumption during consensus in github.com/tendermint/tendermint"",""Description"":""Mishandling of timestamps during consensus process can cause a denial of service. While reaching consensus, different tendermint nodes can observe a different timestamp for a consensus evidence. This mismatch can cause the evidence to be invalid, upon which the node producing the evidence will be asked to generate a new evidence. This new evidence will be the same, which means it will again be rejected by other nodes involved in the consensus. This loop will continue until the peer nodes decide to disconnect from the node producing the evidence.""}"
"{""Module"":""github.com/libp2p/go-libp2p"",""Description"":""### Summary\nIn go-libp2p, by using signed peer records a malicious actor can store an arbitrary amount of data in a remote node’s memory. This memory does not get garbage collected and so the victim can run out of memory and crash.\n\nIt is feasible to do this at scale. An attacker would have to transfer ~1/2 as much memory it wants to occupy (2x amplification factor).\n\nThe attacker can perform this attack over time as the target node’s memory will not be garbage collected.\n\nThis can occur because when a signed peer record is received, only the signature validity check is performed but the sender signature is not checked. Signed peer records from randomly generated peers can be sent by a malicious actor. A target node will accept the peer record as long as the signature is valid, and then stored in the peer store.\n\nThere is cleanup logic in the peer store that cleans up data when a peer disconnects, but this cleanup is never triggered for the fake peer (from which signed peer records were accepted) because it was never “connected”.\n\n### Impact\nIf users of go-libp2p in production are not monitoring memory consumption over time, it could be a silent attack i.e. the attacker could bring down nodes over a period of time (how long depends on the node resources i.e. a go-libp2p node on a virtual server with 4 gb of memory takes about 90 sec to bring down; on a larger server, it might take a bit longer.)\n\n### Patches\nUpdate your go-libp2p dependency to the latest release, v0.30.0 at the time of writing.\n\nIf you'd like to stay on the 0.27.x release, we strongly recommend users to update to go-libp2p [0.27.7](https://github.com/libp2p/go-libp2p/releases/tag/v0.27.7). Though this OOM issue was fixed in 0.27.4, there were subsequent patch releases afterwards (important fixes for other issues unrelated to the OOM).\n\n### Workarounds\nNone""}","{""Summary"":""libp2p nodes vulnerable to OOM attack"",""Description"":""A malicious actor can store an arbitrary amount of data in the memory of a remote node by sending the node a message with a signed peer record. Signed peer records from randomly generated peers can be sent by a malicious actor. This memory does not get garbage collected and so the remote node can run out of memory (OOM).""}"
"{""Module"":""github.com/goreleaser/nfpm/v2"",""Description"":""### Summary\nWhen building packages directly from source control, file permissions on the checked-in files are not maintained. \n\n### Details\nWhen building packages directly from source control, file permissions on the checked-in files are not maintained. When nfpm packaged the files (without extra config for enforcing its own permissions) files could go out with bad permissions (chmod 666 or 777).\n\n### PoC\nCreate a default nfpm structure. \n\nWithin the test folder, create 3 files named `chmod-XXX.sh`. Each script has file \npermissions set corresponding with their file names (`chmod-777.sh` = `chmod 777`). Below each \nfile and permissions can be seen.\n\n```console\n$ ls -lart test \ntotal 24\n-rwxrwxrwx 1 user group 11 May 19 13:15 chmod-777.sh\n-rw-rw-rw- 1 user group 11 May 19 13:16 chmod-666.sh\ndrwxr-xr-x 5 user group 160 May 19 13:19 .\n-rw-rw-r-- 1 user group 11 May 19 13:19 chmod-664.sh\ndrwxr-xr-x 10 user group 320 May 19 13:29 ..\n```\n\nBelow is the snippet nfpm configuration file of the contents of the package. The test folder \nand files has no extra config for enforcing permissions. \n\n```yaml\ncontents:\n- src: foo-binary\n dst: /usr/bin/bar\n- src: bar-config.conf\n dst: /etc/foo-binary/bar-config.conf\n type: config\n- src: test\n dst: /etc/test/scripts\n```\n\nThe next step is to create a deb package.\n\n```console\n$ nfpm package -p deb # Create dep package\nusing deb packager...\ncreated package: foo_1.0.0_arm64.deb\n```\n\nWhen on a Ubuntu VM, install the foo package which was created\n\n```console\n$ sudo dpkg -i foo_1.0.0_arm64.deb # Installing deb package within Ubuntu\nSelecting previously unselected package foo.\n(Reading database ... 67540 files and directories currently installed.)\nPreparing to unpack foo_1.0.0_arm64.deb ...\nUnpacking foo (1.0.0) ...\nSetting up foo (1.0.0) ...\n```\n\nLooking at `/etc/test/scripts` and viewing the permissions. Permissions are passed exactly the same as the source.\n\n```console\n$ ls -lart /etc/test/scripts\ntotal 20\n-rwxrwxrwx 1 root root 11 May 22 12:15 chmod-777.sh\n-rw-rw-rw- 1 root root 11 May 22 12:16 chmod-666.sh\n-rw-rw-r-- 1 root root 11 May 22 12:19 chmod-664.sh\ndrwxr-xr-x 3 root root 4096 May 22 13:00 ..\ndrwxr-xr-x 2 root root 4096 May 22 13:00 .\n```\n\n\n## Solution\nTo prevent world-writable files from making it into the packages, add the ability to override the default permissions of packaged files using a umask config option in the packaging spec file. This feature in nfpm would allow applying a global umask across any files being packaged, therefore, with the correct configuration, preventing world-writable files without needing to list permissions on each and every file in the package\n\n\n### Impact\n\nVulnerability is https://cwe.mitre.org/data/definitions/276.html\nhttps://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\n\nAnyone using nfpm for creating packages and not checking/setting file permissions before packaging could result in bad permissions for files/folders.""}","{""Summary"":""Incorrect permissions in github.com/goreleaser/nfpm/v2"",""Description"":""When nfpm packages files without additional configuration to enforce its own permissions, the files could be packaged with incorrect permissions (chmod 666 or 777). Anyone who uses nfpm to create packages and does not check or set file permissions before packaging could result in files or folders being packaged with incorrect permissions.""}"
"{""Module"":""github.com/ipfs/go-bitfield"",""Description"":""### Impact\nWhen feeding untrusted user input into the size parameter of `NewBitfield` and `FromBytes` functions, an attacker can trigger `panic`s.\n\nThis happen when the `size` is a not a multiple of `8` or is negative.\nThere were already a note in the `NewBitfield` documentation:\n\u003e ```\n\u003e Panics if size is not a multiple of 8.\n\u003e ````\n\nBut it incomplete and missing from `FromBytes`'s documentation.\n\nThis has been replaced by returning an `(Bitfield, error)` and returning a non nil error if the size is wrong.\n\n### Patches\n- https://github.com/ipfs/go-bitfield/commit/5e1d256fe043fc4163343ccca83862c69c52e579\n\n### Workarounds\n- Ensure `size%8 == 0 \u0026\u0026 size \u003e= 0` yourself before calling `NewBitfield` or `FromBytes`\n\n### References\n- https://github.com/ipfs/go-unixfs/security/advisories/GHSA-q264-w97q-q778\n""}","{""Summary"":""Denial of service via malformed size parameters in github.com/ipfs/go-bitfield"",""Description"":""When feeding untrusted user input into the size parameter of `NewBitfield` and FromBytes functions, an attacker can trigger panics. This happens when the size is a not a multiple of 8 or is negative. A workaround is to ensure size%8 == 0 \u0026\u0026 size \u003e= 0 yourself before calling NewBitfield or FromBytes.""}"
"{""Module"":""helm.sh/helm/v3"",""Description"":""Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the `_chartutil_` package that can cause a segmentation violation. Applications that use functions from the `_chartutil_` package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.\n\n### Impact\n\nThe `_chartutil_` package contains a parser that loads a JSON Schema validation file. For example, the Helm client when rendering a chart will validate its values with the schema file. The `_chartutil_` package parses the schema file and loads it into structures Go can work with. Some schema files can cause array data structures to be created causing a memory violation.\n\nApplications that use the `_chartutil_` package in the Helm SDK to parse a schema file can suffer a Denial of Service when that input causes a panic that cannot be recovered from.\n\nThe Helm Client will panic with a schema file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.\n\n### Patches\n\nThis issue has been resolved in 3.10.3. \n\n### Workarounds\n\nSDK users can validate schema files that are correctly formatted before passing them to the `_chartutil_` functions.\n\n### For more information\n\nHelm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored by CNCF.""}","{""Summary"":""Denial of service via schema file in helm.sh/helm/v3"",""Description"":""Certain JSON schema validation files can cause a Helm Client to panic, leading to a possible denial of service. The chartutil package contains a parser that loads a JSON Schema validation file. For example, the Helm client when rendering a chart will validate its values with the schema file. The chartutil package parses the schema file and loads it into memory, but some schema files can cause array data structures to be created causing a memory violation. The Helm Client will panic with a schema file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.""}"
"{""Module"":""github.com/codenotary/immudb"",""Description"":""### Impact\n\nIn certain scenario a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operations resulting in acceptance of an invalid state value.\n\nThis vulnerability only affects immudb client SDKs, the immudb server itself is not affected by this vulnerability.\n\n### Detailed description\n\nimmudb uses Merkle Tree enhanced with additional linear part to perform consistency proofs between two transactions. The linear part is built from the last leaf node of the Merkle Tree compensating for transactions that were not yet consumed by the Merkle Tree calculation.\n\nThe Merkle Tree part is then used to perform proofs for things that are in transaction range covered by the Merkle Tree where the linear part is used to check those that are not yet in the Merkle Tree.\n\nWhen doing consistency checks between two immudb states, the linear proof part is not fully checked. In fact only the first (last Merkle Tree leaf) and the last (current DB state value) are checked against new Merkle Tree without ensuring that elements in the middle of that chain are correctly added as Merkle Tree leafs.\n\nThis lack of check means that the database can present different set of hashes on the linear proof part to what would later be used once those become part of the Merkle Tree. This property can be exploited by the database to expose two different transaction entries depending on the other transaction that the user requested consistency proof for.\n\nIn practice this could lead to a following scenario:\n\n* a client requests a verified write operation\n* the server responds with a proof for the transaction\n* client stores the state value retrieved from the server and expects it to be a confirmation of that write and all the history of the database before that transaction\n* a series of validated read / write operations is performed by the client, each accompanied by a successfully validated consistency proof and update of the client state\n* the client requests verified get operation on the transaction it has written before (and that was verified with a proof from the server)\n* the server replies with a completely different transaction that can be properly validated according to the currently stored db state on the client side\n\n### Patches\n\nThe following Go SDK versions is not vulnerable:\n\n| **SDK** | **Version** |\n|-------|------------|\n| [go](pkg.go.dev/github.com/codenotary/immudb/pkg/client) | 1.4.1 |\n\n### Workarounds\n\nInvalid proofs can not be generated in a normal immudb server and will be detected by a genuine replica server.\nTo ensure that the server does not produce invalid proofs and to check that the history presented by the server\ndoes not contain falsified transactions, one should run a genuine immudb replica server in a safe environment\nand fully synchronize all databases with the primary.\n\n### References\n\n* https://github.com/codenotary/immudb/tree/master/docs/security/vulnerabilities/linear-fake\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Open a discussion in [immudb Discussions](https://github.com/codenotary/immudb/discussions/new)\n* Email us at [immudb-security@codenotary.com](mailto:immudb-security@codenotary.com)\n""}","{""Summary"":""Insufficient verification of proofs in github.com/codenotary/immudb"",""Description"":""In certain scenarios, a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operations resulting in acceptance of an invalid state value. This vulnerability only affects immudb client SDKs, the immudb server itself is not affected by this vulnerability.""}"
"{""Module"":""github.com/containernetworking/cni"",""Description"":""An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as \""../\"" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.""}","{""Summary"":""Improper limitation of path name in github.com/containernetworking/cni"",""Description"":""The FindInPath function is vulnerable to directory traversal attacks, potentially permitting attackers to execute arbitrary binaries. This function does not sanitize its plugin parameter, so parameter names containing \""../\"" or other such elements may reference arbitrary locations on the filesystem.""}"
"{""Module"":""github.com/pion/dtls/v2"",""Description"":""### Impact\nA DTLS Client could provide a Certificate that it doesn't posses the private key for and Pion DTLS wouldn't reject it. \n\nThis issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can't be trusted when using a Pion DTLS server prior to v2.1.5\n\n### Patches\nUpgrade to Pion DTLS v2.1.5\n\n### Workarounds\nNo workarounds available, upgrade to Pion DTLS v2.1.5\n\n### References\nThank you to [Juho Nurminen](https://github.com/jupenur) and the Mattermost team for discovering and reporting this. \n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [Pion DTLS](http://github.com/pion/dtls)\n* Email us at [team@pion.ly](mailto:team@pion.ly)""}","{""Summary"":""Improper validation of client certificates in github.com/pion/dtls/v2"",""Description"":""Client-provided certificates are not correctly validated, and must not be trusted. DTLS client certificates must be accompanied by proof that the client possesses the private key for the certificate. The Pion DTLS server accepted client certificates unaccompanied by this proof, permitting an attacker to present any certificate and have it accepted as valid.""}"
"{""Module"":""mellium.im/sasl"",""Description"":""An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication.""}","{""Summary"":""Authentication failure in mellium.im/sasl"",""Description"":""An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication.""}"
"{""Module"":""github.com/crossplane/crossplane-runtime"",""Description"":""### Summary\n\nFuzz testing on `crossplane/crossplane`, by Ada Logics and sponsored by the CNCF, identified input to a function in the `fieldpath` package that can cause an out of memory panic. Applications that use the `Paved` type's `SetValue` method with user provided input without proper validation might use excessive amounts of memory and cause an out of memory panic.\n\n### Details\n\nIn the `fieldpath` package, the `SetValue` method of the `Paved` type sets a value on the inner object according to the provided path, without validating it first. This allows setting values in slices at any specific index and the code will grow the target array up to the required size. The index is currently capped at max uint32 (4294967295) given how indexes are parsed, but that is still an unnecessarily large value.\n\n### Workaround\n\nUsers can parse and validate the path before passing it to the `SetValue` method of the `Paved` type, constraining the index size as deemed appropriate.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored by CNCF.""}","{""Summary"":""Out-of-memory panic in github.com/crossplane/crossplane-runtime"",""Description"":""An out of memory panic vulnerability exists in the crossplane-runtime libraries. Applications that use the Paved type's SetValue method with user-provided input that is not properly validated might use excessive amounts of memory and cause an out of memory panic. In the fieldpath package, the Paved.SetValue method sets a value on the Paved object according to the provided path, without any validation. This allows setting values in slices at any provided index, which grows the target array up to the requested index. The index is currently capped at max uint32 (4294967295), a large value. If callers do not validate paths' indexes on their own, this could allow users to consume arbitrary amounts of memory. Applications that do not use the Paved type's SetValue method are not affected. Users unable to upgrade can work around this issue by parsing and validating the path before passing it to the SetValue method of the Paved type, constraining the index size as deemed appropriate.""}"
"{""Module"":""helm.sh/helm/v3"",""Description"":""Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the `_strvals_` package that can cause an out of memory panic. Out of memory panics cannot be recovered from. Applications that use functions from the `_strvals_` package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.\n\n### Impact\n\nThe `_strvals_` package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like `--set`, `--set-string`, and others that enable the user to pass in strings that are merged into the values. The `_strvals_` package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic.\n\nApplications that use the `_strvals_` package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from.\n\nThe Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.\n\n### Patches\n\nThis issue has been resolved in 3.9.4. \n\n### Workarounds\n\nSDK users can validate strings supplied by users won't create large arrays causing significant memory usage before passing them to the `_strvals_` functions.\n\n### For more information\n\nHelm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored by CNCF.""}","{""Summary"":""Denial of service through string value parsing in helm.sh/helm/v3"",""Description"":""Applications that use the strvals package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The strvals package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like --set, --set-string, and others that enable the user to pass in strings that are merged into the values. The strvals package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. The Helm Client will panic with input to --set, --set-string, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.""}"
"{""Module"":""github.com/codenotary/immudb"",""Description"":""### Impact\n\nimmudb client SDKs use server's UUID to distinguish between different server instance so that the client can connect to different immudb instances and keep the state for multiple servers. SDK does not validate this uuid and can accept any value reported by the server. A malicious server can change the reported UUID tricking the client to treat it as a different server thus accepting a state completely irrelevant to the one previously retrieved from the server.\n\n### Patches\n\nThe following Go SDK versions are not vulnerable:\n\n| **SDK** | **Version** |\n|-------|------------|\n| [go](pkg.go.dev/github.com/codenotary/immudb/pkg/client) | 1.4.1 |\n\n### Workarounds\n\nWhen initializing an immudb client object, a custom state handler can be used to store the state. Providing custom implementation that ignores the server UUID can be used to ensure that even if the server changes the UUID, client will still consider it to be the same server.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Open a discussion in [immudb Discussions](https://github.com/codenotary/immudb/discussions/new)\n* Email us at [immudb-security@codenotary.com](mailto:immudb-security@codenotary.com)\n""}","{""Summary"":""Improper validation of UUIDs in github.com/codenotary/immudb"",""Description"":""A malicious server can trick a client into treating it as a different server by changing the reported UUID. immudb client SDKs use the server's UUID to distinguish between different server instance so that the client can connect to different immudb instances and keep the state for multiple servers. The SDK does not validate this UUID and accepts any value reported by the server. A malicious server can therefore change the reported UUID and trick the client into treating it as a different server.""}"
|
data
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/genai/data/example_prompt.txt
|
You are an expert computer security researcher. You are helping the Go programming language security team write high-quality, correct, and
concise summaries and descriptions for the Go vulnerability database.
Given an affected module and a description of a vulnerability, output a JSON object containing 1) Summary: a short phrase identifying the core vulnerability, ending in the module name, and 2) Description: a plain text, one-to-two paragraph description of the vulnerability, omitting version numbers, written in the present tense that highlights the impact of the vulnerability. The description should be concise, accurate, and easy to understand. It should also be written in a style that is consistent with the existing Go vulnerability database.
input: {"Module":"github.com/docker/distribution","Description":"### Impact\n\nSystems that rely on digest equivalence for image attestations may be vulnerable to type confusion.\n\n### Patches\n\nUpgrade to at least `v2.8.0-beta.1` if you are running `v2.x` release. If you use the code from the `main` branch, update at least to the commit after [b59a6f827947f9e0e67df0cfb571046de4733586](https://github.com/distribution/distribution/commit/b59a6f827947f9e0e67df0cfb571046de4733586).\n\n### Workarounds\n\nThere is no way to work around this issue without patching.\n\n### References\n\nDue to [an oversight in the OCI Image Specification](https://github.com/opencontainers/image-spec/pull/411) that removed the embedded `mediaType` field from manifests, a maliciously crafted OCI Container Image can cause registry clients to parse the same image in two different ways without modifying the image’s digest by modifying the `Content-Type` header returned by a registry. This can invalidate a common pattern of relying on container image digests for equivalence.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n* Open an issue in [distribution](https://github.com/distribution/distribution) \n* Open an issue in [distribution-spec](https://github.com/opencontainers/distribution-spec) \n* Email us at [cncf-distribution-security@lists.cncf.io](mailto:cncf-distribution-security@lists.cncf.io)\n"}
output: {"Summary":"Type confusion in github.com/docker/distribution","Description":"Systems that rely on digest equivalence for image attestations may be vulnerable to type confusion. A maliciously crafted OCI Container Image can cause registry clients to parse the same image in two different ways without modifying the image's digest, invalidating the common pattern of relying on container image digests for equivalence. This problem has been addressed in newer versions by improving validation in manifest unmarshalling."}
input: {"Module":"github.com/pomerium/pomerium","Description":"### Impact\nChanges to the OIDC claims of a user after initial login are not reflected in policy evaluation when using [`allowed_idp_claims`](https://www.pomerium.com/reference/#allowed-idp-claims) as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions.\n\n### Patches\nv0.15.6\n\n### Workarounds\n- Clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated\n\n### References\nhttps://github.com/pomerium/pomerium/pull/2724\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [Pomerium](https://github.com/pomerium/pomerium)\n* Email us at [security@pomerium.com](mailto:security@pomerium.com)\n"}
output: {"Summary":"Incorrect authorization in github.com/pomerium/pomerium","Description":"Pomerium is an open source identity-aware access proxy. Changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using allowed_idp_claims as part of policy. If using allowed_idp_claims and a user's claims are changed, Pomerium can make incorrect authorization decisions. For users unable to upgrade clear data on databroker service by clearing redis or restarting the in-memory databroker to force claims to be updated."}
input: {"Module":"github.com/blevesearch/bleve","Description":"### Impact\n_What kind of vulnerability is it? Who is impacted?_\n\nBleve includes HTTP utilities under bleve/http package, that are used by its sample application. \n(https://github.com/blevesearch/bleve-explorer)\nThese HTTP methods paves way for exploitation of a node’s filesystem where the bleve index resides, \nif the user has used bleve’s own HTTP (bleve/http) handlers for exposing the access to the indexes. \nFor instance, the CreateIndexHandler (http/index_create.go) and DeleteIndexHandler (http/index_delete.go) \nenable an attacker to create a bleve index (directory structure) anywhere where the user running the server \nhas the write permissions and to delete recursively any directory owned by the same user account.\n \nUsers who have used the bleve/http package for exposing access to bleve index without the explicit \nhandling for the Role Based Access Controls(RBAC) of the index assets would be impacted.\n\n\n### Patches\n_Has the problem been patched? What versions should users upgrade to?_\n\n**No**. The http package is purely intended to be used for demonstration purposes. \nAnd bleve is never designed to be handling the RBACs or it was ever advertised to be used in that way. \nHence the collaborators of this project have decided to stay away from adding any authentication or \nauthorization to bleve project at the moment.\n\n### Workarounds\n_Is there a way for users to fix or remediate the vulnerability without upgrading?_\n\nThe bleve/http package is mainly for demonstration purposes and it lacks exhaustive validation of the user \ninputs as well as any authentication and authorization measures. \nSo it is recommended to not use that in production use cases.\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue [here](https://github.com/blevesearch/bleve/issues).\n* Email us at [mailto:security@couchbase.com, fts-team@couchbase.com].\n"}
output: {"Summary":"No access control in github.com/blevesearch/bleve and bleve/v2","Description":"HTTP handlers provide unauthenticated access to the local filesystem. The Bleve http package is intended for demonstration purposes and contains no authentication, authorization, or validation of user inputs. Exposing handlers from this package can permit attackers to create files and delete directories."}
input: {"Module":"github.com/cloudflare/circl","Description":"### Impact\nWhen sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether `crypto/rand.Read()` returns an error. In rare deployment cases (error thrown by the `Read()` function), this could lead to a predictable shared secret.\n\nThe tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides `crypto/rand.Reader`, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.\n\n\n### Patches\nThe fix was introduced in CIRCL v. 1.3.3\n"}
output: {"Summary":"Leaked shared secret and weak blinding in github.com/cloudflare/circl","Description":"When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret. The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20."}
input: {"Module":"github.com/libp2p/go-libp2p","Description":"### Impact\nVersions older than `v0.18.0` of go-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of go-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack.\n\nIn the original version of the attack, the malicious node would continue opening new streams on a stream multiplexer that doesn’t provide sufficient back pressure (yamux or mplex). It is easy to defend against this one attack, but there are countless variations of this attack:\n* Opening streams and causing a non-trivial memory allocation (e.g., for multistream or protobuf parsing)\n* Creating a lot of sybil nodes and opening new connections across nodes\n\n### Patches (What to do as a go-libp2p consumer:)\n1. Update your go-libp2p dependency to go-libp2p v0.18.0 or greater (current version as of publish date is [v0.24.0](https://github.com/libp2p/go-libp2p/releases/tag/v0.24.0).)\n - Note: **It's recommend that you update to `v0.21.0` onwards** as you’ll get some useful functionality that will help in production environments like better metrics around resource usage, Grafana dashboards around resource usage, allow list support, and default autoscaling limits. [Please see the v0.21.0 release notes for more info.](https://github.com/libp2p/go-libp2p/releases/tag/v0.21.0))\n\n2. Determine appropriate limits for your application - go-libp2p sets up a resource manager with the default limits if none are provided. For default definitions please see [limits_defaults.go](https://github.com/libp2p/go-libp2p/blob/master/p2p/host/resource-manager/limit_defaults.go). These limits are also set to automatically scale, this is done using the [AutoScale method of the ScalingLimitConfig](https://github.com/libp2p/go-libp2p/blob/master/p2p/host/resource-manager/README.md#scaling-limits). We recommend you [tune your limits as described here](https://github.com/libp2p/go-libp2p/blob/master/p2p/host/resource-manager/README.md#how-to-tune-your-limits).\n\n3. Configure your node to be attack resilient. See [how to respond to an attack and identify misbehaving peers here](https://docs.libp2p.io/concepts/security/dos-mitigation/#responding-to-an-attack). Then setup automatic blocking with fail2ban using canonical libp2p log lines: [guide on how to do so here](https://docs.libp2p.io/concepts/security/dos-mitigation/#how-to-automate-blocking-with-fail2ban).\n\n#### Examples\n* Lotus’ integration can be found in https://github.com/filecoin-project/lotus/blob/master/node/modules/lp2p/rcmgr.go. Lotus reads user-configured resource limits from a limits.json file into the root directory. This allows users to share their resource manager configuration independent of any other configurations.\n* Kubo’s (formerly go-ipfs) integration can be found in https://github.com/ipfs/go-ipfs/blob/master/core/node/libp2p/rcmgr.go. Kubo reads the limits from the IPFS config file.\n\n**Note:** go-libp2p still implements the [connection manager](https://github.com/libp2p/go-libp2p/tree/master/p2p/net/connmgr) mentioned above. The connection manager is a component independent of the resource manager, which aims to keep the number of libp2p connections between a low and a high watermark. When modifying connection limits, it’s advantageous to keep the configuration of these components consistent, i.e., when setting a limit of N concurrent connections in the resource manager, the high watermark should be at most (and ideally slightly less) than N.\n\n### Workarounds\nAlthough there are no workarounds within go-libp2p, some range of attacks can be mitigated using OS tools (like manually blocking malicious peers using `iptables` or `ufw` ) or making use of a load balancer in front of libp2p nodes.\n\nHowever these require direct action \u0026 responsibility on your part and are no substitutes for upgrading go-libp2p. Therefore, we highly recommend upgrading your go-libp2p version for the way it enables tighter scoped limits and provides visibility into and easier reasoning about go-libp2p resource utilization.\n\n### References\nPlease see our DoS Mitigation page for more information on how to incorporate mitigation strategies, monitor your application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/. \n\nPlease see the related disclosure for rust-libp2p: https://github.com/libp2p/rust-libp2p/security/advisories/GHSA-jvgw-gccv-q5p8 and js-libp2p: https://github.com/libp2p/js-libp2p/security/advisories/GHSA-f44q-634c-jvwv\n\n#### For more information\n\nIf you have any questions or comments about this advisory email us at [security@libp2p.io](mailto:security@libp2p.io)"}
output: {"Summary":"Resource exhaustion in github.com/libp2p/go-libp2p","Description":"go-libp2p is vulnerable to targeted resource exhaustion attacks. These attacks target libp2p's connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory ultimately leading to the process getting killed by the host's operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of go-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack. It's recommend to update to v0.21.0 onwards to get some useful functionality that will help in production environments like better metrics around resource usage, Grafana dashboards around resource usage, allow list support, and default autoscaling limits."}
input: {"Module":"github.com/supranational/blst","Description":"### Impact\n\nBlst versions v0.3.0 through 0.3.10 failed to perform a signature group-check if the call to `SigValidate` in the Go bindings was complemented with a check for infinity. Formally speaking, infinity, or the identity element of the elliptic curve group, is a member of the group, and the group-check should allow it. An initial review of blst users on GitHub did not uncover any use of this function with the complementary infinity check. This optional check was added as a convenience feature because despite infinity being a legitimate member of the group, individual signatures should never be infinite (as it is equivalent to having zero for the secret key), and observing one should raise a flag.\n\n### Description\n\nThe vulnerable function is declared as `SigValidate(sigInfcheck bool) bool` and if called with `sigInfcheck` argument set to `true`, the group-check was omitted. The group-check is required to be performed on untrusted input, because the pairing, the corner-stone operation of the signature scheme, is defined only on points that are members of a specific cyclic group, which is a subset of all the possible points on elliptic curves in question. Submitting an untrusted point outside the group opens up the possibility of accepting an alternative signature for a chosen message.\n\nIt should be noted that the SigValidate call is not the only way to perform the group-checks. There are optional checks integrated into various other verification methods, such as `Verify`, `AggregateVerify`, etc., as well as signature aggregation methods, such as `PairingAggregate*`. The reason why there are multiple options is that the group-check is a relatively expensive operation, and application developers are arguably entitled the freedom to choose when it's performed.\n\n### Patches\n\nThis issue has been resolved in the v0.3.11 release and users are advised to update if their application is affected or alternatively omit the complementary infinity check.\n\n### Credits\n\nA special thanks to Yunjong Jeong (@blukat29) for the discovery and disclosure of this vulnerability.\n"}
output: {"Summary":"Blst fails to perform group signature validation","Description":"When complemented with a check for infinity, blst skips performing a signature group-check. Formally speaking, infinity is the identity element of the elliptic curve group and as such it is a member of the group, so the group-check should be performed. The fix performs the check even in the presence of infinity."}
input: {"Module":"github.com/argoproj/argo-cd/v2","Description":"### Impact\nAll versions of Argo CD starting with v2.6.0-rc1 have an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI). The user must have `applications, create` or `applications, update` RBAC access to reach the code which may produce the error.\n\nThe user is not guaranteed to be able to trigger the error message. They may attempt to spam the API with requests to trigger a rate limit error from the upstream repository. \n\nIf the user has `repositories, update` access, they may edit an existing repository to introduce a URL typo or otherwise force an error message. But if they have that level of access, they are probably intended to have access to the credentials anyway.\n\n### Patches\n\nA patch for this vulnerability has been released in the following Argo CD version:\n\n* v2.6.1\n\n### Workarounds\n\nThe only way to completely resolve the issue is to upgrade.\n\n#### Mitigations\n\nTo mitigate the issue, make sure that your repo credentials have only least necessary privileges. For example, the credentials should not have push access, and they should not have access to more resources than what Argo CD actually needs (for example, a whole GitHub org when only one repo is needed).\n\nTo further mitigate the impact of a leaked write-capable repo credential, you could [enable commit signature verification](https://argo-cd.readthedocs.io/en/stable/user-guide/gpg-verification/#enforcing-signature-verification). Even if someone could push a malicious commit, the commit would not by synced.\n\nYou should also enforce least privileges in Argo CD RBAC. Make sure users only have `repositories, update`, `applications, update`, or `applications, create` access if they absolutely need it.\n\n### References\n\n* The problem was initially reported in a [GitHub issue](https://github.com/argoproj/argo-cd/issues/12309)\n* [Argo CD RBAC configuration documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/)\n\n### For more information\n\n* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)\n* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd\n"}
output: {"Summary":"Repository access credential leak in github.com/argoproj/argo-cd/v2","Description":"Argo CD has an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI). The user must have `applications, create` or `applications, update` RBAC access to reach the code which may produce the error. The user is not guaranteed to be able to trigger the error message. They may attempt to spam the API with requests to trigger a rate limit error from the upstream repository. If the user has `repositories, update` access, they may edit an existing repository to introduce a URL typo or otherwise force an error message."}
input: {"Module":"github.com/ethereum/go-ethereum","Description":"### Impact\n\nA vulnerability in the Geth EVM could cause a node to reject the canonical chain. \n\n### Description \n\nA memory-corruption bug within the EVM can cause a consensus error, where vulnerable nodes obtain a different `stateRoot` when processing a maliciously crafted transaction. This, in turn, would lead to the chain being split in two forks.\n\nAll Geth versions supporting the London hard fork are vulnerable (which predates London), so all users should update.\n\nThis bug was exploited on Mainnet at block 13107518, leading to a minority chain split. \n\n### Patches\n\nA patch is included in the `v1.10.8` release.\nThe exact patch to fix the issue is contained within this [commit](https://github.com/ethereum/go-ethereum/pull/23381/commits/4d4879cafd1b3c906fc184a8c4a357137465128f)\n\n### Workarounds\n\nNo workarounds exist, save to update and/or apply the patch commit. \n\n### References. \n\nPost-mortem [write-up](https://github.com/ethereum/go-ethereum/blob/master/docs/postmortems/2021-08-22-split-postmortem.md).\n\n### Credits\n\nThe bug was found by @guidovranken (working for [Sentnl](https://sentnl.io/) during an audit of the [Telos EVM](https://www.telos.net/evm)) and reported via bounty@ethereum.org.\n\n### For more information\nIf you have any questions or comments about this advisory:\n\n* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum/)\n* Email us at [security@ethereum.org](mailto:security@ethereum.org)\n"}
output: {"Summary":"Consensus flaw during block processing in github.com/ethereum/go-ethereum","Description":"A vulnerability in the Geth EVM can cause a node to reject the canonical chain. A memory-corruption bug within the EVM can cause a consensus error, where vulnerable nodes obtain a different stateRoot when processing a maliciously crafted transaction. This, in turn, would lead to the chain being split in two forks."}
input: {"Module":"github.com/cometbft/cometbft","Description":"### Impact\n\nThe mempool maintains two data structures to keep track of outstanding transactions: a list and a map.\nThese two data structures are supposed to be in sync all the time in the sense that the map tracks the index (if any) of the transaction in the list. \n\nUnfortunately, it is possible to have them out of sync. When this happens, the list may contain several copies of the same transaction.\nBecause the map tracks a single index, it is then no longer possible to remove all the copies of the transaction from the list.\nThis happens even if the duplicated transaction is later committed in a block.\nThe only way to remove the transaction is by restarting the node.\n\nThese are the steps to cause the above duplication problem. Everything should happen within one height, that is no `FinalizeBlock` or `BeginBlock` ABCI calls should happen while these steps are reproduced:\n\n1. send transaction tx1 to the target full node via RPC\n2. send N more different transactions to the target full node, where N should be higher than the node's configured value for `cache_size` in `config.toml`\n3. send transaction tx1 again to the target full node\n\nOne of the copies of tx1 is now _stuck_ in the mempool's data structures. Effectively causing a memory leak, and having that node gossiping that transaction to its peers forever.\n\nThe above problem can be repeated on and on until a sizable number of transactions are stuck in the mempool, in order to try to bring down the target node.\n\nThis problem is present in releases: `v0.37.0`, and `v0.37.1`, as well as in `v0.34.28`, and all previous releases of the CometBFT repo. It will be fixed in releases `v0.34.29` and `v0.37.2`.\n\n### Patches\n\nThe PR containing the fix is [here](https://github.com/cometbft/cometbft/pull/890).\n\n\n### Workarounds\n\n* Increasing the value of `cache_size` in `config.toml` makes it very difficult to effectively attack a full node.\n* Not exposing the transaction submission RPC's would mitigate the probability of a successful attack, as the attacker would then have to create a modified (byzantine) full node to be able to perform the attack via p2p.\n\n### References\n\n* [PR](https://github.com/tendermint/tendermint/pull/2778) that introduced the map to track transactions in the mempool.\n* [PR](https://github.com/cometbft/cometbft/pull/890) containing the fix.\n"}
output: {"Summary":"Denial of service via OOM in github.com/cometbft/cometbft","Description":"A bug in the CometBFT middleware causes the mempool's two data structures to fall out of sync. This can lead to duplicate transactions that cannot be removed, even after they are committed in a block. The only way to remove the transaction is to restart the node. This can be exploited by an attacker to bring down a node by repeatedly submitting duplicate transactions."}
input: {"Module":"github.com/containers/buildah","Description":"A bug was found in Buildah where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2).\n\nThis bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set.\n"}
output: {"Summary":"Incorrect default permissions in github.com/containers/buildah","Description":"Containers are created with non-empty inheritable Linux process capabilities, permitting programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug does not affect the container security sandbox, as the inheritable set never contains more capabilities than are included in the container's bounding set."}
input: {"Module":"github.com/fluxcd/helm-controller/api","Description":"Flux controllers within the affected versions range are vulnerable to a denial of service attack. Users that have permissions to change Flux’s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout` (and structured variations of these fields), causing the entire object type to stop being processed.\n\nThe issue has two root causes: a) the Kubernetes type `metav1.Duration` not being fully compatible with the Go type `time.Duration` as explained on [upstream report](https://github.com/kubernetes/apimachinery/issues/131); b) lack of validation within Flux to restrict allowed values.\n\n### Workarounds\n\nAdmission controllers can be employed to restrict the values that can be used for fields `.spec.interval` and `.spec.timeout`, however upgrading to the latest versions is still the recommended mitigation.\n\n### Credits\n\nThis issue was reported by Alexander Block (@codablock) through the Flux security mailing list (as [recommended](https://fluxcd.io/security/#report-a-vulnerability)).\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n- Open an issue in any of the affected repositories.\n- Contact us at the CNCF Flux channel.\n\n### References\n\n- https://github.com/kubernetes/apimachinery/issues/131\n\n"}
output: {"Summary":"Denial of service in flux controllers in github.com/fluxcd modules","Description":"Flux controllers are vulnerable to a denial of service attack. Users that have permissions to change Flux's objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout` (and structured variations of these fields), causing the entire object type to stop being processed. The issue has two root causes: a) the Kubernetes type `metav1.Duration` is not fully compatible with the Go type `time.Duration` as explained in https://github.com/kubernetes/apimachinery/issues/131, and b) a lack of validation within Flux to restrict allowed values."}
input: {"Module":"helm.sh/helm/v3","Description":"Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the _strvals_ package that can cause a stack overflow. In Go, a stack overflow cannot be recovered from. Applications that use functions from the _strvals_ package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.\n\n### Impact\n\nThe _strvals_ package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like `--set`, `--set-string`, and others that enable the user to pass in strings that are merged into the values. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing a stack overflow.\n\nApplications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from.\n\nThe Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes a stack overflow. Helm is not a long running service so the panic will not affect future uses of the Helm client.\n\n### Patches\n\nThis issue has been resolved in 3.10.3. \n\n### Workarounds\n\nSDK users can validate strings supplied by users won't create large arrays causing significant memory usage before passing them to the _strvals_ functions.\n\n### For more information\n\nHelm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored by CNCF."}
output: {"Summary":"Denial of service in string value parsing in helm.sh/helm/v3","Description":"Applications that use the strvals package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes an error that cannot be recovered from. The strvals package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like --set, --set-string, and others that enable the user to pass in strings that are merged into the values. The strvals package converts these strings into structures Go can work with. Some string inputs can cause can cause a stack overflow to be created causing a stack overflow error. Stack overflow errors cannot be recovered from. The Helm Client will panic with input to --set, --set-string, and other value setting flags that causes a stack overflow. Helm is not a long running service so the error will not affect future uses of the Helm client."}
input: {"Module":"github.com/runatlantis/atlantis","Description":"The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 is vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge webhook events."}
output: {"Summary":"Timing attack in github.com/runatlantis/atlantis","Description":"Validation of Gitlab requests can leak secrets. The package github.com/runatlantis/atlantis/server/controllers/events uses a non-constant time comparison for secrets while validating a Gitlab request. This allows for a timing attack where an attacker can recover a secret and then forge the request."}
input: {"Module":"github.com/rancher/wrangler","Description":"### Impact\n\nA denial of services (DoS) vulnerability was discovered in Wrangler Git package affecting versions up to and including `v1.0.0`.\n\nSpecially crafted Git credentials can result in a denial of service (DoS) attack on an application that uses Wrangler due to the exhaustion of the available memory and CPU resources. This is caused by a lack of input validation of Git credentials before they are used, which may lead to a denial of service in some cases. This issue can be triggered when accessing both private and public Git repositories. \n\n### Workarounds\n\nA workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.\n\n### Patches\n\nPatched versions include `v1.0.1` and later and the backported tags - `v0.7.4-security1`, `v0.8.5-security1` and `v0.8.11`.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.\n* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) or [Wrangler](https://github.com/rancher/wrangler/issues/new) repository.\n* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/)."}
output: {"Summary":"Denial of service when processing Git credentials in github.com/rancher/wrangler","Description":"A denial of service (DoS) vulnerability exists in the Wrangler Git package. Specially crafted Git credentials can result in a denial of service (DoS) attack on an application that uses Wrangler due to the exhaustion of the available memory and CPU resources. This is caused by a lack of input validation of Git credentials before they are used, which may lead to a denial of service in some cases. This issue can be triggered when accessing both private and public Git repositories. A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version."}
input: {"Module":"github.com/containerd/imgcrypt","Description":"Imgcrypt implements a function `CheckAuthorization()` that is supposed to check whether a user is authorized to access an encrypted image given the keys that the user has provided on the command line that would enable decryption of the image. The check is to prevent that a user can start a container from an image that has previously been decrypted by another user on the same system and therefore a decrypted version of the image layers may be already available in the cache locally.\n\nThe failure occurs when an image with a ManifestList is used and the architecture of the local host is not the first one in the ManifestList. In the version prior to the fix, only the first architecture in the list was tested, which may not have its layers available locally (were not pulled) since it cannot be run on the host architecture. Therefore, the verdict on unavailable layers was that the image could be run anticipating that image run failure would occur later due to the layers not being available. However, this verdict to allow the image to run lead to other architectures in the ManifestList be able to run an image without providing keys if that image had previously been decrypted. The fixed version now skips over irrelevant architectures and tests the Manifest of the local architecture, if available.\n\nKnown projects that use the `CheckAuthorization()` of imgcrypt is for example the ctr-enc client tool provided by imgcrypt. In this implementation, the call to `CheckAuthorization()` is used on the client side and could therefore also be easily circumvented by a modified client tool not calling this function.\n\nIn relation to the vulnerability in ctr-enc, affected environments would have to allow different users to invoke ctr-enc indirectly using some sort of management stack that gives user indirect access to ctr-enc.\n\nThe patch has been applied to imgcrypt v1.1.4. Workarounds may include usage of different namespaces for each remote user."}
output: {"Summary":"Incorrect authorization in github.com/containerd/imgcrypt","Description":"The imgcrypt library provides API extensions for containerd to support encrypted container images and implements the ctd-decoder command line tool for use by containerd to decrypt encrypted container images. The imgcrypt function `CheckAuthorization` is supposed to check whether the current used is authorized to access an encrypted image and prevent the user from running an image that another user previously decrypted on the same system. In versions prior to 1.1.4, a failure occurs when an image with a ManifestList is used and the architecture of the local host is not the first one in the ManifestList. Only the first architecture in the list was tested, which may not have its layers available locally since it could not be run on the host architecture. Therefore, the verdict on unavailable layers was that the image could be run anticipating that image run failure would occur later due to the layers not being available. However, this verdict to allow the image to run enabled other architectures in the ManifestList to run an image without providing keys if that image had previously been decrypted. A patch has been applied to imgcrypt 1.1.4. Workarounds may include usage of different namespaces for each remote user."}
input: {"Module":"INPUT MODULE","Description":"INPUT DESCRIPTION"}
output:
|
gen_examples
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/genai/gen_examples/main.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Command gen_examples generates and stores examples
// that can be used to create prompts / training inputs for Google's
// Generative AI APIs.
package main
import (
"context"
"errors"
"flag"
"log"
"os"
"path/filepath"
"regexp"
"strings"
"golang.org/x/vulndb/internal/genai"
"golang.org/x/vulndb/internal/genericosv"
"golang.org/x/vulndb/internal/ghsarepo"
"golang.org/x/vulndb/internal/gitrepo"
"golang.org/x/vulndb/internal/report"
"golang.org/x/vulndb/internal/stdlib"
)
var (
localGHSA = flag.String("lg", os.Getenv("LOCAL_GHSA_DB"), "path to local GHSA repo, instead of cloning remote")
outFolder = flag.String("out", filepath.Join("internal", "genai"), "folder to write files to")
)
func main() {
localRepo, err := gitrepo.Open(context.Background(), ".")
if err != nil {
log.Fatal(err)
}
rc, err := report.NewClient(localRepo)
if err != nil {
log.Fatal(err)
}
reports := rc.List()
var c *ghsarepo.Client
if *localGHSA != "" {
repo, err := gitrepo.Open(context.Background(), *localGHSA)
if err != nil {
log.Fatal(err)
}
c, err = ghsarepo.NewClientFromRepo(repo)
if err != nil {
log.Fatal(err)
}
} else {
log.Println("cloning remote GHSA repo (use -lg=path/to/local/ghsa/repo to speed this up)...")
c, err = ghsarepo.NewClient()
if err != nil {
log.Fatal(err)
}
}
examples, err := toExamples(collectVulns(reports, c))
if err != nil {
log.Fatal(err)
}
if err := examples.WriteFiles(*outFolder); err != nil {
log.Fatal(err)
}
log.Printf("wrote %d examples to %s\n", len(examples), *outFolder)
}
type vuln struct {
r *report.Report
ghsa *genericosv.Entry
}
// collectVulns collects a list of report-GHSA pairs.
// The list is filtered to include only reports that are more likely
// to make good examples for AI prompts.
func collectVulns(reports []*report.Report, c *ghsarepo.Client) []*vuln {
var vulns []*vuln
for _, r := range reports {
if isFirstParty(r) ||
r.IsExcluded() ||
len(r.GHSAs) != 1 ||
r.CVEMetadata != nil ||
len(r.Description) < 300 {
continue
}
v := &vuln{r: r}
for _, ghsa := range r.GHSAs {
osv := c.ByGHSA(ghsa)
if osv == nil {
log.Printf("GHSA %s not found", ghsa)
}
v.ghsa = osv
}
// Encourage shortening the GHSA description.
if len(v.ghsa.Details) < len(r.Description) {
continue
}
vulns = append(vulns, v)
}
return vulns
}
func isFirstParty(r *report.Report) bool {
for _, m := range r.Modules {
if stdlib.IsStdModule(m.Module) || stdlib.IsCmdModule(m.Module) || stdlib.IsXModule(m.Module) {
return true
}
}
return false
}
func toExamples(vs []*vuln) (genai.Examples, error) {
var es genai.Examples
for _, v := range vs {
if v.r == nil || v.ghsa == nil {
return nil, errors.New("invalid example")
}
ex := &genai.Example{
Input: genai.Input{
Module: v.r.Modules[0].Module,
Description: v.ghsa.Details,
},
Suggestion: genai.Suggestion{
Summary: removeNewlines(v.r.Summary.String()),
Description: removeNewlines(v.r.Description.String()),
},
}
es = append(es, ex)
}
return es, nil
}
func removeNewlines(s string) string {
newlines := regexp.MustCompile(`\n+`)
return newlines.ReplaceAllString(strings.TrimSpace(s), " ")
}
|
templates
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/genai/templates/prompt.tmpl
|
{{ .Preamble }}
{{ range .Examples }}
input: {{ .Input | toJSON }}
output: {{ .Suggestion | toJSON }}{{ end }}
input: {{ .Input | toJSON }}
output:
|
templates
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/genai/templates/preamble.txt
|
You are an expert computer security researcher. You are helping the Go programming language security team write high-quality, correct, and
concise summaries and descriptions for the Go vulnerability database.
Given an affected module and a description of a vulnerability, output a JSON object containing 1) Summary: a short phrase identifying the core vulnerability, ending in the module name, and 2) Description: a plain text, one-to-two paragraph description of the vulnerability, omitting version numbers, written in the present tense that highlights the impact of the vulnerability. The description should be concise, accurate, and easy to understand. It should also be written in a style that is consistent with the existing Go vulnerability database.
|
observe
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/observe/observe.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Package observe provides metric and tracing support for Go servers.
// It uses OpenTelemetry.
package observe
import (
"context"
"golang.org/x/exp/slog"
"net/http"
"strings"
"golang.org/x/vulndb/internal/derrors"
"golang.org/x/vulndb/internal/worker/log"
mexporter "github.com/GoogleCloudPlatform/opentelemetry-operations-go/exporter/metric"
texporter "github.com/GoogleCloudPlatform/opentelemetry-operations-go/exporter/trace"
gcppropagator "github.com/GoogleCloudPlatform/opentelemetry-operations-go/propagator"
"github.com/jba/metrics/otel"
"go.opentelemetry.io/otel/propagation"
"go.opentelemetry.io/otel/sdk/instrumentation"
sdktrace "go.opentelemetry.io/otel/sdk/trace"
"go.opentelemetry.io/otel/trace"
tnoop "go.opentelemetry.io/otel/trace/noop"
)
// An Observer handles tracing, logging and metrics exporting.
type Observer struct {
ctx context.Context
tracerProvider *sdktrace.TracerProvider
tracer trace.Tracer
propagator propagation.TextMapPropagator
baseLogger *slog.Logger
}
// NewObserver creates an Observer.
// The context is used to flush traces in AfterRequest, so it should be longer-lived
// than any request context.
// (We don't want to use the request context because we still want traces even if
// it is canceled or times out.)
func NewObserver(ctx context.Context, projectID, serverName string) (_ *Observer, err error) {
defer derrors.Wrap(&err, "NewObserver(%q, %q)", projectID, serverName)
exporter, err := texporter.New(texporter.WithProjectID(projectID))
if err != nil {
return nil, err
}
tp := sdktrace.NewTracerProvider(
// Enable tracing if there is no incoming request, or if the incoming
// request is sampled.
sdktrace.WithSampler(sdktrace.ParentBased(sdktrace.AlwaysSample())),
sdktrace.WithBatcher(exporter))
// Create exporter.
mex, err := mexporter.New(mexporter.WithProjectID(projectID))
if err != nil {
return nil, err
}
// Export all registered metrics except the runtime metrics.
scope := instrumentation.Scope{Name: "vulndb/worker"}
otel.Export(scope, mex, 0, func(name string) bool {
return !strings.HasPrefix(name, "runtime/")
})
return &Observer{
ctx: ctx,
tracerProvider: tp,
tracer: tp.Tracer(serverName),
// The propagator extracts incoming trace IDs so that we can connect our trace spans
// to the incoming ones constructed by Cloud Run.
propagator: propagation.NewCompositeTextMapPropagator(
gcppropagator.CloudTraceOneWayPropagator{},
propagation.TraceContext{},
propagation.Baggage{}),
baseLogger: slog.New(log.NewGoogleCloudHandler(slog.LevelDebug)),
}, nil
}
type key struct{}
const (
traceIDHeader = "X-Cloud-Trace-Context"
gcpTraceKey = "logging.googleapis.com/trace"
)
// Observe adds metrics and tracing to an http.Handler.
func (o *Observer) Observe(h http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
ctx := log.NewContext(r.Context(), o.baseLogger.With(gcpTraceKey, r.Header.Get(traceIDHeader)))
ctx = o.propagator.Extract(ctx, propagation.HeaderCarrier(r.Header))
ctx = context.WithValue(ctx, key{}, o)
defer o.tracerProvider.ForceFlush(o.ctx)
h.ServeHTTP(w, r.WithContext(ctx))
})
}
func Start(ctx context.Context, name string) (context.Context, trace.Span) {
if obs, ok := ctx.Value(key{}).(*Observer); ok {
return obs.tracer.Start(ctx, name)
}
return ctx, tnoop.Span{}
}
|
worker
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/worker/config.go
|
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package worker
import (
"errors"
"golang.org/x/vulndb/internal/worker/store"
)
// serviceID names the Cloud Run service.
const serviceID = "vuln-worker"
// Config holds configuration information for the worker server.
type Config struct {
// Project is the Google Cloud Project where the resources live.
Project string
// Namespace is the Firstore namespace to use.
Namespace string
// UseErrorReporting determines whether errors go to the Error Reporting API.
UseErrorReporting bool
// IssueRepo is the GitHub repo to use for issues.
// An empty string disables issue creation.
IssueRepo string
// GitHubAccessToken is the token needed to authorize to the GitHub API.
GitHubAccessToken string
// Store is the implementation of store.Store used by the server.
Store store.Store
}
func (c *Config) Validate() error {
if c.Project == "" {
return errors.New("missing project")
}
if c.Namespace == "" {
return errors.New("missing namespace")
}
if c.IssueRepo != "" && c.GitHubAccessToken == "" {
return errors.New("issue repo requires access token")
}
return nil
}
|
worker
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/worker/false_positive_records.gen.go
|
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Code generated by gen_false_positives.go; DO NOT EDIT.
package worker
import (
"time"
"golang.org/x/vulndb/internal/worker/store"
)
var falsePositives = []*store.CVE4Record{
{
ID: "CVE-2013-2124",
Path: "2013/2xxx/CVE-2013-2124.json",
BlobHash: "b1ff88f81a229ecf77fe19b4abcaea1188732b10",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://seclists.org/oss-sec/2013/q2/431",
"https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85145",
"https://www.redhat.com/archives/libguestfs/2013-May/msg00079.html",
"https://www.redhat.com/archives/libguestfs/2013-May/msg00080.html",
"http://osvdb.org/93724",
"http://www.securityfocus.com/bid/60205",
},
},
{
ID: "CVE-2013-2233",
Path: "2013/2xxx/CVE-2013-2233.json",
BlobHash: "fff4e81581d35ca5feb18f441687a4e8ac2ef346",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.ansible.com/security",
"https://bugzilla.redhat.com/show_bug.cgi?id=980821",
"https://github.com/ansible/ansible/issues/857",
"http://www.openwall.com/lists/oss-security/2013/07/01/2",
"http://www.openwall.com/lists/oss-security/2013/07/02/6",
},
},
{
ID: "CVE-2014-0177",
Path: "2014/0xxx/CVE-2014-0177.json",
BlobHash: "2b106b8cbe92d17dbe0f40ef2bf8131a19a79dcc",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://secunia.com/advisories/58273",
"https://github.com/github/hub/commit/016ec99d25b1cb83cb4367e541177aa431beb600",
},
},
{
ID: "CVE-2014-3498",
Path: "2014/3xxx/CVE-2014-3498.json",
BlobHash: "82cec2c1ae4a884effa2c621469c9018ad07b09e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ansible/ansible/commit/8ed6350e65c82292a631f08845dfaacffe7f07f5",
"https://bugzilla.redhat.com/show_bug.cgi?id=1335551",
},
},
{
ID: "CVE-2014-3971",
Path: "2014/3xxx/CVE-2014-3971.json",
BlobHash: "cef39ff58a76f2b3b266e9fe49e3e1af75aa4199",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/mongodb/mongo/commit/c151e0660b9736fe66b224f1129a16871165251b",
"https://jira.mongodb.org/browse/SERVER-13753",
},
},
{
ID: "CVE-2014-4657",
Path: "2014/4xxx/CVE-2014-4657.json",
BlobHash: "973d958f719b33379fa47ac5330f68c79ad9b0f4",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md",
"https://www.securityfocus.com/bid/68232",
},
},
{
ID: "CVE-2014-4658",
Path: "2014/4xxx/CVE-2014-4658.json",
BlobHash: "831c7a476ec7ddeebe0311821efd8ec207878b06",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md",
"https://www.securityfocus.com/bid/68233",
},
},
{
ID: "CVE-2014-4659",
Path: "2014/4xxx/CVE-2014-4659.json",
BlobHash: "1fcaa970aab33beb1c8f5e94544a976060829bd5",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md",
"https://www.securityfocus.com/bid/68234",
},
},
{
ID: "CVE-2014-4660",
Path: "2014/4xxx/CVE-2014-4660.json",
BlobHash: "1aff32c0d305a69e039cf6f5a909b9e3adb88965",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md",
"https://www.securityfocus.com/bid/68231",
"https://www.openwall.com/lists/oss-security/2014/06/26/19",
"https://security-tracker.debian.org/tracker/CVE-2014-4660",
"https://github.com/ansible/ansible/commit/c4b5e46054c74176b2446c82d4df1a2610eddc08",
},
},
{
ID: "CVE-2014-4678",
Path: "2014/4xxx/CVE-2014-4678.json",
BlobHash: "453d55a513a567b647daee742272a73d06d2bbb3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ansible/ansible/commit/5429b85b9f6c2e640074176f36ff05fd5e4d1916",
"https://groups.google.com/forum/message/raw?msg=ansible-announce/ieV1vZvcTXU/5Q93ThkY9rIJ",
"https://security-tracker.debian.org/tracker/CVE-2014-4678",
"https://www.openwall.com/lists/oss-security/2014/06/26/30",
"https://www.openwall.com/lists/oss-security/2014/07/02/2",
"https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2014-4678",
"https://www.rapid7.com/db/vulnerabilities/freebsd-vid-2c493ac8-205e-11e5-a4a5-002590263bf5",
},
},
{
ID: "CVE-2014-4966",
Path: "2014/4xxx/CVE-2014-4966.json",
BlobHash: "e3378a01598473a0e0ec5b3576a3893236d1951e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.ocert.org/advisories/ocert-2014-004.html",
"https://github.com/ansible/ansible/commit/62a1295a3e08cb6c3e9f1b2a1e6e5dcaeab32527",
},
},
{
ID: "CVE-2014-4967",
Path: "2014/4xxx/CVE-2014-4967.json",
BlobHash: "3db0b89320c00238e9ac985a46145a8735160af3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.ocert.org/advisories/ocert-2014-004.html",
"https://github.com/ansible/ansible/commit/62a1295a3e08cb6c3e9f1b2a1e6e5dcaeab32527",
},
},
{
ID: "CVE-2014-8178",
Path: "2014/8xxx/CVE-2014-8178.json",
BlobHash: "c402c99f5ad15d2bb92c0cc2a1d200c61e8b3f5c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://lists.opensuse.org/opensuse-updates/2015-10/msg00036.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00014.html",
"https://groups.google.com/forum/#!msg/docker-dev/bWVVtLNbFy8/UaefOqMOCAAJ",
"https://github.com/docker/docker/blob/master/CHANGELOG.md#183-2015-10-12",
"https://www.docker.com/legal/docker-cve-database",
},
},
{
ID: "CVE-2014-8179",
Path: "2014/8xxx/CVE-2014-8179.json",
BlobHash: "e4d44d6ea12f93279a9dd5ff4f305b87d7ede7cb",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://lists.opensuse.org/opensuse-updates/2015-10/msg00036.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00014.html",
"https://groups.google.com/forum/#!msg/docker-dev/bWVVtLNbFy8/UaefOqMOCAAJ",
"https://github.com/docker/docker/blob/master/CHANGELOG.md#183-2015-10-12",
"https://blog.docker.com/2015/10/security-release-docker-1-8-3-1-6-2-cs7/",
"https://www.docker.com/legal/docker-cve-database",
},
},
{
ID: "CVE-2014-8682",
Path: "2014/8xxx/CVE-2014-8682.json",
BlobHash: "0f015f20fd4dd01c859293025b0380a7d64c38e1",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.exploit-db.com/exploits/35238",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/98694",
"http://packetstormsecurity.com/files/129117/Gogs-Repository-Search-SQL-Injection.html",
"http://seclists.org/fulldisclosure/2014/Nov/33",
"http://gogs.io/docs/intro/change_log.html",
"http://www.securityfocus.com/archive/1/533995/100/0/threaded",
"http://www.securityfocus.com/bid/71187",
"https://github.com/gogits/gogs/commit/0c5ba4573aecc9eaed669e9431a70a5d9f184b8d",
},
},
{
ID: "CVE-2014-9938",
Path: "2014/9xxx/CVE-2014-9938.json",
BlobHash: "9f74ca256c99ca814200cb62f3d5db211af77219",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/njhartwell/pw3nage",
"https://github.com/git/git/commit/8976500cbbb13270398d3b3e07a17b8cc7bff43f",
"https://access.redhat.com/errata/RHSA-2017:2004",
},
},
{
ID: "CVE-2015-5237",
Path: "2015/5xxx/CVE-2015-5237.json",
BlobHash: "12f3e517111a864cdaf06708bca08b1beefd91a9",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/google/protobuf/issues/760",
"http://www.openwall.com/lists/oss-security/2015/08/27/2",
"https://bugzilla.redhat.com/show_bug.cgi?id=1256426",
"https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E",
"https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E",
"https://lists.apache.org/thread.html/ra28fed69eef3a71e5fe5daea001d0456b05b102044237330ec5c7c82@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/r17dc6f394429f6bffb5e4c66555d93c2e9923cbbdc5a93db9a56c1c7@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/r42e47994734cd1980ef3e204a40555336e10cc80096927aca2f37d90@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/re6d04a214424a97ea59c62190d79316edf311a0a6346524dfef3b940@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/r1263fa5b51e4ec3cb8f09ff40e4747428c71198e9bee93349ec96a3c@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/r42ef6acfb0d86a2df0c2390702ecbe97d2104a331560f2790d17ca69@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/rb71dac1d9dd4e8a8ae3dbc033aeae514eda9be1263c1df3b42a530a2@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/r320dc858da88846ba00bb077bcca2cdf75b7dde0f6eb3a3d60dba6a1@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/r85c9a764b573c786224688cc906c27e28343e18f5b33387f94cae90f@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cdev.flink.apache.org%3E",
"https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cuser.flink.apache.org%3E",
"https://lists.apache.org/thread.html/r5e52caf41dc49df55b4ee80758356fe1ff2a88179ff24c685de7c28d@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/rf7539287c90be979bac94af9aaba34118fbf968864944b4871af48dd@%3Ccommits.pulsar.apache.org%3E",
"https://lists.apache.org/thread.html/r1d274d647b3c2060df9be21eade4ce56d3a59998cf19ac72662dd994@%3Ccommits.pulsar.apache.org%3E",
},
},
{
ID: "CVE-2015-5250",
Path: "2015/5xxx/CVE-2015-5250.json",
BlobHash: "a35f3719a75df2faff6d9702be23fd2a0f9c727f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/openshift/origin/issues/4374",
"https://access.redhat.com/errata/RHSA-2015:1736",
"https://bugzilla.redhat.com/show_bug.cgi?id=1259867",
},
},
{
ID: "CVE-2015-6240",
Path: "2015/6xxx/CVE-2015-6240.json",
BlobHash: "6e0f9763e63ce17393bedf56ba538cde7e73d35f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ansible/ansible/commit/ca2f2c4ebd7b5e097eab0a710f79c1f63badf95b",
"http://www.openwall.com/lists/oss-security/2015/08/17/10",
"https://bugzilla.redhat.com/show_bug.cgi?id=1243468",
"https://github.com/ansible/ansible/commit/952166f48eb0f5797b75b160fd156bbe1e8fc647",
"https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html",
},
},
{
ID: "CVE-2015-7082",
Path: "2015/7xxx/CVE-2015-7082.json",
BlobHash: "60475bed239cbaef4156695da083708a53b39c3c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://support.apple.com/HT205642",
"http://lists.apple.com/archives/security-announce/2015/Dec/msg00004.html",
"https://github.com/git/git/blob/master/Documentation/RelNotes/2.5.4.txt",
"http://www.securitytracker.com/id/1034340",
},
},
{
ID: "CVE-2015-7528",
Path: "2015/7xxx/CVE-2015-7528.json",
BlobHash: "41b1d383e7e18cf2d4c312efccb9f3ebd99dd891",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/openshift/origin/pull/6113",
"https://github.com/kubernetes/kubernetes/releases/tag/v1.2.0-alpha.5",
"http://rhn.redhat.com/errata/RHSA-2015-2615.html",
"https://access.redhat.com/errata/RHSA-2015:2544",
"https://github.com/kubernetes/kubernetes/pull/17886",
},
},
{
ID: "CVE-2015-7545",
Path: "2015/7xxx/CVE-2015-7545.json",
BlobHash: "f3e7d53c4da88c237f053e914c122c4b392d6450",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://rhn.redhat.com/errata/RHSA-2015-2515.html",
"http://lists.opensuse.org/opensuse-updates/2015-11/msg00066.html",
"https://security.gentoo.org/glsa/201605-01",
"http://www.openwall.com/lists/oss-security/2015/12/08/5",
"https://lkml.org/lkml/2015/10/5/683",
"https://github.com/git/git/blob/master/Documentation/RelNotes/2.6.1.txt",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"http://www.securitytracker.com/id/1034501",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=1269794",
"https://github.com/git/git/blob/master/Documentation/RelNotes/2.3.10.txt",
"http://www.ubuntu.com/usn/USN-2835-1",
"https://kernel.googlesource.com/pub/scm/git/git/+/33cfccbbf35a56e190b79bdec5c85457c952a021",
"https://github.com/git/git/blob/master/Documentation/RelNotes/2.5.4.txt",
"http://www.openwall.com/lists/oss-security/2015/12/11/7",
"http://www.securityfocus.com/bid/78711",
"http://www.openwall.com/lists/oss-security/2015/12/09/8",
"https://github.com/git/git/blob/master/Documentation/RelNotes/2.4.10.txt",
"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.533255",
"http://www.debian.org/security/2016/dsa-3435",
},
},
{
ID: "CVE-2015-7561",
Path: "2015/7xxx/CVE-2015-7561.json",
BlobHash: "43b0e2034d6c4eb6d2701ef83d8fd26625e9f7fc",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/pull/18909",
"https://bugzilla.redhat.com/show_bug.cgi?id=1291963",
},
},
{
ID: "CVE-2015-8222",
Path: "2015/8xxx/CVE-2015-8222.json",
BlobHash: "ae2fc7029a0c22b3dca5c4e94ee99991c5a561b6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1515689",
"http://www.ubuntu.com/usn/USN-2809-1",
"https://github.com/lxc/lxd/issues/1307",
},
},
{
ID: "CVE-2015-8945",
Path: "2015/8xxx/CVE-2015-8945.json",
BlobHash: "cfbcfd20b67906928751c09053531cd9f79a6000",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.openwall.com/lists/oss-security/2016/07/13/9",
"http://www.securityfocus.com/bid/91776",
"http://www.openwall.com/lists/oss-security/2016/07/13/10",
"https://github.com/openshift/origin/issues/3951",
},
},
{
ID: "CVE-2015-9258",
Path: "2015/9xxx/CVE-2015-9258.json",
BlobHash: "3cb299ef650530e5b4fa3b8015b92ab1e97acc49",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://docs.docker.com/notary/changelog/",
"https://github.com/theupdateframework/notary/blob/master/docs/resources/ncc_docker_notary_audit_2015_07_31.pdf",
},
},
{
ID: "CVE-2015-9259",
Path: "2015/9xxx/CVE-2015-9259.json",
BlobHash: "107d41dfd5a02a2db4210d326eef52762e6614eb",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://docs.docker.com/notary/changelog/",
"https://github.com/theupdateframework/notary/blob/master/docs/resources/ncc_docker_notary_audit_2015_07_31.pdf",
},
},
{
ID: "CVE-2015-9282",
Path: "2015/9xxx/CVE-2015-9282.json",
BlobHash: "583dfbf04222a32d8a542ff502b858a73e00c199",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/piechart-panel/pull/163",
"https://github.com/grafana/grafana/issues/4117",
"https://github.com/grafana/piechart-panel/issues/3",
"https://padlock.argh.in/2019/02/05/exploiting-xss-grafana.html",
},
},
{
ID: "CVE-2016-0216",
Path: "2016/0xxx/CVE-2016-0216.json",
BlobHash: "ac9f59c6700576b5936dc014ce265ee0c9a41097",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.ibm.com/support/docview.wss?uid=swg21975358",
"http://www.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple_security_vulnerabilities_in_ibm_tivoli_storage_manager_fastback_cve_2016_0212_cve_2016_0213_cve_2016_0216",
},
},
{
ID: "CVE-2016-1133",
Path: "2016/1xxx/CVE-2016-1133.json",
BlobHash: "e8c8db08c23519674cff28190d7799f409074600",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/h2o/h2o/issues/682",
"https://github.com/h2o/h2o/issues/684",
"http://jvndb.jvn.jp/jvndb/JVNDB-2016-000003",
"http://jvn.jp/en/jp/JVN45928828/index.html",
"https://h2o.examp1e.net/vulnerabilities.html#CVE-2016-1133",
},
},
{
ID: "CVE-2016-1544",
Path: "2016/1xxx/CVE-2016-1544.json",
BlobHash: "d441f5bd9f88bee233d06b76ebd092ac8ccccc7b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1308461",
"https://github.com/nghttp2/nghttp2/releases/tag/v1.7.1",
"https://github.com/nghttp2/nghttp2/compare/v1.7.0...v1.7.1",
"https://security.gentoo.org/glsa/201612-13",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177666.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177308.html",
},
},
{
ID: "CVE-2016-1587",
Path: "2016/1xxx/CVE-2016-1587.json",
BlobHash: "d9e8ff0aad59fd3f73ea4387b62d42ba264e9f81",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/snapcore/snapweb/commit/3f4cf9403f7687fbc8e27c0e01b2cf6aa5e7e0d5",
},
},
{
ID: "CVE-2016-1905",
Path: "2016/1xxx/CVE-2016-1905.json",
BlobHash: "75a910c29b4ebf972c647ddc13c6f49d849be835",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/19479",
"https://access.redhat.com/errata/RHSA-2016:0070",
},
},
{
ID: "CVE-2016-1906",
Path: "2016/1xxx/CVE-2016-1906.json",
BlobHash: "9241866e7adb1f68453b4c01c53f5f723d86365d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/openshift/origin/issues/6556",
"https://github.com/openshift/origin/pull/6576",
"https://access.redhat.com/errata/RHSA-2016:0070",
"https://access.redhat.com/errata/RHSA-2016:0351",
},
},
{
ID: "CVE-2016-2160",
Path: "2016/2xxx/CVE-2016-2160.json",
BlobHash: "0c47ebe1754218401ccca83d9fc098ab2888c24a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/openshift/origin/pull/7864",
"https://access.redhat.com/errata/RHSA-2016:1064",
"https://bugzilla.redhat.com/show_bug.cgi?id=1316127",
},
},
{
ID: "CVE-2016-2183",
Path: "2016/2xxx/CVE-2016-2183.json",
BlobHash: "a0a8a4df4906c4afe4e07f9cca42696252858f12",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://access.redhat.com/errata/RHSA-2017:3113",
"http://rhn.redhat.com/errata/RHSA-2017-0338.html",
"https://security.gentoo.org/glsa/201612-16",
"https://access.redhat.com/errata/RHSA-2017:3240",
"https://access.redhat.com/errata/RHSA-2017:2709",
"http://www.securityfocus.com/bid/92630",
"https://access.redhat.com/errata/RHSA-2017:3239",
"https://security.gentoo.org/glsa/201701-65",
"http://www.securitytracker.com/id/1036696",
"https://security.gentoo.org/glsa/201707-01",
"http://www.securityfocus.com/bid/95568",
"https://access.redhat.com/errata/RHSA-2017:3114",
"https://access.redhat.com/errata/RHSA-2017:1216",
"https://access.redhat.com/errata/RHSA-2017:2710",
"https://www.ietf.org/mail-archive/web/tls/current/msg04560.html",
"https://access.redhat.com/errata/RHSA-2018:2123",
"http://rhn.redhat.com/errata/RHSA-2017-0337.html",
"https://access.redhat.com/errata/RHSA-2017:2708",
"http://rhn.redhat.com/errata/RHSA-2017-0336.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html",
"http://rhn.redhat.com/errata/RHSA-2017-0462.html",
"https://access.redhat.com/errata/RHSA-2019:1245",
"https://access.redhat.com/errata/RHSA-2019:2859",
"https://access.redhat.com/errata/RHSA-2020:0451",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://www.oracle.com/security-alerts/cpujan2020.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"https://www.tenable.com/security/tns-2016-20",
"https://sweet32.info/",
"http://www.splunk.com/view/SP-CAAAPUE",
"https://bugzilla.redhat.com/show_bug.cgi?id=1369383",
"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us",
"https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
"https://access.redhat.com/articles/2548661",
"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
"https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue",
"http://www.splunk.com/view/SP-CAAAPSV",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415",
"http://www-01.ibm.com/support/docview.wss?uid=swg21995039",
"https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633",
"https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/",
"https://www.tenable.com/security/tns-2016-16",
"https://www.sigsac.org/ccs/CCS2016/accepted-papers/",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499",
"https://www.tenable.com/security/tns-2016-21",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10171",
"http://www-01.ibm.com/support/docview.wss?uid=swg21991482",
"https://www.openssl.org/blog/blog/2016/08/24/sweet32/",
"https://access.redhat.com/security/cve/cve-2016-2183",
"https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02",
"https://security.netapp.com/advisory/ntap-20160915-0001/",
"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us",
"https://bto.bluecoat.com/security-advisory/sa133",
"https://www.tenable.com/security/tns-2017-09",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849",
"http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116",
"https://security.netapp.com/advisory/ntap-20170119-0001/",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984",
"https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/",
"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008",
"http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10310",
"https://www.oracle.com/security-alerts/cpuoct2020.html",
},
},
{
ID: "CVE-2016-2315",
Path: "2016/2xxx/CVE-2016-2315.json",
BlobHash: "baa983753eeb8f4f588796fc6bb2a6da00b24638",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00074.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183147.html",
"http://www.debian.org/security/2016/dsa-3521",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"https://security.gentoo.org/glsa/201605-01",
"http://www.securitytracker.com/id/1035290",
"http://www.securityfocus.com/bid/84355",
"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00062.html",
"http://pastebin.com/UX2P2jjg",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180763.html",
"http://www.openwall.com/lists/oss-security/2016/03/15/5",
"http://lists.opensuse.org/opensuse-updates/2016-04/msg00011.html",
"http://rhn.redhat.com/errata/RHSA-2016-0496.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"https://github.com/git/git/commit/34fa79a6cde56d6d428ab0d3160cb094ebad3305",
"https://github.com/git/git/commit/de1e67d0703894cb6ea782e36abb63976ab07e60",
"https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.7.4.txt",
"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00061.html",
"http://www.ubuntu.com/usn/USN-2938-1",
"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00071.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00077.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179121.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00076.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00059.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00060.html",
},
},
{
ID: "CVE-2016-2324",
Path: "2016/2xxx/CVE-2016-2324.json",
BlobHash: "9e5d38706848fe52155db5714fce80caef9ce6f2",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00074.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183147.html",
"http://www.debian.org/security/2016/dsa-3521",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"https://security.gentoo.org/glsa/201605-01",
"http://www.securitytracker.com/id/1035290",
"http://www.securityfocus.com/bid/84355",
"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00062.html",
"http://pastebin.com/UX2P2jjg",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180763.html",
"http://www.openwall.com/lists/oss-security/2016/03/15/5",
"http://lists.opensuse.org/opensuse-updates/2016-04/msg00011.html",
"http://rhn.redhat.com/errata/RHSA-2016-0496.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"https://github.com/git/git/commit/de1e67d0703894cb6ea782e36abb63976ab07e60",
"https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.7.4.txt",
"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00061.html",
"http://www.ubuntu.com/usn/USN-2938-1",
"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00071.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00077.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179121.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00076.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00059.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00060.html",
},
},
{
ID: "CVE-2016-3096",
Path: "2016/3xxx/CVE-2016-3096.json",
BlobHash: "281e6714266b6074e0d92811e7af8d9c3d959282",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1322925",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183274.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183252.html",
"https://github.com/ansible/ansible-modules-extras/pull/1941/commits/8c6fe646ee79f5e55361b885b7efed5bec72d4a4",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184175.html",
"https://github.com/ansible/ansible/blob/v2.0.2.0-1/CHANGELOG.md#202-over-the-hills-and-far-away",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183132.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183103.html",
"https://groups.google.com/forum/#!topic/ansible-announce/tqiZbcWxYig",
"https://security.gentoo.org/glsa/201607-14",
"https://groups.google.com/forum/#!topic/ansible-announce/E80HLZilTU0",
"https://github.com/ansible/ansible-modules-extras/pull/1941",
"https://github.com/ansible/ansible/blob/v1.9.6-1/CHANGELOG.md#196-dancing-in-the-street---tbd",
},
},
{
ID: "CVE-2016-3711",
Path: "2016/3xxx/CVE-2016-3711.json",
BlobHash: "8115e08eb0b2daa8c0fc3a4f25d7ec056218bb0e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://access.redhat.com/errata/RHSA-2016:1064",
"https://github.com/openshift/origin/pull/8334",
},
},
{
ID: "CVE-2016-4817",
Path: "2016/4xxx/CVE-2016-4817.json",
BlobHash: "43ee499860a7df5230da7220fdc287ed0a73ee96",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4",
"http://jvn.jp/en/jp/JVN87859762/index.html",
"https://github.com/h2o/h2o/pull/920",
"http://jvndb.jvn.jp/jvndb/JVNDB-2016-000091",
},
},
{
ID: "CVE-2016-4864",
Path: "2016/4xxx/CVE-2016-4864.json",
BlobHash: "db81b848bc530e5a932de1f97ee588da3ceed6e3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/h2o/h2o/issues/1077",
"https://jvn.jp/en/jp/JVN94779084/index.html",
},
},
{
ID: "CVE-2016-6349",
Path: "2016/6xxx/CVE-2016-6349.json",
BlobHash: "026a929cc732d3e16f3707b0e77927431839df10",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.openwall.com/lists/oss-security/2016/07/26/9",
"https://bugzilla.redhat.com/show_bug.cgi?id=1360634",
"http://www.openwall.com/lists/oss-security/2016/10/13/7",
"https://github.com/projectatomic/oci-register-machine/pull/22",
"http://www.securityfocus.com/bid/92143",
},
},
{
ID: "CVE-2016-6494",
Path: "2016/6xxx/CVE-2016-6494.json",
BlobHash: "58fb6d3b0cfbca0fc47b3d74bee4093d056e06bc",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1362553",
"http://www.openwall.com/lists/oss-security/2016/07/29/8",
"https://github.com/mongodb/mongo/commit/035cf2afc04988b22cb67f4ebfd77e9b344cb6e0",
"http://www.securityfocus.com/bid/92204",
"https://jira.mongodb.org/browse/SERVER-25335",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MCE2ZLFBNOK3TTWSTXZJQGZVP4EEJDL/",
"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832908",
"http://www.openwall.com/lists/oss-security/2016/07/29/4",
},
},
{
ID: "CVE-2016-7063",
Path: "2016/7xxx/CVE-2016-7063.json",
BlobHash: "0e23338923c32c85922d4e928bb484a8d85dd32d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/pritunl/pritunl-client-electron/releases/tag/1.0.1116.6,",
"https://lf.lc/CVE-2016-7063.txt",
"https://github.com/pritunl/pritunl-client-electron/releases/tag/1.0.1116.6",
},
},
{
ID: "CVE-2016-7064",
Path: "2016/7xxx/CVE-2016-7064.json",
BlobHash: "3d76d334ba98d7f5a2217446c7fc9ea78a9fed49",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://lf.lc/CVE-2016-7064.txt",
"https://github.com/pritunl/pritunl-client-electron/releases/tag/1.0.1116.6",
},
},
{
ID: "CVE-2016-7075",
Path: "2016/7xxx/CVE-2016-7075.json",
BlobHash: "f6822fb04347ec41f06e43ae10cc6c9e14752055",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/34517",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7075",
"https://access.redhat.com/errata/RHSA-2016:2064",
},
},
{
ID: "CVE-2016-7569",
Path: "2016/7xxx/CVE-2016-7569.json",
BlobHash: "a8f50811c4301d4f693d341f998650d54a710e4c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/appc/docker2aci/issues/201",
"https://github.com/appc/docker2aci/releases/tag/v0.13.0",
"http://www.openwall.com/lists/oss-security/2016/09/28/2",
"http://www.openwall.com/lists/oss-security/2016/09/28/4",
"http://www.securityfocus.com/bid/93194",
},
},
{
ID: "CVE-2016-7835",
Path: "2016/7xxx/CVE-2016-7835.json",
BlobHash: "7bd0c8f8398f8e219cfc5875e710825f9847ae0a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.securityfocus.com/bid/95061",
"https://github.com/h2o/h2o/issues/1144",
"https://jvn.jp/en/jp/JVN44566208/index.html",
},
},
{
ID: "CVE-2016-8579",
Path: "2016/8xxx/CVE-2016-8579.json",
BlobHash: "5a1e6220d014e3f9377352389fa43c63accb6625",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/appc/docker2aci/issues/203",
"http://www.securityfocus.com/bid/93560",
},
},
{
ID: "CVE-2016-9274",
Path: "2016/9xxx/CVE-2016-9274.json",
BlobHash: "96470ffc56da89ea8fc11f458e71ef111ec5df1b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.securityfocus.com/bid/94289",
"https://github.com/git-for-windows/git/issues/944",
"https://www.youtube.com/watch?v=S7jOLv0sul0",
},
},
{
ID: "CVE-2016-9962",
Path: "2016/9xxx/CVE-2016-9962.json",
BlobHash: "c0f980f342321bb14cac1d5de7c6cf207e5c64b9",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.securityfocus.com/bid/95361",
"https://github.com/docker/docker/releases/tag/v1.12.6",
"http://rhn.redhat.com/errata/RHSA-2017-0116.html",
"http://seclists.org/fulldisclosure/2017/Jan/29",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WUQ3MQNEL5IBZZLMLR72Q4YDCL2SCKRK/",
"https://bugzilla.suse.com/show_bug.cgi?id=1012568#c6",
"https://security.gentoo.org/glsa/201701-34",
"http://rhn.redhat.com/errata/RHSA-2017-0123.html",
"https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5",
"http://rhn.redhat.com/errata/RHSA-2017-0127.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FINGBFMIXBG6B6ZWYH3TMRP5V3PDBNXR/",
"https://access.redhat.com/security/vulnerabilities/cve-2016-9962",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQAXJMMLRU7DD2IMG47SR2K4BOFFG7FZ/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVM7FCOQMPKOFLDTUYSS4ES76DDM56VP/",
"http://www.securityfocus.com/archive/1/540001/100/0/threaded",
"http://seclists.org/fulldisclosure/2017/Jan/21",
},
},
{
ID: "CVE-2017-1000056",
Path: "2017/1000xxx/CVE-2017-1000056.json",
BlobHash: "186cdca5f767cbd623a39f1b68889db80497e830",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/43459",
},
},
{
ID: "CVE-2017-1000069",
Path: "2017/1000xxx/CVE-2017-1000069.json",
BlobHash: "942314c0d69828503afd2d44f4db106c1d9a30b3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/bitly/oauth2_proxy/pull/360",
},
},
{
ID: "CVE-2017-1000070",
Path: "2017/1000xxx/CVE-2017-1000070.json",
BlobHash: "0e401cf5656d411d45e09c34c597b0f081a97387",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/bitly/oauth2_proxy/pull/359",
"https://tools.ietf.org/html/rfc6819#section-5.2.3.5",
},
},
{
ID: "CVE-2017-1000420",
Path: "2017/1000xxx/CVE-2017-1000420.json",
BlobHash: "ec203dd2d562b299c55bc03e6b0faac0017424d1",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/syncthing/syncthing/issues/4286",
},
},
{
ID: "CVE-2017-1000459",
Path: "2017/1000xxx/CVE-2017-1000459.json",
BlobHash: "e95287afe54b0c5f194f27d41bae9cd4c76cd6b3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/leanote/leanote/issues/676",
},
},
{
ID: "CVE-2017-1000492",
Path: "2017/1000xxx/CVE-2017-1000492.json",
BlobHash: "2d9e9e6b632c0519380b320d1fb3329d948014a7",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/leanote/leanote/issues/695",
"https://github.com/leanote/desktop-app/commit/a2ed226637f8e66c9b089784b5e58eccf2e2fb30",
},
},
{
ID: "CVE-2017-1002100",
Path: "2017/1002xxx/CVE-2017-1002100.json",
BlobHash: "fca5a4aa6327f1653b40a0a3c9b6ced4e696afac",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/d/msg/kubernetes-security-announce/n3VBg_WJZic/-ddIqKXqAAAJ",
"https://github.com/kubernetes/kubernetes/issues/47611",
},
},
{
ID: "CVE-2017-1002101",
Path: "2017/1002xxx/CVE-2017-1002101.json",
BlobHash: "a8c2bdc2f9c60764e9f1881ec7b2d23aec704e94",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://access.redhat.com/errata/RHSA-2018:0475",
"https://github.com/kubernetes/kubernetes/issues/60813",
"https://github.com/bgeesaman/subpath-exploit/",
"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html",
},
},
{
ID: "CVE-2017-1002102",
Path: "2017/1002xxx/CVE-2017-1002102.json",
BlobHash: "0cc34b8d285c1bcca9e23488088138fa92dd35d7",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://access.redhat.com/errata/RHSA-2018:0475",
"https://github.com/kubernetes/kubernetes/issues/60814",
},
},
{
ID: "CVE-2017-10868",
Path: "2017/10xxx/CVE-2017-10868.json",
BlobHash: "40c59280c218983748803e23264c99c42dad0bcf",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/h2o/h2o/issues/1459",
"https://jvn.jp/en/jp/JVN84182676/index.html",
},
},
{
ID: "CVE-2017-10869",
Path: "2017/10xxx/CVE-2017-10869.json",
BlobHash: "0009cbdc8d02be0391670e6bb017f95f533f59b6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/h2o/h2o/issues/1460",
"https://jvn.jp/en/jp/JVN84182676/index.html",
},
},
{
ID: "CVE-2017-10872",
Path: "2017/10xxx/CVE-2017-10872.json",
BlobHash: "6d844466776fc894414a92d578ce5c84790e2b8b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/h2o/h2o/issues/1543",
"https://jvn.jp/en/jp/JVN84182676/index.html",
},
},
{
ID: "CVE-2017-10908",
Path: "2017/10xxx/CVE-2017-10908.json",
BlobHash: "21924f0076822602a678bcbf7cd22669d4fd1a9e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/h2o/h2o/issues/1544",
"https://jvn.jp/en/jp/JVN84182676/index.html",
},
},
{
ID: "CVE-2017-14178",
Path: "2017/14xxx/CVE-2017-14178.json",
BlobHash: "9b2bf5cbcc763d491a503ac41067282c665e9abc",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-14178.html",
"https://launchpad.net/bugs/1730255",
"https://github.com/snapcore/snapd/pull/4194",
},
},
{
ID: "CVE-2017-14623",
Path: "2017/14xxx/CVE-2017-14623.json",
BlobHash: "f524aeead96962abc23351d740022553e73757ad",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/go-ldap/ldap/pull/126",
"https://github.com/go-ldap/ldap/commit/95ede1266b237bf8e9aa5dce0b3250e51bfefe66",
},
},
{
ID: "CVE-2017-14992",
Path: "2017/14xxx/CVE-2017-14992.json",
BlobHash: "366ff53d9a34d20004a471ca091b29cec6683a1c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://blog.cloudpassage.com/2017/10/13/discovering-docker-cve-2017-14992/",
"https://github.com/moby/moby/issues/35075",
},
},
{
ID: "CVE-2017-15104",
Path: "2017/15xxx/CVE-2017-15104.json",
BlobHash: "a7df93ede38ff481692b22f5712a90ee83b711cf",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://access.redhat.com/errata/RHSA-2017:3481",
"https://bugzilla.redhat.com/show_bug.cgi?id=1510149",
"https://access.redhat.com/security/cve/CVE-2017-15104",
"https://github.com/heketi/heketi/releases/tag/v5.0.1",
},
},
{
ID: "CVE-2017-16539",
Path: "2017/16xxx/CVE-2017-16539.json",
BlobHash: "342b31363374a3a6d961be5d73aaeeb7744dbdd4",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://marc.info/?l=linux-scsi&m=150985455801444&w=2",
"https://github.com/moby/moby/pull/35399/commits/a21ecdf3c8a343a7c94e4c4d01b178c87ca7aaa1",
"https://marc.info/?l=linux-scsi&m=150985062200941&w=2",
"https://github.com/moby/moby/pull/35399",
"https://twitter.com/ewindisch/status/926443521820774401",
},
},
{
ID: "CVE-2017-17697",
Path: "2017/17xxx/CVE-2017-17697.json",
BlobHash: "274e9aad2132a7c49c11a1d9265628c3f447edc7",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/vmware/harbor/issues/3755",
},
},
{
ID: "CVE-2017-2428",
Path: "2017/2xxx/CVE-2017-2428.json",
BlobHash: "2d3da11d967f8a98955fa00d3b879bf3bf93d9ff",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.securityfocus.com/bid/97146",
"https://support.apple.com/HT207601",
"https://support.apple.com/HT207615",
"http://www.securitytracker.com/id/1038138",
"https://github.com/nghttp2/nghttp2/releases/tag/v1.17.0",
"https://support.apple.com/HT207602",
"https://support.apple.com/HT207617",
},
},
{
ID: "CVE-2017-7297",
Path: "2017/7xxx/CVE-2017-7297.json",
BlobHash: "80de817b1932c2418c6fc3627767d44227b54e48",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.securityfocus.com/bid/97180",
"https://github.com/rancher/rancher/issues/8296",
},
},
{
ID: "CVE-2017-7481",
Path: "2017/7xxx/CVE-2017-7481.json",
BlobHash: "e2b8ae7ce6b93ece51f2ed17bb5113b55e8bbb6e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://access.redhat.com/errata/RHSA-2017:1599",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7481",
"https://access.redhat.com/errata/RHSA-2017:1334",
"http://www.securityfocus.com/bid/98492",
"https://github.com/ansible/ansible/commit/ed56f51f185a1ffd7ea57130d260098686fcc7c2",
"https://access.redhat.com/errata/RHSA-2017:1244",
"https://access.redhat.com/errata/RHSA-2017:1499",
"https://access.redhat.com/errata/RHSA-2017:2524",
"https://access.redhat.com/errata/RHSA-2017:1476",
"https://usn.ubuntu.com/4072-1/",
"https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html",
},
},
{
ID: "CVE-2017-7550",
Path: "2017/7xxx/CVE-2017-7550.json",
BlobHash: "ad7744ea58016c1de5573869da0544f1d8e0b16c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1473645",
"https://github.com/ansible/ansible/issues/30874",
"https://access.redhat.com/errata/RHSA-2017:2966",
},
},
{
ID: "CVE-2017-7860",
Path: "2017/7xxx/CVE-2017-7860.json",
BlobHash: "13a2228e63f0f46795b242bd8cb4ad797cb9cbe2",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=661",
"http://www.securityfocus.com/bid/97695",
"https://github.com/grpc/grpc/pull/9833",
},
},
{
ID: "CVE-2017-7861",
Path: "2017/7xxx/CVE-2017-7861.json",
BlobHash: "453130af5b5b8010111e42cc388fbc5f43aa889e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.securityfocus.com/bid/97694",
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=655",
"https://github.com/grpc/grpc/pull/9833",
},
},
{
ID: "CVE-2017-8359",
Path: "2017/8xxx/CVE-2017-8359.json",
BlobHash: "5e8f0f8ef3da14ba375263bc03884a3410ac6fcb",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=726",
"http://www.securityfocus.com/bid/98280",
"https://github.com/grpc/grpc/pull/10353",
},
},
{
ID: "CVE-2017-9431",
Path: "2017/9xxx/CVE-2017-9431.json",
BlobHash: "2d6834e7c3d19ddb7baffd0160fd61e30779fdf5",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grpc/grpc/pull/10492",
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1018",
},
},
{
ID: "CVE-2018-0608",
Path: "2018/0xxx/CVE-2018-0608.json",
BlobHash: "045fec41d17861f86b541869d397c5e280854bb6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://jvn.jp/en/jp/JVN93226941/index.html",
"https://github.com/h2o/h2o/issues/1775",
},
},
{
ID: "CVE-2018-1000400",
Path: "2018/1000xxx/CVE-2018-1000400.json",
BlobHash: "055327cc1b43bc98c8260ca9ca9e7f89c7ae1b78",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes-incubator/cri-o/pull/1558/files",
"http://www.securityfocus.com/bid/104262",
},
},
{
ID: "CVE-2018-1000538",
Path: "2018/1000xxx/CVE-2018-1000538.json",
BlobHash: "4693085bc7714393c2fd0e1980970276c9b71687",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/minio/minio/commit/9c8b7306f55f2c8c0a5c7cea9a8db9d34be8faa7#diff-e8c3bc9bc83b5516d0cc806cd461d08bL220",
"https://github.com/minio/minio/pull/5957",
},
},
{
ID: "CVE-2018-1000803",
Path: "2018/1000xxx/CVE-2018-1000803.json",
BlobHash: "bbc1d2ebc7f13f350461116c8aecfb6a0c37f33b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57",
"https://github.com/go-gitea/gitea/pull/4664",
},
},
{
ID: "CVE-2018-1000816",
Path: "2018/1000xxx/CVE-2018-1000816.json",
BlobHash: "196777c6a21062d6742ad28759a97637e00fae1b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/grafana/issues/13667",
},
},
{
ID: "CVE-2018-1002100",
Path: "2018/1002xxx/CVE-2018-1002100.json",
BlobHash: "273200b8208ce84c1b7d42550668a98582c7b8ef",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/61297",
"https://hansmi.ch/articles/2018-04-openshift-s2i-security",
"https://bugzilla.redhat.com/show_bug.cgi?id=1564305",
},
},
{
ID: "CVE-2018-1002101",
Path: "2018/1002xxx/CVE-2018-1002101.json",
BlobHash: "c2cd4cfd92f5f066c2bf9308363a395b2a8449fd",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/65750",
"http://www.securityfocus.com/bid/106238",
"https://security.netapp.com/advisory/ntap-20190416-0008/",
},
},
{
ID: "CVE-2018-1002102",
Path: "2018/1002xxx/CVE-2018-1002102.json",
BlobHash: "96adf20e2429475ae67e72233f65159e2aad09a7",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/85867",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q56CULSH7F7BC4NPS67ZS23ZCLL5TIVK/",
},
},
{
ID: "CVE-2018-1002103",
Path: "2018/1002xxx/CVE-2018-1002103.json",
BlobHash: "d1edbbcfd99863eb063b5d1f04ade5374143ac11",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/minikube/issues/3208",
},
},
{
ID: "CVE-2018-1002104",
Path: "2018/1002xxx/CVE-2018-1002104.json",
BlobHash: "1c10a1a861a08030cabafb1f0972a657871acf6c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/ingress-nginx/pull/3125",
},
},
{
ID: "CVE-2018-1002105",
Path: "2018/1002xxx/CVE-2018-1002105.json",
BlobHash: "153ef110d19435a06c78b5f7499c1b6c9a991723",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/forum/#!topic/kubernetes-announce/GVllWCg6L88",
"https://www.exploit-db.com/exploits/46053/",
"https://access.redhat.com/errata/RHSA-2018:3549",
"https://access.redhat.com/errata/RHSA-2018:3752",
"https://www.exploit-db.com/exploits/46052/",
"https://access.redhat.com/errata/RHSA-2018:3624",
"https://www.coalfire.com/The-Coalfire-Blog/December-2018/Kubernetes-Vulnerability-What-You-Can-Should-Do",
"https://github.com/kubernetes/kubernetes/issues/71411",
"https://access.redhat.com/errata/RHSA-2018:3742",
"https://access.redhat.com/errata/RHSA-2018:3754",
"https://access.redhat.com/errata/RHSA-2018:3537",
"https://github.com/evict/poc_CVE-2018-1002105",
"https://access.redhat.com/errata/RHSA-2018:3598",
"https://access.redhat.com/errata/RHSA-2018:3551",
"http://www.securityfocus.com/bid/106068",
"https://security.netapp.com/advisory/ntap-20190416-0001/",
"http://www.openwall.com/lists/oss-security/2019/06/28/2",
"http://www.openwall.com/lists/oss-security/2019/07/06/3",
"http://www.openwall.com/lists/oss-security/2019/07/06/4",
"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html",
},
},
{
ID: "CVE-2018-1002207",
Path: "2018/1002xxx/CVE-2018-1002207.json",
BlobHash: "7a69b2918e654203b3d9cee5e6e57d3eda432b42",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://snyk.io/research/zip-slip-vulnerability",
"https://github.com/snyk/zip-slip-vulnerability",
"https://github.com/mholt/archiver/pull/65",
"https://github.com/mholt/archiver/commit/e4ef56d48eb029648b0e895bb0b6a393ef0829c3",
"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARCHIVER-50071",
},
},
{
ID: "CVE-2018-10055",
Path: "2018/10xxx/CVE-2018-10055.json",
BlobHash: "bfd0b709d180b3fac635c4311cf647adedf2e831",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-006.md",
},
},
{
ID: "CVE-2018-10856",
Path: "2018/10xxx/CVE-2018-10856.json",
BlobHash: "fe414baee5a3a73b4ecc1a07731b0a58ef32e40f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10856",
"https://github.com/projectatomic/libpod/commit/bae80a0b663925ec751ad2784ca32989403cdc24",
"https://access.redhat.com/errata/RHSA-2018:2037",
},
},
{
ID: "CVE-2018-10892",
Path: "2018/10xxx/CVE-2018-10892.json",
BlobHash: "9a297de39e022e08c46b9f04c88f3327867b27aa",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/moby/moby/pull/37404",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:2482",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10892",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html",
"https://access.redhat.com/errata/RHBA-2018:2796",
},
},
{
ID: "CVE-2018-10937",
Path: "2018/10xxx/CVE-2018-10937.json",
BlobHash: "261e46299b2721df16561fae93500096b92c25a6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10937",
"http://www.securityfocus.com/bid/105190",
"https://github.com/openshift/console/pull/461",
"https://github.com/openshift/console/commit/d56666852da6e7309a2e63a49f49a72ff66d309c",
},
},
{
ID: "CVE-2018-1098",
Path: "2018/1xxx/CVE-2018-1098.json",
BlobHash: "01249fce90e1e575fce9c7ab134de1591496b169",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1552714",
"https://github.com/coreos/etcd/issues/9353",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/",
},
},
{
ID: "CVE-2018-1099",
Path: "2018/1xxx/CVE-2018-1099.json",
BlobHash: "1a69ba6fc3592810102632fdd4a8e7aed9f6b1cb",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1552717",
"https://github.com/coreos/etcd/issues/9353",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/",
},
},
{
ID: "CVE-2018-12099",
Path: "2018/12xxx/CVE-2018-12099.json",
BlobHash: "6b867dd20b28bc782c927bdcb6c8164529d1e0bf",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/grafana/pull/11813",
"https://github.com/grafana/grafana/releases/tag/v5.2.0-beta1",
"https://security.netapp.com/advisory/ntap-20190416-0004/",
},
},
{
ID: "CVE-2018-12608",
Path: "2018/12xxx/CVE-2018-12608.json",
BlobHash: "04e2d2cfa0ade3aa12257cb6f58974336446df17",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/moby/moby/pull/33182",
},
},
{
ID: "CVE-2018-12678",
Path: "2018/12xxx/CVE-2018-12678.json",
BlobHash: "fdc164ad2138c176976779e1ffaaf333eed7a191",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/portainer/portainer/pull/1979",
"https://github.com/portainer/portainer/releases/tag/1.18.0",
},
},
{
ID: "CVE-2018-12976",
Path: "2018/12xxx/CVE-2018-12976.json",
BlobHash: "6a92a4c19239879e39ebc5154d61f738960426c9",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/forum/#!msg/golang-announce/4rpTbfzYB1k/no6MEwlQAwAJ",
"https://github.com/golang/gddo/commit/daffe1f90ec57f8ed69464f9094753fc6452e983",
},
},
{
ID: "CVE-2018-14474",
Path: "2018/14xxx/CVE-2018-14474.json",
BlobHash: "d1a361cbe7eb0eb35921ab6cd10e2a51faffd079",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/s-gv/orangeforum/commit/1f6313cb3a1e755880fc1354f3e1efc4dd2dd4aa",
},
},
{
ID: "CVE-2018-15178",
Path: "2018/15xxx/CVE-2018-15178.json",
BlobHash: "a57c17640dc4de6fa83a45e5ef93f9431abf4c92",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gogs/gogs/issues/5364",
"https://github.com/gogs/gogs/pull/5365",
},
},
{
ID: "CVE-2018-15192",
Path: "2018/15xxx/CVE-2018-15192.json",
BlobHash: "e94118c0b7ae432eba835137ddaca3f65be53a52",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gogs/gogs/issues/5366",
"https://github.com/go-gitea/gitea/issues/4624",
},
},
{
ID: "CVE-2018-15193",
Path: "2018/15xxx/CVE-2018-15193.json",
BlobHash: "0da82c7f418abe22cf2aee3964211d3d3966cfd5",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gogs/gogs/issues/5367",
},
},
{
ID: "CVE-2018-15598",
Path: "2018/15xxx/CVE-2018-15598.json",
BlobHash: "edb153e30e0b8b71c8fc3857fcd7ab3b989802da",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/containous/traefik/pull/3790",
"https://github.com/containous/traefik/pull/3790/commits/368bd170913078732bde58160f92f202f370278b",
"https://github.com/containous/traefik/releases/tag/v1.6.6",
"https://github.com/containous/traefik/pull/3790/commits/113250ce5735d554c502ca16fb03bb9119ca79f1",
},
},
{
ID: "CVE-2018-15664",
Path: "2018/15xxx/CVE-2018-15664.json",
BlobHash: "cd288bf64f1c706476bbdda4277d751f029d2e06",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.suse.com/show_bug.cgi?id=1096726",
"https://github.com/moby/moby/pull/39252",
"http://www.openwall.com/lists/oss-security/2019/05/28/1",
"http://www.securityfocus.com/bid/108507",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00066.html",
"https://usn.ubuntu.com/4048-1/",
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-15664",
"https://access.redhat.com/errata/RHSA-2019:1910",
"http://www.openwall.com/lists/oss-security/2019/08/21/1",
"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html",
},
},
{
ID: "CVE-2018-15747",
Path: "2018/15xxx/CVE-2018-15747.json",
BlobHash: "abb866308a8fdcfcf8d915e56024d8bdb9bf9521",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/prasmussen/glot-code-runner/issues/15",
},
},
{
ID: "CVE-2018-15869",
Path: "2018/15xxx/CVE-2018-15869.json",
BlobHash: "bddc4e3d6a904e86f183f314f744743ea14ad283",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.securityfocus.com/bid/105172",
"https://github.com/hashicorp/packer/issues/6584",
},
},
{
ID: "CVE-2018-16316",
Path: "2018/16xxx/CVE-2018-16316.json",
BlobHash: "53d8827f84704705acf59957d84f0979be815f38",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/portainer/portainer/commit/1ad150c99460a35224d6adfe48ddda9ee056b7d2",
},
},
{
ID: "CVE-2018-16359",
Path: "2018/16xxx/CVE-2018-16359.json",
BlobHash: "c42eb49fc474c15d577dbc3ccc64de8164e152bd",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugs.chromium.org/p/project-zero/issues/detail?id=1632",
"https://github.com/google/gvisor/commit/001a4c2493b13a43d62c7511fb509a959ae4abc2",
},
},
{
ID: "CVE-2018-16398",
Path: "2018/16xxx/CVE-2018-16398.json",
BlobHash: "232319722bf894c43c9d7d8affffff8161b0dd2a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/twistlock/authz/issues/50",
"https://github.com/twistlock/authz/issues/51",
},
},
{
ID: "CVE-2018-16409",
Path: "2018/16xxx/CVE-2018-16409.json",
BlobHash: "39f379ecda7f8971a7ca7e02925776cd65515f98",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gogs/gogs/issues/5372",
},
},
{
ID: "CVE-2018-16733",
Path: "2018/16xxx/CVE-2018-16733.json",
BlobHash: "2c31ccc6fc823bcdc7ad873e55ab4cfa8bfc226a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ethereum/go-ethereum/commit/106d196ec4a6451efedc60ab15957f231fa85639",
},
},
{
ID: "CVE-2018-16859",
Path: "2018/16xxx/CVE-2018-16859.json",
BlobHash: "678f6a27e55ee773abf1427413a47e878fbe8ae8",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ansible/ansible/pull/49142",
"https://access.redhat.com/errata/RHSA-2018:3770",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16859",
"https://access.redhat.com/errata/RHSA-2018:3771",
"http://www.securityfocus.com/bid/106004",
"https://access.redhat.com/errata/RHSA-2018:3773",
"https://access.redhat.com/errata/RHSA-2018:3772",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html",
},
},
{
ID: "CVE-2018-16876",
Path: "2018/16xxx/CVE-2018-16876.json",
BlobHash: "5380288314b1345acd95ec6a54e23d564badb9ac",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://access.redhat.com/errata/RHSA-2018:3838",
"https://access.redhat.com/errata/RHSA-2019:0564",
"http://www.securityfocus.com/bid/106225",
"https://access.redhat.com/errata/RHSA-2018:3836",
"https://access.redhat.com/errata/RHSA-2018:3835",
"https://github.com/ansible/ansible/pull/49569",
"https://access.redhat.com/errata/RHSA-2018:3837",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16876",
"https://www.debian.org/security/2019/dsa-4396",
"https://access.redhat.com/errata/RHSA-2019:0590",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html",
"https://usn.ubuntu.com/4072-1/",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html",
},
},
{
ID: "CVE-2018-17031",
Path: "2018/17xxx/CVE-2018-17031.json",
BlobHash: "7bab8a1dc52969e53cac17f0637c761926dc26a8",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gogs/gogs/issues/5397",
},
},
{
ID: "CVE-2018-17456",
Path: "2018/17xxx/CVE-2018-17456.json",
BlobHash: "5335a4699d4dcd8179960df573f4745a593613d4",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.exploit-db.com/exploits/45631/",
"http://www.securityfocus.com/bid/105523",
"http://www.securitytracker.com/id/1041811",
"https://www.debian.org/security/2018/dsa-4311",
"https://access.redhat.com/errata/RHSA-2018:3505",
"https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404",
"https://www.exploit-db.com/exploits/45548/",
"https://access.redhat.com/errata/RHSA-2018:3541",
"https://github.com/git/git/commit/a124133e1e6ab5c7a9fef6d0e6bcb084e3455b46",
"https://access.redhat.com/errata/RHSA-2018:3408",
"https://marc.info/?l=git&m=153875888916397&w=2",
"https://www.openwall.com/lists/oss-security/2018/10/06/3",
"https://usn.ubuntu.com/3791-1/",
"https://seclists.org/bugtraq/2019/Mar/30",
"http://www.securityfocus.com/bid/107511",
"http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html",
"https://access.redhat.com/errata/RHSA-2020:0316",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html",
},
},
{
ID: "CVE-2018-17572",
Path: "2018/17xxx/CVE-2018-17572.json",
BlobHash: "e91cbd3483163459057b92a35e691421d94c1118",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://gist.github.com/Raghavrao29/1cb84f1f2d8ce993fd7b2d1366d35f48",
"https://github.com/influxdata/influxdb/releases/tag/v0.9.6",
},
},
{
ID: "CVE-2018-18264",
Path: "2018/18xxx/CVE-2018-18264.json",
BlobHash: "9d1fca97635951f2ed39a0f726787f404f1a339b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://sysdig.com/blog/privilege-escalation-kubernetes-dashboard/",
"http://www.securityfocus.com/bid/106493",
"https://groups.google.com/forum/#!topic/kubernetes-announce/yBrFf5nmvfI",
"https://github.com/kubernetes/dashboard/releases/tag/v1.10.1",
"https://github.com/kubernetes/dashboard/pull/3400",
"https://github.com/kubernetes/dashboard/pull/3289",
},
},
{
ID: "CVE-2018-18553",
Path: "2018/18xxx/CVE-2018-18553.json",
BlobHash: "f0cced225e5b727eee78018a67090affecf7c7ae",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/leanote/leanote/issues/822",
},
},
{
ID: "CVE-2018-18623",
Path: "2018/18xxx/CVE-2018-18623.json",
BlobHash: "59f314eb5b689b83359e92d05d8df451707f8eca",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/grafana/pull/11813",
"https://security.netapp.com/advisory/ntap-20200608-0008/",
},
},
{
ID: "CVE-2018-18624",
Path: "2018/18xxx/CVE-2018-18624.json",
BlobHash: "774fe9ebe536fc3fc5e5f20b188595ac44c80084",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/grafana/pull/11813",
"https://security.netapp.com/advisory/ntap-20200608-0008/",
},
},
{
ID: "CVE-2018-18625",
Path: "2018/18xxx/CVE-2018-18625.json",
BlobHash: "e427129bbe49ac34bfec64e93c5235be9cb906b3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/grafana/pull/11813",
"https://security.netapp.com/advisory/ntap-20200608-0008/",
},
},
{
ID: "CVE-2018-18925",
Path: "2018/18xxx/CVE-2018-18925.json",
BlobHash: "094fea40676b8ff3b0f8f28ce482c38bfa9c0dc8",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gogs/gogs/issues/5469",
},
},
{
ID: "CVE-2018-18926",
Path: "2018/18xxx/CVE-2018-18926.json",
BlobHash: "9f8984abcd9be9d1192ec0eb53771cedeb0ccb7e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/go-gitea/gitea/issues/5140",
},
},
{
ID: "CVE-2018-19114",
Path: "2018/19xxx/CVE-2018-19114.json",
BlobHash: "76e9d3b69b0961db9efaf478f1666d2518cdce18",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/lifei6671/mindoc/issues/384",
},
},
{
ID: "CVE-2018-19148",
Path: "2018/19xxx/CVE-2018-19148.json",
BlobHash: "5230ee0573997298a29e85e471f230e9ee5ee320",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/mholt/caddy/pull/2015",
"https://github.com/mholt/caddy/issues/1303",
"https://github.com/mholt/caddy/issues/2334",
},
},
{
ID: "CVE-2018-19184",
Path: "2018/19xxx/CVE-2018-19184.json",
BlobHash: "ae25d83c06c8683e86c63fbed23c14fad844bca6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ethereum/go-ethereum/issues/18069",
},
},
{
ID: "CVE-2018-19295",
Path: "2018/19xxx/CVE-2018-19295.json",
BlobHash: "17864661bfc1bde9f3b20836ec844f88c0c00d2a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/sylabs/singularity/releases/tag/2.6.1",
},
},
{
ID: "CVE-2018-19333",
Path: "2018/19xxx/CVE-2018-19333.json",
BlobHash: "c234aa4daf9af3a2c9119b1da9ea3f33b467067d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://justi.cz/security/2018/11/14/gvisor-lpe.html",
"https://github.com/google/gvisor/commit/0e277a39c8b6f905e289b75e8ad0594e6b3562ca",
},
},
{
ID: "CVE-2018-19367",
Path: "2018/19xxx/CVE-2018-19367.json",
BlobHash: "a3340712dbc79533ebb2e6332efd6314c6325cc8",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/lichti/shodan-portainer/",
"https://github.com/portainer/portainer/issues/2475",
},
},
{
ID: "CVE-2018-19466",
Path: "2018/19xxx/CVE-2018-19466.json",
BlobHash: "06c52909067b881c6cef8398f6f7eb99d81a99e0",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/portainer/portainer/pull/2488",
"https://github.com/portainer/portainer/releases",
"https://github.com/MauroEldritch/lempo",
},
},
{
ID: "CVE-2018-19653",
Path: "2018/19xxx/CVE-2018-19653.json",
BlobHash: "7c7de73314eb58e4e50ff65a3f93c8e97e0001e6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/forum/#!topic/consul-tool/7TCw06oio0I",
"https://github.com/hashicorp/consul/pull/5069",
},
},
{
ID: "CVE-2018-19786",
Path: "2018/19xxx/CVE-2018-19786.json",
BlobHash: "44fc7dda05c3e2fddb648168a0287f4345aeeadb",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#100-december-3rd-2018",
},
},
{
ID: "CVE-2018-19793",
Path: "2018/19xxx/CVE-2018-19793.json",
BlobHash: "52f5a3da668af5c966cdaba22f3c98998a424994",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/iwannay/jiacrontab/issues/28",
},
},
{
ID: "CVE-2018-20303",
Path: "2018/20xxx/CVE-2018-20303.json",
BlobHash: "2779443b720a0c9de37b3f3f9e3e11d9a551758d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gogs/gogs/commit/ff93d9dbda5cebe90d86e4b7dfb2c6b8642970ce",
"https://pentesterlab.com/exercises/cve-2018-18925/",
"https://github.com/gogs/gogs/issues/5558",
},
},
{
ID: "CVE-2018-20421",
Path: "2018/20xxx/CVE-2018-20421.json",
BlobHash: "44708b3178d64441e737723c276c09be2a68458c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ethereum/go-ethereum/issues/18289",
},
},
{
ID: "CVE-2018-20699",
Path: "2018/20xxx/CVE-2018-20699.json",
BlobHash: "dacf7cf3d7d29ae5e23e75ba7131ec150742a6aa",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/docker/engine/pull/70",
"https://github.com/moby/moby/pull/37967",
"https://access.redhat.com/errata/RHSA-2019:0487",
},
},
{
ID: "CVE-2018-20744",
Path: "2018/20xxx/CVE-2018-20744.json",
BlobHash: "1cefda4afbed2d638e20c35d2c933d0b5f040517",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.securityfocus.com/bid/106834",
"https://github.com/rs/cors/issues/55",
"https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-chen.pdf",
},
},
{
ID: "CVE-2018-21034",
Path: "2018/21xxx/CVE-2018-21034.json",
BlobHash: "56d67bbf8f84d7891fe18cb9e5e4ccf57d2c950f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/argoproj/argo-cd/blob/a1afe44066fcd0a0ab90a02a23177164bbad42cf/util/diff/diff.go#L399",
"https://github.com/argoproj/argo-cd/issues/470",
"https://github.com/argoproj/argo-cd/pull/3088",
"https://www.soluble.ai/blog/argo-cves-2020",
},
},
{
ID: "CVE-2018-21233",
Path: "2018/21xxx/CVE-2018-21233.json",
BlobHash: "9937c0c3e6b76e59e2ca443213aff777788924a4",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-001.md",
"https://github.com/tensorflow/tensorflow/commit/49f73c55d56edffebde4bca4a407ad69c1cae433",
},
},
{
ID: "CVE-2018-7575",
Path: "2018/7xxx/CVE-2018-7575.json",
BlobHash: "9343295dfee30eb28e116826e8850d64aabf441a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-004.md",
},
},
{
ID: "CVE-2018-7576",
Path: "2018/7xxx/CVE-2018-7576.json",
BlobHash: "2453c5b8afea3b098674f54d18903bead7dd5f7a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-002.md",
},
},
{
ID: "CVE-2018-7577",
Path: "2018/7xxx/CVE-2018-7577.json",
BlobHash: "8157d1ce7a37342f460099bf7dbf3a5a99b1f91b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-005.md",
},
},
{
ID: "CVE-2018-8825",
Path: "2018/8xxx/CVE-2018-8825.json",
BlobHash: "17abad64af8aa7178a1f18c852d2ead398d566ca",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-003.md",
},
},
{
ID: "CVE-2018-9057",
Path: "2018/9xxx/CVE-2018-9057.json",
BlobHash: "b752bd349b89c035a8dfe9beb1e00500b3eabe64",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/terraform-providers/terraform-provider-aws/pull/3934",
},
},
{
ID: "CVE-2019-1000002",
Path: "2019/1000xxx/CVE-2019-1000002.json",
BlobHash: "025ede9d25a3d3f4675742a15bf6613c65329185",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/go-gitea/gitea/pull/5631",
},
},
{
ID: "CVE-2019-1002100",
Path: "2019/1002xxx/CVE-2019-1002100.json",
BlobHash: "e0b89cbfecc6bda0ddc9328c14c464d0f530d569",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.securityfocus.com/bid/107290",
"https://groups.google.com/forum/#!topic/kubernetes-announce/vmUUNkYfG9g",
"https://github.com/kubernetes/kubernetes/issues/74534",
"https://security.netapp.com/advisory/ntap-20190416-0002/",
"https://access.redhat.com/errata/RHSA-2019:1851",
"https://access.redhat.com/errata/RHSA-2019:3239",
},
},
{
ID: "CVE-2019-1002101",
Path: "2019/1002xxx/CVE-2019-1002101.json",
BlobHash: "fc334f7e1f3d69f0a0aa7f96aeb508e914eb608e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/pull/75037",
"http://www.securityfocus.com/bid/107652",
"https://access.redhat.com/errata/RHBA-2019:0620",
"https://access.redhat.com/errata/RHBA-2019:0619",
"https://access.redhat.com/errata/RHBA-2019:0636",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPV2RE5RMOGUVP5WJMXKQJZUBBLAFZPZ/",
"http://www.openwall.com/lists/oss-security/2019/06/21/1",
"http://www.openwall.com/lists/oss-security/2019/08/05/5",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QZB7E3DOZ5WDG46XAIU6K32CXHXPXB2F/",
"https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/",
},
},
{
ID: "CVE-2019-1010003",
Path: "2019/1010xxx/CVE-2019-1010003.json",
BlobHash: "42d5629bcde21ead9f2a00a657cac5e87d417353",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/leanote/leanote/issues/719",
},
},
{
ID: "CVE-2019-1010261",
Path: "2019/1010xxx/CVE-2019-1010261.json",
BlobHash: "f3831638d12b38f33ea883beef62a45010809b5c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/go-gitea/gitea/pull/5905",
},
},
{
ID: "CVE-2019-1010275",
Path: "2019/1010xxx/CVE-2019-1010275.json",
BlobHash: "fe4e49a7a24105b11d76a66df4c7b4d0b29326bf",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/helm/helm/releases/tag/v2.7.2",
"https://github.com/helm/helm/pull/3152",
"https://github.com/helm/helm/pull/3152/files/1096813bf9a425e2aa4ac755b6c991b626dfab50",
},
},
{
ID: "CVE-2019-1010314",
Path: "2019/1010xxx/CVE-2019-1010314.json",
BlobHash: "ee33fb655d9cdb556729967d0e5795044a74797e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/go-gitea/gitea/releases",
},
},
{
ID: "CVE-2019-10152",
Path: "2019/10xxx/CVE-2019-10152.json",
BlobHash: "8caa697ce18f612e3f89e82105107920bc18512b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10152",
"https://github.com/containers/libpod/issues/3211",
"https://github.com/containers/libpod/pull/3214",
"https://github.com/containers/libpod/blob/master/RELEASE_NOTES.md#140",
"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html",
},
},
{
ID: "CVE-2019-10156",
Path: "2019/10xxx/CVE-2019-10156.json",
BlobHash: "9bca6bd659046577d701e51ccbb3e127e06ff77d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10156",
"https://github.com/ansible/ansible/pull/57188",
"https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html",
"https://access.redhat.com/errata/RHSA-2019:3744",
"https://access.redhat.com/errata/RHSA-2019:3789",
"https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html",
},
},
{
ID: "CVE-2019-10165",
Path: "2019/10xxx/CVE-2019-10165.json",
BlobHash: "ebeba6c38254ff460ab6b1a5da153d9c47c9407a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10165",
"https://github.com/openshift/cluster-kube-apiserver-operator/pull/499/",
"https://github.com/openshift/cluster-openshift-apiserver-operator/pull/205",
},
},
{
ID: "CVE-2019-10200",
Path: "2019/10xxx/CVE-2019-10200.json",
BlobHash: "dbc0d981d4cc09a63bde8bfd9c87f6a6b23f287d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1730161",
"https://github.com/openshift/cluster-kube-apiserver-operator/pull/524",
},
},
{
ID: "CVE-2019-1020009",
Path: "2019/1020xxx/CVE-2019-1020009.json",
BlobHash: "1ae26a4c91f2bc53ee44fadd4374e20e2c72832a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kolide/fleet/security/advisories/GHSA-6g7f-8qm4-f7h8",
},
},
{
ID: "CVE-2019-1020014",
Path: "2019/1020xxx/CVE-2019-1020014.json",
BlobHash: "8ea048b124de215f7cae83a713d807802ad5ce13",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/docker/docker-credential-helpers/commit/1c9f7ede70a5ab9851f4c9cb37d317fd89cd318a",
"https://github.com/docker/docker-credential-helpers/releases/tag/v0.6.3",
"https://usn.ubuntu.com/4103-1/",
"https://usn.ubuntu.com/4103-2/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VVFB6UWUK2GQQN7DVUU6GRRAL637A73/",
},
},
{
ID: "CVE-2019-1020015",
Path: "2019/1020xxx/CVE-2019-1020015.json",
BlobHash: "83816b3b659ad58e520ed2e8a6927f856602c108",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hasura/graphql-engine/commit/f2f14e727b051e3003ba44b9b63eab8186b291ac",
},
},
{
ID: "CVE-2019-10217",
Path: "2019/10xxx/CVE-2019-10217.json",
BlobHash: "7fbf95dcee87cd58c34f9947cc3d51ebbc4c1e64",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10217",
"https://github.com/ansible/ansible/issues/56269",
"https://github.com/ansible/ansible/pull/59427",
"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html",
},
},
{
ID: "CVE-2019-10223",
Path: "2019/10xxx/CVE-2019-10223.json",
BlobHash: "f06bcfd6195f7257a34b188fd665a3b9cdfe61c6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.openwall.com/lists/oss-security/2019/08/15/8",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10223",
"https://github.com/kubernetes/kube-state-metrics/releases/tag/v1.7.2",
"https://www.openwall.com/lists/oss-security/2019/08/09/1",
},
},
{
ID: "CVE-2019-10743",
Path: "2019/10xxx/CVE-2019-10743.json",
BlobHash: "78dfc1f5c94cf1480c02ac5ef1f8c3bcaaedfa0b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://snyk.io/research/zip-slip-vulnerability",
"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARC-174728,",
"https://github.com/mholt/archiver/pull/169",
},
},
{
ID: "CVE-2019-11043",
Path: "2019/11xxx/CVE-2019-11043.json",
BlobHash: "efbcf584e1363faeb3eb773648d2ce43da0e9335",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/neex/phuip-fpizdam",
"https://bugs.php.net/bug.php?id=78599",
"https://usn.ubuntu.com/4166-1/",
"https://www.debian.org/security/2019/dsa-4552",
"https://www.debian.org/security/2019/dsa-4553",
"https://usn.ubuntu.com/4166-2/",
"https://support.f5.com/csp/article/K75408500?utm_source=f5support&utm_medium=RSS",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/",
"https://security.netapp.com/advisory/ntap-20191031-0003/",
"https://access.redhat.com/errata/RHSA-2019:3286",
"https://access.redhat.com/errata/RHSA-2019:3287",
"https://access.redhat.com/errata/RHSA-2019:3299",
"https://access.redhat.com/errata/RHSA-2019:3300",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html",
"https://access.redhat.com/errata/RHSA-2019:3724",
"https://access.redhat.com/errata/RHSA-2019:3735",
"https://access.redhat.com/errata/RHSA-2019:3736",
"https://www.synology.com/security/advisory/Synology_SA_19_36",
"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html",
"https://support.apple.com/kb/HT210919",
"https://seclists.org/bugtraq/2020/Jan/44",
"http://seclists.org/fulldisclosure/2020/Jan/40",
"https://access.redhat.com/errata/RHSA-2020:0322",
"http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html",
},
},
{
ID: "CVE-2019-11228",
Path: "2019/11xxx/CVE-2019-11228.json",
BlobHash: "91ad8aad6f9734cd90b3f06f6e2613b7154004e9",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/go-gitea/gitea/releases/tag/v1.8.0-rc3",
"https://github.com/go-gitea/gitea/releases/tag/v1.7.6",
},
},
{
ID: "CVE-2019-11229",
Path: "2019/11xxx/CVE-2019-11229.json",
BlobHash: "7dc2899d18260f82d6cfa35ae699107ac55affc6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/go-gitea/gitea/releases/tag/v1.8.0-rc3",
"https://github.com/go-gitea/gitea/releases/tag/v1.7.6",
"http://packetstormsecurity.com/files/160833/Gitea-1.7.5-Remote-Code-Execution.html",
},
},
{
ID: "CVE-2019-11243",
Path: "2019/11xxx/CVE-2019-11243.json",
BlobHash: "240224e18d72e19314d8e206100446f0a275b49e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/76797",
"http://www.securityfocus.com/bid/108053",
"https://security.netapp.com/advisory/ntap-20190509-0002/",
},
},
{
ID: "CVE-2019-11244",
Path: "2019/11xxx/CVE-2019-11244.json",
BlobHash: "ee426f62fc258992ee5c5add5afa24866183049f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/76676",
"http://www.securityfocus.com/bid/108064",
"https://security.netapp.com/advisory/ntap-20190509-0002/",
"https://access.redhat.com/errata/RHSA-2019:3942",
"https://access.redhat.com/errata/RHSA-2020:0020",
"https://access.redhat.com/errata/RHSA-2020:0074",
},
},
{
ID: "CVE-2019-11245",
Path: "2019/11xxx/CVE-2019-11245.json",
BlobHash: "ada2d8773e54a20b336e667f6090b889da32e60e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/78308",
"https://security.netapp.com/advisory/ntap-20190919-0003/",
},
},
{
ID: "CVE-2019-11246",
Path: "2019/11xxx/CVE-2019-11246.json",
BlobHash: "d77d041f1845f282f19721f1b2c7eb293aa8f7c3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/pull/76788",
"https://groups.google.com/forum/#!topic/kubernetes-security-announce/NLs2TGbfPdo",
"https://security.netapp.com/advisory/ntap-20190919-0003/",
},
},
{
ID: "CVE-2019-11247",
Path: "2019/11xxx/CVE-2019-11247.json",
BlobHash: "026587a117d05ad182dd6e2d9e96f2d0865cb2b9",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/80983",
"https://groups.google.com/d/msg/kubernetes-security-announce/vUtEcSEY6SM/v2ZZxsmtFQAJ",
"https://access.redhat.com/errata/RHSA-2019:2690",
"https://security.netapp.com/advisory/ntap-20190919-0003/",
"https://access.redhat.com/errata/RHBA-2019:2816",
"https://access.redhat.com/errata/RHBA-2019:2824",
"https://access.redhat.com/errata/RHSA-2019:2769",
},
},
{
ID: "CVE-2019-11248",
Path: "2019/11xxx/CVE-2019-11248.json",
BlobHash: "00d4505f9edf499002ad21d1106879358cd7299a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/81023",
"https://groups.google.com/d/msg/kubernetes-security-announce/pKELclHIov8/BEDtRELACQAJ",
"https://security.netapp.com/advisory/ntap-20190919-0003/",
},
},
{
ID: "CVE-2019-11249",
Path: "2019/11xxx/CVE-2019-11249.json",
BlobHash: "47f2be6cfd55d6f91c805f77435fea5eda2c972c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/d/msg/kubernetes-security-announce/vUtEcSEY6SM/v2ZZxsmtFQAJ",
"https://github.com/kubernetes/kubernetes/issues/80984",
"https://security.netapp.com/advisory/ntap-20190919-0003/",
"https://access.redhat.com/errata/RHBA-2019:2816",
"https://access.redhat.com/errata/RHBA-2019:2794",
"https://access.redhat.com/errata/RHBA-2019:2824",
"https://access.redhat.com/errata/RHSA-2019:3239",
"https://access.redhat.com/errata/RHSA-2019:3811",
},
},
{
ID: "CVE-2019-11251",
Path: "2019/11xxx/CVE-2019-11251.json",
BlobHash: "4c8f81bc45c5b6ae61871ed463956147eb35057b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/87773",
"https://groups.google.com/d/msg/kubernetes-announce/YYtEFdFimZ4/nZnOezZuBgAJ",
},
},
{
ID: "CVE-2019-11252",
Path: "2019/11xxx/CVE-2019-11252.json",
BlobHash: "92b566eb58a6bfab63e2bc67c35d85e6342ab81d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/pull/88684",
},
},
{
ID: "CVE-2019-11255",
Path: "2019/11xxx/CVE-2019-11255.json",
BlobHash: "a1bac48c650c8fc51190ab12dca53f9dad7dc2fb",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/85233",
"https://groups.google.com/forum/#!topic/kubernetes-security-announce/aXiYN0q4uIw",
"https://access.redhat.com/errata/RHSA-2019:4099",
"https://access.redhat.com/errata/RHSA-2019:4096",
"https://access.redhat.com/errata/RHSA-2019:4054",
"https://access.redhat.com/errata/RHSA-2019:4225",
"https://security.netapp.com/advisory/ntap-20200810-0003/",
},
},
{
ID: "CVE-2019-11328",
Path: "2019/11xxx/CVE-2019-11328.json",
BlobHash: "e84895b0fa29fcacb03922f45e8a8917dba0d2a9",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/sylabs/singularity/releases/tag/v3.2.0",
"http://www.openwall.com/lists/oss-security/2019/05/16/1",
"http://www.securityfocus.com/bid/108360",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNU5BUHFOTYUZVHFUSX2VG4S3RCPUEMA/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5O3TPL5OOTIZEI4H6IQBCCISBARJ6WL3/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LIHV7DSEVTB5SUPEZ2UXGS3Q6WMEQSO2/",
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00028.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html",
},
},
{
ID: "CVE-2019-11405",
Path: "2019/11xxx/CVE-2019-11405.json",
BlobHash: "b428a95b1dec6aeb4a742a930834a5af2ae4e696",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/OpenAPITools/openapi-generator/issues/2253",
"https://github.com/OpenAPITools/openapi-generator/pull/2248",
"https://github.com/OpenAPITools/openapi-generator/pull/2697",
},
},
{
ID: "CVE-2019-11471",
Path: "2019/11xxx/CVE-2019-11471.json",
BlobHash: "2efee46b4fef111a80fbca929f440c6d1e99d951",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/strukturag/libheif/issues/123",
"https://github.com/strukturag/libheif/commit/995a4283d8ed2d0d2c1ceb1a577b993df2f0e014",
},
},
{
ID: "CVE-2019-11502",
Path: "2019/11xxx/CVE-2019-11502.json",
BlobHash: "f2a4e1adde7ef761a7ce10889105fb109b82b80c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.openwall.com/lists/oss-security/2019/04/18/4",
"https://github.com/snapcore/snapd/commit/bdbfeebef03245176ae0dc323392bb0522a339b1",
"http://www.openwall.com/lists/oss-security/2019/04/25/7",
},
},
{
ID: "CVE-2019-11503",
Path: "2019/11xxx/CVE-2019-11503.json",
BlobHash: "59e3c0411f4ccd201662e0650f62acd0f328bdd6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.openwall.com/lists/oss-security/2019/04/18/4",
"https://github.com/snapcore/snapd/pull/6642",
"http://www.openwall.com/lists/oss-security/2019/04/25/7",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VACEKVQ7UAZ32WO4ZKCFW6YOBSYJ76L/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPU6APEZHAA7N2AI57OT4J2P7NKHFOLM/",
},
},
{
ID: "CVE-2019-11576",
Path: "2019/11xxx/CVE-2019-11576.json",
BlobHash: "3b90488fb237206082010ff8265beab7ec0dcb8a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://blog.gitea.io/2019/04/gitea-1.8.0-is-released/",
"https://github.com/go-gitea/gitea/pull/6674",
},
},
{
ID: "CVE-2019-11641",
Path: "2019/11xxx/CVE-2019-11641.json",
BlobHash: "d91faee964c8eee67eb31bbdfb95e258ecba0dbe",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/threatstream/agave/issues/1",
},
},
{
ID: "CVE-2019-11881",
Path: "2019/11xxx/CVE-2019-11881.json",
BlobHash: "ec2bf57ca5fd5f3c95d06c8fe5f052a9b2b5958a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/MauroEldritch/VanCleef",
"https://github.com/rancher/rancher/issues/20216",
},
},
{
ID: "CVE-2019-11938",
Path: "2019/11xxx/CVE-2019-11938.json",
BlobHash: "0398da0e1431d14677d55020500d17943ef4fb93",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/facebook/fbthrift/commit/08c2d412adb214c40bb03be7587057b25d053030",
"https://github.com/facebook/fbthrift/commit/71c97ffdcb61cccf1f8267774e873e21ebd3ebd3",
"https://www.facebook.com/security/advisories/cve-2019-11938",
},
},
{
ID: "CVE-2019-12291",
Path: "2019/12xxx/CVE-2019-12291.json",
BlobHash: "ff4c4bccd23c52a9d1034ef7218d31bafba28423",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hashicorp/consul/issues/5888",
},
},
{
ID: "CVE-2019-12452",
Path: "2019/12xxx/CVE-2019-12452.json",
BlobHash: "3bfedf7f9b1c3dd830d1ab48ef930747ece63146",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/containous/traefik/issues/4917",
"https://github.com/containous/traefik/pull/4918",
"https://docs.traefik.io/configuration/api/#security",
},
},
{
ID: "CVE-2019-12494",
Path: "2019/12xxx/CVE-2019-12494.json",
BlobHash: "258fadf0b886fa7a254e061157499782629f282f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gardener/vpn/issues/40",
"https://github.com/gardener/gardener/pull/874",
"https://groups.google.com/forum/#!topic/gardener/pH6dNIEhv-A",
},
},
{
ID: "CVE-2019-12618",
Path: "2019/12xxx/CVE-2019-12618.json",
BlobHash: "383b97a16200129465fb17e8585798806cdbe0ad",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/nomad",
"https://github.com/hashicorp/nomad/issues/5783",
"https://www.hashicorp.com/blog/hashicorp-nomad-0-9-2",
},
},
{
ID: "CVE-2019-12995",
Path: "2019/12xxx/CVE-2019-12995.json",
BlobHash: "c026aab113dc55ebe03006aef81b4cc16296ebc7",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://istio.io/about/notes/",
"https://github.com/istio/istio/issues/15084",
"https://github.com/istio/istio.io/pull/4555",
},
},
{
ID: "CVE-2019-12999",
Path: "2019/12xxx/CVE-2019-12999.json",
BlobHash: "e76cd1687069c4af03dba8a65ba9c448776f8467",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/lightningnetwork/lnd/commits/master",
"https://github.com/lightningnetwork/lnd/releases/tag/v0.7.0-beta",
"https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html",
},
},
{
ID: "CVE-2019-13068",
Path: "2019/13xxx/CVE-2019-13068.json",
BlobHash: "0a67265314aad32b9195fc1ecc63ecdbefff63a0",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/grafana/issues/17718",
"https://github.com/grafana/grafana/releases/tag/v6.2.5",
"https://security.netapp.com/advisory/ntap-20190710-0001/",
},
},
{
ID: "CVE-2019-13126",
Path: "2019/13xxx/CVE-2019-13126.json",
BlobHash: "55b267640f33a4f3a1b70bfebd68b670a156af55",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.twistlock.com/labs-blog/finding-dos-vulnerability-nats-go-fuzz-cve-2019-13126/",
"https://github.com/nats-io/nats-server/pull/1053",
},
},
{
ID: "CVE-2019-13139",
Path: "2019/13xxx/CVE-2019-13139.json",
BlobHash: "affbd0b23c6d4cf05cf0493a761621959e397d5d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/moby/moby/pull/38944",
"https://docs.docker.com/engine/release-notes/#18094",
"https://staaldraad.github.io/post/2019-07-16-cve-2019-13139-docker-build/",
"https://www.debian.org/security/2019/dsa-4521",
"https://security.netapp.com/advisory/ntap-20190910-0001/",
"https://seclists.org/bugtraq/2019/Sep/21",
"https://access.redhat.com/errata/RHBA-2019:3092",
},
},
{
ID: "CVE-2019-13915",
Path: "2019/13xxx/CVE-2019-13915.json",
BlobHash: "c28c5b8ac1b46a51ff649b09511457f9a062f05d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/b3log/wide/issues/355",
},
},
{
ID: "CVE-2019-14243",
Path: "2019/14xxx/CVE-2019-14243.json",
BlobHash: "3d6ca6baefdec4c629814fd8742cb6c70c524b05",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://caddy.community/t/dos-in-http-proxyprotocol-plugin/6014",
"https://github.com/mastercactapus/proxyprotocol/issues/1",
"https://github.com/mastercactapus/caddy-proxyprotocol/issues/8",
"https://github.com/mastercactapus/proxyprotocol/compare/ef496d7...5c4a101",
"https://github.com/mastercactapus/proxyprotocol/commit/5c4a101121fc3e868026189c7a73f7f19eef90ac",
"https://github.com/mastercactapus/proxyprotocol/releases/tag/v0.0.2",
},
},
{
ID: "CVE-2019-14255",
Path: "2019/14xxx/CVE-2019-14255.json",
BlobHash: "080feaf39dde048b5eb8714ce9ceffe57771af2c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/cactus/go-camo/security/advisories/GHSA-xrmp-4542-q746",
},
},
{
ID: "CVE-2019-14271",
Path: "2019/14xxx/CVE-2019-14271.json",
BlobHash: "525144ea9bf237401b83dde566e97ee338088a56",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/moby/moby/issues/39449",
"https://docs.docker.com/engine/release-notes/",
"https://security.netapp.com/advisory/ntap-20190828-0003/",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html",
"https://www.debian.org/security/2019/dsa-4521",
"https://seclists.org/bugtraq/2019/Sep/21",
},
},
{
ID: "CVE-2019-14544",
Path: "2019/14xxx/CVE-2019-14544.json",
BlobHash: "d44e03d3e369947b16ff48b95f754d0097b04422",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gogs/gogs/issues/5764",
},
},
{
ID: "CVE-2019-14846",
Path: "2019/14xxx/CVE-2019-14846.json",
BlobHash: "e4504fea8a94bc8abf1a26c600394ecb42552d4f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14846",
"https://github.com/ansible/ansible/pull/63366",
"https://access.redhat.com/errata/RHSA-2019:3203",
"https://access.redhat.com/errata/RHSA-2019:3202",
"https://access.redhat.com/errata/RHSA-2019:3207",
"https://access.redhat.com/errata/RHSA-2019:3201",
"https://access.redhat.com/errata/RHSA-2020:0756",
"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html",
"https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html",
},
},
{
ID: "CVE-2019-14864",
Path: "2019/14xxx/CVE-2019-14864.json",
BlobHash: "05c5029f208e31be80468e1b08210407c44a0b76",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864",
"https://github.com/ansible/ansible/issues/63522",
"https://github.com/ansible/ansible/pull/63527",
"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html",
},
},
{
ID: "CVE-2019-14904",
Path: "2019/14xxx/CVE-2019-14904.json",
BlobHash: "79f65d4b41ccb1e253ab9a62354e27963949b935",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1776944",
"https://github.com/ansible/ansible/pull/65686",
"https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html",
},
},
{
ID: "CVE-2019-14940",
Path: "2019/14xxx/CVE-2019-14940.json",
BlobHash: "795b8ab72afb7caeb2b9fcc94851e0881bfb2e7d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/spdk/spdk/releases/tag/v19.07",
},
},
{
ID: "CVE-2019-14993",
Path: "2019/14xxx/CVE-2019-14993.json",
BlobHash: "dcb624b1dd02901374a40c981cbf752d066361d0",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383",
"https://github.com/envoyproxy/envoy/issues/7728",
"https://istio.io/blog/2019/istio-security-003-004/",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164",
},
},
{
ID: "CVE-2019-15043",
Path: "2019/15xxx/CVE-2019-15043.json",
BlobHash: "5d64b3160b773e51ecf38ba83cfffa33b3a0988c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://community.grafana.com/t/release-notes-v6-3-x/19202",
"https://github.com/grafana/grafana/releases",
"https://community.grafana.com/t/grafana-5-4-5-and-6-3-4-security-update/20569",
"https://grafana.com/blog/2019/08/29/grafana-5.4.5-and-6.3.4-released-with-important-security-fix/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RF5ARGYX3WYB7H2FDR7VAWTEQ27UX3FU/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UO4NBL7PKW4OSFRVZENGC42EWEJV2YAH/",
"https://security.netapp.com/advisory/ntap-20191004-0004/",
"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00060.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00009.html",
},
},
{
ID: "CVE-2019-15119",
Path: "2019/15xxx/CVE-2019-15119.json",
BlobHash: "0afdb67cace7095df25df975e881acd7b2512bb3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/cnlh/nps/issues/176",
"https://github.com/cnlh/nps/commit/7178b3380720e910d283036a8d39879a94105515",
},
},
{
ID: "CVE-2019-15225",
Path: "2019/15xxx/CVE-2019-15225.json",
BlobHash: "e4acf6d62c653e50bebe75585582a4c5ee8ab2a4",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy/issues/7728",
},
},
{
ID: "CVE-2019-15226",
Path: "2019/15xxx/CVE-2019-15226.json",
BlobHash: "d728ca5f8ba329e8d0d40bb6af1f115dfd186e04",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy/commits/master",
"https://github.com/envoyproxy/envoy/commit/afc39bea36fd436e54262f150c009e8d72db5014",
"https://github.com/envoyproxy/envoy/issues/8520",
},
},
{
ID: "CVE-2019-15562",
Path: "2019/15xxx/CVE-2019-15562.json",
BlobHash: "163789d5a1fd4f7430975ced3ca5b6ce4519089c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/jinzhu/gorm/releases/tag/v1.9.10",
"https://github.com/go-gorm/gorm/pull/2519",
"https://github.com/go-gorm/gorm/pull/2674",
"https://github.com/go-gorm/gorm/issues/2517#issuecomment-638145427",
},
},
{
ID: "CVE-2019-15716",
Path: "2019/15xxx/CVE-2019-15716.json",
BlobHash: "7469952f2a930ae410f6a261b4551adc302a1b76",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/wtfutil/wtf/compare/v0.18.0...v0.19.0",
"https://github.com/wtfutil/wtf/issues/517",
"https://github.com/wtfutil/wtf/blob/67658e172c9470e93e4122d6e2c90d01db12b0ac/cfg/config_files.go#L71-L72",
},
},
{
ID: "CVE-2019-16060",
Path: "2019/16xxx/CVE-2019-16060.json",
BlobHash: "9c378b379f482d7725baafb194a1acade28a4bbd",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/airbrake/airbrake-ruby/issues/468",
},
},
{
ID: "CVE-2019-16097",
Path: "2019/16xxx/CVE-2019-16097.json",
BlobHash: "4facc31796c17f1bb3e241cab3accb974b68c73f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/goharbor/harbor/commit/b6db8a8a106259ec9a2c48be8a380cb3b37cf517",
"https://github.com/goharbor/harbor/compare/v1.8.2...v1.9.0-rc1",
"https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/",
"https://github.com/goharbor/harbor/releases/tag/v1.8.3",
"https://github.com/goharbor/harbor/releases/tag/v1.7.6",
"http://www.vmware.com/security/advisories/VMSA-2019-0015.html",
},
},
{
ID: "CVE-2019-16146",
Path: "2019/16xxx/CVE-2019-16146.json",
BlobHash: "f7415bce429210272f7f522d58dc0a5aa197a9d2",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gophish/gophish/pull/1547",
},
},
{
ID: "CVE-2019-16214",
Path: "2019/16xxx/CVE-2019-16214.json",
BlobHash: "3c00f5013f369e52474a4b47c61c47dad3433c57",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://blog.openzeppelin.com/libra-vulnerability-summary/",
"https://blog.openzeppelin.com/libra-vulnerability-release/",
"https://github.com/libra/libra/commit/7efb0221989f17fdf7f8486730898ed947a1e19e",
},
},
{
ID: "CVE-2019-16355",
Path: "2019/16xxx/CVE-2019-16355.json",
BlobHash: "6c3717f918447251a41e2bf059f6aed70ef9e5bf",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/astaxie/beego/issues/3763",
},
},
{
ID: "CVE-2019-16778",
Path: "2019/16xxx/CVE-2019-16778.json",
BlobHash: "79c8ece60183840c81f4be3dd5b3f0c34073cdd6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-844w-j86r-4x2j",
"https://github.com/tensorflow/tensorflow/commit/db4f9717c41bccc3ce10099ab61996b246099892",
"https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2019-002.md",
},
},
{
ID: "CVE-2019-16919",
Path: "2019/16xxx/CVE-2019-16919.json",
BlobHash: "c83a62ca2397e93022bc1737ae1bb03add793d6f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://landscape.cncf.io/selected=harbor",
"http://www.vmware.com/security/advisories/VMSA-2019-0016.html",
"https://github.com/goharbor/harbor/security/advisories/GHSA-x2r2-w9c7-h624",
},
},
{
ID: "CVE-2019-18466",
Path: "2019/18xxx/CVE-2019-18466.json",
BlobHash: "e153cc928f291572de44893ea69a82169e3fd99a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1744588",
"https://github.com/containers/libpod/issues/3829",
"https://github.com/containers/libpod/commit/5c09c4d2947a759724f9d5aef6bac04317e03f7e",
"https://github.com/containers/libpod/compare/v1.5.1...v1.6.0",
"https://access.redhat.com/errata/RHSA-2019:4269",
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00040.html",
},
},
{
ID: "CVE-2019-18657",
Path: "2019/18xxx/CVE-2019-18657.json",
BlobHash: "9dd98b50e92943e0863c8d1703dad082c14de3bc",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ClickHouse/ClickHouse/pull/6466",
"https://github.com/ClickHouse/ClickHouse/blob/master/CHANGELOG.md",
"https://github.com/ClickHouse/ClickHouse/pull/7526/files",
},
},
{
ID: "CVE-2019-18801",
Path: "2019/18xxx/CVE-2019-18801.json",
BlobHash: "f32ec181fdf01f62dafabf2952f91bdde06b559c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy/commits/master",
"https://groups.google.com/forum/#!forum/envoy-users",
"https://blog.envoyproxy.io",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-gxvv-x4p2-rppp",
"https://access.redhat.com/errata/RHSA-2019:4222",
},
},
{
ID: "CVE-2019-18802",
Path: "2019/18xxx/CVE-2019-18802.json",
BlobHash: "69c5764c6435584d082e1ebe62c8d77dafe9e038",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy/commits/master",
"https://groups.google.com/forum/#!forum/envoy-users",
"https://blog.envoyproxy.io",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-356m-vhw2-wcm4",
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00034.html",
},
},
{
ID: "CVE-2019-18817",
Path: "2019/18xxx/CVE-2019-18817.json",
BlobHash: "7e1cfb65da95dc7c8a0915cb6f3791112fe33299",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://istio.io/news/2019/announcing-1.3.5/",
"https://github.com/istio/istio/issues/18229",
},
},
{
ID: "CVE-2019-18836",
Path: "2019/18xxx/CVE-2019-18836.json",
BlobHash: "7b94362aea5c82e2d167c886763553dabb569120",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/forum/#!forum/envoy-users",
"https://blog.envoyproxy.io",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xvf-4396-cj46",
"https://github.com/istio/istio/issues/18229",
},
},
{
ID: "CVE-2019-18838",
Path: "2019/18xxx/CVE-2019-18838.json",
BlobHash: "45f3cb1518e31e5c0311ff0c8a07edea3650fba7",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy/commits/master",
"https://groups.google.com/forum/#!forum/envoy-users",
"https://blog.envoyproxy.io",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-f2rv-4w6x-rwhc",
},
},
{
ID: "CVE-2019-18923",
Path: "2019/18xxx/CVE-2019-18923.json",
BlobHash: "5ab89fec75b1e5e9fc68200be2ecf3d081ad3b3c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/cactus/go-camo/blob/505862f7bf14c8b6ff945734d5f3fdcd929e45dd/pkg/camo/proxy.go#L453-L460",
"https://github.com/cactus/go-camo/security/advisories/GHSA-jg2r-qf99-4wvr",
},
},
{
ID: "CVE-2019-19023",
Path: "2019/19xxx/CVE-2019-19023.json",
BlobHash: "c65ec8265c7c221b10038390e54f83fb8fb57380",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/goharbor/harbor/security/advisories",
"https://tanzu.vmware.com/security/cve-2019-19023",
},
},
{
ID: "CVE-2019-19025",
Path: "2019/19xxx/CVE-2019-19025.json",
BlobHash: "319b42d2220549d97aa1b196a71bf1af6443dedb",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/goharbor/harbor/security/advisories",
"https://tanzu.vmware.com/security/cve-2019-19025",
"https://github.com/goharbor/harbor/security/advisories/GHSA-gcqm-v682-ccw6",
},
},
{
ID: "CVE-2019-19026",
Path: "2019/19xxx/CVE-2019-19026.json",
BlobHash: "2e2be398442b195e408aa00ef0c50504e1aafb4d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/goharbor/harbor/security/advisories",
"https://tanzu.vmware.com/security/cve-2019-19026",
"https://github.com/goharbor/harbor/security/advisories/GHSA-rh89-vvrg-fg64",
},
},
{
ID: "CVE-2019-19029",
Path: "2019/19xxx/CVE-2019-19029.json",
BlobHash: "9388b463ac82baa9b6b4c6248f707695b541ce02",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/goharbor/harbor/security/advisories",
"https://tanzu.vmware.com/security/cve-2019-19029",
"https://github.com/goharbor/harbor/security/advisories/GHSA-qcfv-8v29-469w",
},
},
{
ID: "CVE-2019-19316",
Path: "2019/19xxx/CVE-2019-19316.json",
BlobHash: "99e80ea26c6c3f1a43ef4c11e5f52939348b3c5f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hashicorp/terraform/security/advisories/GHSA-4rvg-555h-r626",
},
},
{
ID: "CVE-2019-19335",
Path: "2019/19xxx/CVE-2019-19335.json",
BlobHash: "e24b07367bb61f813bd8ad8e608a13068089b290",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19335",
},
},
{
ID: "CVE-2019-19349",
Path: "2019/19xxx/CVE-2019-19349.json",
BlobHash: "81759decb9c3b14e63d99ec2c01550a77f193dd3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1793284",
"https://bugzilla.redhat.com/show_bug.cgi?id=1791534",
},
},
{
ID: "CVE-2019-19350",
Path: "2019/19xxx/CVE-2019-19350.json",
BlobHash: "be7fda55b07cb415a2c5f586189a00586cca7082",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1791534",
"https://bugzilla.redhat.com/show_bug.cgi?id=1793283",
},
},
{
ID: "CVE-2019-19724",
Path: "2019/19xxx/CVE-2019-19724.json",
BlobHash: "159f7d803636dd2ef6313aa2471fa8dff9eb7f9d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/sylabs/singularity/releases/tag/v3.5.2",
"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00025.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html",
},
},
{
ID: "CVE-2019-19922",
Path: "2019/19xxx/CVE-2019-19922.json",
BlobHash: "6daf82d954d5ad555580ded4e6b34216e5ab1fb2",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9",
"https://github.com/torvalds/linux/commit/de53fd7aedb100f03e5d2231cfce0e4993282425",
"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de53fd7aedb100f03e5d2231cfce0e4993282425",
"https://relistan.com/the-kernel-may-be-slowing-down-your-app",
"https://github.com/kubernetes/kubernetes/issues/67577",
"https://usn.ubuntu.com/4226-1/",
"https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html",
"https://security.netapp.com/advisory/ntap-20200204-0002/",
},
},
{
ID: "CVE-2019-20329",
Path: "2019/20xxx/CVE-2019-20329.json",
BlobHash: "ad4ce06fbbd574a6742e8d43184caf2e721de2de",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/open-lambda/open-lambda/issues/92",
"https://github.com/open-lambda/open-lambda/blob/9f7f935195ca74700c60ebc1ecfdaefad40d144b/src/common/config.go#L135",
"https://github.com/open-lambda/open-lambda/blob/9f7f935195ca74700c60ebc1ecfdaefad40d144b/src/server/lambdaServer.go#L92-L97",
},
},
{
ID: "CVE-2019-20372",
Path: "2019/20xxx/CVE-2019-20372.json",
BlobHash: "cb8234e84e0802f06ee40be40c766b10d17b0974",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bertjwregeer.keybase.pub/2019-12-10%20-%20error_page%20request%20smuggling.pdf",
"http://nginx.org/en/CHANGES",
"https://duo.com/docs/dng-notes#version-1.5.4-january-2020",
"https://github.com/kubernetes/ingress-nginx/pull/4859",
"https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e",
"https://usn.ubuntu.com/4235-1/",
"https://usn.ubuntu.com/4235-2/",
"https://security.netapp.com/advisory/ntap-20200127-0003/",
"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00013.html",
},
},
{
ID: "CVE-2019-20377",
Path: "2019/20xxx/CVE-2019-20377.json",
BlobHash: "5ce3ea7ffb45e199b7fb3a9c26fa416c35433fa9",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tophubs/TopList/issues/32",
},
},
{
ID: "CVE-2019-20894",
Path: "2019/20xxx/CVE-2019-20894.json",
BlobHash: "e2b7f6503920679af3592d2acaa6c3ef5b83baf7",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/containous/traefik/issues/5312",
},
},
{
ID: "CVE-2019-20933",
Path: "2019/20xxx/CVE-2019-20933.json",
BlobHash: "53d3419759649147083c4e39c29cb795407d6823",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/influxdata/influxdb/issues/12927",
"https://github.com/influxdata/influxdb/compare/v1.7.5...v1.7.6",
"https://github.com/influxdata/influxdb/commit/761b557315ff9c1642cf3b0e5797cd3d983a24c0",
"https://lists.debian.org/debian-lts-announce/2020/12/msg00030.html",
"https://www.debian.org/security/2021/dsa-4823",
},
},
{
ID: "CVE-2019-25014",
Path: "2019/25xxx/CVE-2019-25014.json",
BlobHash: "d4cc6a06989f1abc359b4c47bf3c807cc898a458",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/istio/istio/compare/1.4.2...1.5.0-alpha.0",
"https://bugzilla.redhat.com/show_bug.cgi?id=1919066",
},
},
{
ID: "CVE-2019-3552",
Path: "2019/3xxx/CVE-2019-3552.json",
BlobHash: "c40a70560ec0e411812acff3a1bada2ecb3ce47c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/facebook/fbthrift/commit/c5d6e07588cd03061bc54d451a7fa6e84883d62b",
"http://www.securityfocus.com/bid/108279",
"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E",
},
},
{
ID: "CVE-2019-3553",
Path: "2019/3xxx/CVE-2019-3553.json",
BlobHash: "0d36004a8d58b25beb7a744d44fbcfb4c293deaf",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/facebook/fbthrift/commit/c9a903e5902834e95bbd4ab0e9fa53ba0189f351",
"https://github.com/facebook/fbthrift/commit/3f156207e8a6583d88999487e954320dc18955e6",
"https://www.facebook.com/security/advisories/cve-2019-3553",
},
},
{
ID: "CVE-2019-3558",
Path: "2019/3xxx/CVE-2019-3558.json",
BlobHash: "0a56ef93e603a8315c031e2e2ae979339406e18c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/facebook/fbthrift/commit/c5d6e07588cd03061bc54d451a7fa6e84883d62b",
"https://www.facebook.com/security/advisories/cve-2019-3558",
"http://www.securityfocus.com/bid/108274",
"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E",
},
},
{
ID: "CVE-2019-3559",
Path: "2019/3xxx/CVE-2019-3559.json",
BlobHash: "044998de6792e20e43bdc95fe51c581edef9fdc5",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/facebook/fbthrift/commit/a56346ceacad28bf470017a6bda1d5518d0bd943",
"https://www.facebook.com/security/advisories/cve-2019-3559",
"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E",
},
},
{
ID: "CVE-2019-3565",
Path: "2019/3xxx/CVE-2019-3565.json",
BlobHash: "52d4975f9164deaf7c50b81b00f369d7def6e55f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/facebook/fbthrift/commit/01686e15ec77ccb4d49a77d5bce3a01601e54d64",
"https://www.facebook.com/security/advisories/cve-2019-3565",
"http://www.securityfocus.com/bid/108280",
"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E",
},
},
{
ID: "CVE-2019-3826",
Path: "2019/3xxx/CVE-2019-3826.json",
BlobHash: "7c4bf71bc274679b9929c35618ac44685eeb066d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3826",
"https://github.com/prometheus/prometheus/pull/5163",
"https://github.com/prometheus/prometheus/commit/62e591f9",
"https://access.redhat.com/errata/RHBA-2019:0327",
"https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573@%3Ccommits.zookeeper.apache.org%3E",
"https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177@%3Ccommits.zookeeper.apache.org%3E",
"https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8@%3Ccommits.zookeeper.apache.org%3E",
"https://advisory.checkmarx.net/advisory/CX-2019-4297",
},
},
{
ID: "CVE-2019-3828",
Path: "2019/3xxx/CVE-2019-3828.json",
BlobHash: "ecf1efff5e523cf410bd7dad7d181a88090d7377",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ansible/ansible/pull/52133",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html",
"https://usn.ubuntu.com/4072-1/",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html",
"https://access.redhat.com/errata/RHSA-2019:3744",
"https://access.redhat.com/errata/RHSA-2019:3789",
},
},
{
ID: "CVE-2019-3841",
Path: "2019/3xxx/CVE-2019-3841.json",
BlobHash: "fb2cd94717b5e0267890e50fa3f05139cadba555",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubevirt/containerized-data-importer/issues/678",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3841",
},
},
{
ID: "CVE-2019-3990",
Path: "2019/3xxx/CVE-2019-3990.json",
BlobHash: "b28380c71c2d5e8c495a466ffd1693fd702ff1a9",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.tenable.com/security/research/tra-2019-50",
"https://github.com/goharbor/harbor/security/advisories/GHSA-6qj9-33j4-rvhg",
},
},
{
ID: "CVE-2019-5736",
Path: "2019/5xxx/CVE-2019-5736.json",
BlobHash: "a70763471650d8005dfa3efbc0d8ccbe6540d2f7",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/opencontainers/runc/commit/6635b4f0c6af3810594d2770f662f34ddc15b40d",
"https://access.redhat.com/errata/RHSA-2019:0408",
"https://github.com/rancher/runc-cve",
"https://access.redhat.com/errata/RHSA-2019:0401",
"https://github.com/docker/docker-ce/releases/tag/v18.09.2",
"https://www.synology.com/security/advisory/Synology_SA_19_06",
"https://security.netapp.com/advisory/ntap-20190307-0008/",
"https://access.redhat.com/errata/RHSA-2019:0303",
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc",
"https://github.com/q3k/cve-2019-5736-poc",
"https://www.exploit-db.com/exploits/46359/",
"https://github.com/opencontainers/runc/commit/0a8e4117e7f715d5fbeef398405813ce8e88558b",
"https://aws.amazon.com/security/security-bulletins/AWS-2019-002/",
"https://www.openwall.com/lists/oss-security/2019/02/11/2",
"https://kubernetes.io/blog/2019/02/11/runc-and-cve-2019-5736/",
"https://access.redhat.com/security/cve/cve-2019-5736",
"https://www.exploit-db.com/exploits/46369/",
"https://access.redhat.com/errata/RHSA-2019:0304",
"https://github.com/Frichetten/CVE-2019-5736-PoC",
"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03913en_us",
"https://brauner.github.io/2019/02/12/privileged-containers.html",
"https://www.twistlock.com/2019/02/11/how-to-mitigate-cve-2019-5736-in-runc-and-docker/",
"https://cloud.google.com/kubernetes-engine/docs/security-bulletins#february-11-2019-runc",
"http://www.securityfocus.com/bid/106976",
"https://access.redhat.com/security/vulnerabilities/runcescape",
"https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html",
"https://bugzilla.suse.com/show_bug.cgi?id=1121967",
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc",
"https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c@%3Cdev.mesos.apache.org%3E",
"https://lists.apache.org/thread.html/a258757af84c5074dc7bf932622020fd4f60cef65a84290380386706@%3Cuser.mesos.apache.org%3E",
"http://www.openwall.com/lists/oss-security/2019/03/23/1",
"https://support.mesosphere.com/s/article/Known-Issue-Container-Runtime-Vulnerability-MSPH-2019-0003",
"http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6A4OSFM5GGOWW4ECELV5OHX2XRAUSPH/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SWFJGIPYAAAMVSWWI3QWYXGA3ZBU2H4W/",
"https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03410944",
"https://access.redhat.com/errata/RHSA-2019:0975",
"https://azure.microsoft.com/en-us/updates/cve-2019-5736-and-runc-vulnerability/",
"https://azure.microsoft.com/en-us/updates/iot-edge-fix-cve-2019-5736/",
"https://lists.apache.org/thread.html/acacf018c12636e41667e94ac0a1e9244e887eef2debdd474640aa6e@%3Cdev.dlab.apache.org%3E",
"https://lists.apache.org/thread.html/a585f64d14c31ab393b90c5f17e41d9765a1a17eec63856ce750af46@%3Cdev.dlab.apache.org%3E",
"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html",
"http://www.openwall.com/lists/oss-security/2019/06/28/2",
"http://www.openwall.com/lists/oss-security/2019/07/06/3",
"http://www.openwall.com/lists/oss-security/2019/07/06/4",
"https://usn.ubuntu.com/4048-1/",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EGZKRCKI3Y7FMADO2MENMT4TU24QGHFR/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLC52IOJN6IQJWJ6CUI6AIUP6GVVG2QP/",
"https://lists.apache.org/thread.html/24e54e3c6b2259e3903b6b8fe26896ac649c481ea99c5739468c92a3@%3Cdev.dlab.apache.org%3E",
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00007.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00029.html",
"http://www.openwall.com/lists/oss-security/2019/10/24/1",
"http://www.openwall.com/lists/oss-security/2019/10/29/3",
"https://security.gentoo.org/glsa/202003-21",
"https://lists.apache.org/thread.html/rc494623986d76593873ce5a40dd69cb3629400d10750d5d7e96b8587@%3Cdev.dlab.apache.org%3E",
"https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E",
},
},
{
ID: "CVE-2019-6035",
Path: "2019/6xxx/CVE-2019-6035.json",
BlobHash: "3c8c32ae22bd6815d0449ad9712f7f9174466a99",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/yahoo/athenz",
"https://github.com/yahoo/athenz/pull/700",
"http://jvn.jp/en/jp/JVN57070811/index.html",
},
},
{
ID: "CVE-2019-8336",
Path: "2019/8xxx/CVE-2019-8336.json",
BlobHash: "abe831f5016cc79fd871b617a7af877ee0b0a4a0",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hashicorp/consul/issues/5423",
},
},
{
ID: "CVE-2019-8400",
Path: "2019/8xxx/CVE-2019-8400.json",
BlobHash: "4b34b7a6ba89e99f7d3c8e07983001c666379f0d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://drive.google.com/file/d/1-25expUYVfK6vsiCmEabUCuelOP7aUDj/view?usp=drivesdk",
"https://www.youtube.com/watch?v=RIyZLeKEC8E",
"https://github.com/ory/hydra/blob/master/CHANGELOG.md#v100-rc3oryos9-2018-12-06",
"https://hackerone.com/reports/456333",
"https://github.com/ory/hydra/commit/9b5bbd48a72096930af08402c5e07fce7dd770f3",
},
},
{
ID: "CVE-2019-9547",
Path: "2019/9xxx/CVE-2019-9547.json",
BlobHash: "a944bea3ea8cd2b38f441dd27151e01f83403424",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/spdk/spdk/releases/tag/v19.01",
"https://github.com/spdk/spdk/commit/eca42c66092b9031711afe215fbc1891ee55f143",
},
},
{
ID: "CVE-2019-9635",
Path: "2019/9xxx/CVE-2019-9635.json",
BlobHash: "9d58ae865204551751290c66abbff27e40f4ecd4",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2019-001.md",
},
},
{
ID: "CVE-2019-9764",
Path: "2019/9xxx/CVE-2019-9764.json",
BlobHash: "d7793034dbd0ce5a1900da4dee3aea04c8082989",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hashicorp/consul/issues/5519",
},
},
{
ID: "CVE-2019-9900",
Path: "2019/9xxx/CVE-2019-9900.json",
BlobHash: "236cb5b5fc6add61e91d73d6cb274f965889b736",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://access.redhat.com/errata/RHSA-2019:0741",
"https://www.envoyproxy.io/docs/envoy/v1.9.1/intro/version_history",
"https://github.com/envoyproxy/envoy/issues/6434",
"https://groups.google.com/forum/#!topic/envoy-announce/VoHfnDqZiAM",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-x74r-f4mw-c32h",
},
},
{
ID: "CVE-2019-9901",
Path: "2019/9xxx/CVE-2019-9901.json",
BlobHash: "df957110c5812905fe08c8808751fddc18b66f32",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.envoyproxy.io/docs/envoy/v1.9.1/intro/version_history",
"https://github.com/envoyproxy/envoy/issues/6435",
"https://groups.google.com/forum/#!topic/envoy-announce/VoHfnDqZiAM",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-xcx5-93pw-jw2w",
},
},
{
ID: "CVE-2019-9946",
Path: "2019/9xxx/CVE-2019-9946.json",
BlobHash: "0fdd06a121187709d8e863358fbc539a51bfcbba",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/containernetworking/plugins/pull/269#issuecomment-477683272",
"https://security.netapp.com/advisory/ntap-20190416-0002/",
"https://access.redhat.com/errata/RHBA-2019:0862",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCN66VYB3XS76SYH567SO7N3I254JOCT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGOOWAELGH3F7OXRBPH3HCNZELNLXYTW/",
},
},
{
ID: "CVE-2020-10660",
Path: "2020/10xxx/CVE-2020-10660.json",
BlobHash: "afe60fafe6b51c1e333bc6bf414cf05ab10d0d48",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/vault/",
"https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#134-march-19th-2020",
},
},
{
ID: "CVE-2020-10661",
Path: "2020/10xxx/CVE-2020-10661.json",
BlobHash: "18b1302eca7464a23928bd9215e655cb1dc02056",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/vault/",
"https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#134-march-19th-2020",
},
},
{
ID: "CVE-2020-10685",
Path: "2020/10xxx/CVE-2020-10685.json",
BlobHash: "bed787e624fb760bf7e3974a111b0aa030a5f20d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10685",
"https://github.com/ansible/ansible/pull/68433",
"https://security.gentoo.org/glsa/202006-11",
},
},
{
ID: "CVE-2020-10691",
Path: "2020/10xxx/CVE-2020-10691.json",
BlobHash: "6c5d50dd00f6d10db0ec80c974927572cbb61de6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10691",
"https://github.com/ansible/ansible/pull/68596",
},
},
{
ID: "CVE-2020-10696",
Path: "2020/10xxx/CVE-2020-10696.json",
BlobHash: "461bbeb746dd1ff55af64811a3893be09affe1df",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10696",
"https://github.com/containers/buildah/pull/2245",
"https://access.redhat.com/security/cve/cve-2020-10696",
},
},
{
ID: "CVE-2020-10706",
Path: "2020/10xxx/CVE-2020-10706.json",
BlobHash: "997d4d69ee84e69e79ed69d294d6948ec6400695",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10706",
},
},
{
ID: "CVE-2020-10712",
Path: "2020/10xxx/CVE-2020-10712.json",
BlobHash: "8ac05635085e0b20cddadaa67975ff3963764488",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10712",
},
},
{
ID: "CVE-2020-10715",
Path: "2020/10xxx/CVE-2020-10715.json",
BlobHash: "b63d43881d1fba101f9b921b1f02e82baae4e90f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/openshift/origin-web-console/pull/3173",
"https://bugzilla.redhat.com/show_bug.cgi?id=1767665",
},
},
{
ID: "CVE-2020-10749",
Path: "2020/10xxx/CVE-2020-10749.json",
BlobHash: "8822dd27a56bcc2137fcdecb52aa167910a3fe59",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10749",
"https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8",
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00063.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00065.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DV3HCDZYUTPPVDUMTZXDKK6IUO3JMGJC/",
},
},
{
ID: "CVE-2020-10750",
Path: "2020/10xxx/CVE-2020-10750.json",
BlobHash: "dfa783a0f815bd8b222cd3dcd2ecbafdd018dbfc",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10750",
"https://github.com/jaegertracing/jaeger/releases/tag/v1.18.1",
},
},
{
ID: "CVE-2020-10752",
Path: "2020/10xxx/CVE-2020-10752.json",
BlobHash: "19ebc5ac73d637204c098c0830ec8b4e4a5157bc",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/openshift/origin/blob/master/vendor/k8s.io/kubernetes/staging/src/k8s.io/apiserver/pkg/server/filters/wrap.go#L39",
"https://github.com/openshift/enhancements/pull/323",
},
},
{
ID: "CVE-2020-10763",
Path: "2020/10xxx/CVE-2020-10763.json",
BlobHash: "f11aba3a3166d14eb4f5d0aa25f1e14c6dc1a4f5",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1845387",
"https://github.com/heketi/heketi/releases/tag/v10.1.0",
},
},
{
ID: "CVE-2020-10944",
Path: "2020/10xxx/CVE-2020-10944.json",
BlobHash: "0fcfa628243c48bdb9c07e0ed2c83806793a2b47",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hashicorp/nomad/issues/7468",
},
},
{
ID: "CVE-2020-11008",
Path: "2020/11xxx/CVE-2020-11008.json",
BlobHash: "49b7673095fcc8b089bff21bac55476915375266",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/git/git/security/advisories/GHSA-hjc9-x69f-jqj7",
"https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q",
"https://github.com/git/git/commit/c44088ecc4b0722636e0a305f9608d3047197282",
"https://security.gentoo.org/glsa/202004-13",
"https://lists.debian.org/debian-lts-announce/2020/04/msg00015.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PN3FUOXKX3AXTULYV53ACABER2W2FSOU/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MOCTR2SEHCPSCOVUQJAGFPGKFMI2VE6V/",
"https://usn.ubuntu.com/4334-1/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/74Q7WVJ6FKLIN62VS2JD2XCNWK5TNKOW/",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html",
"https://support.apple.com/kb/HT211183",
"http://seclists.org/fulldisclosure/2020/May/41",
},
},
{
ID: "CVE-2020-11012",
Path: "2020/11xxx/CVE-2020-11012.json",
BlobHash: "eda555e8b97f25306c94cfcb961ee6c97bc7005c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/minio/minio/security/advisories/GHSA-xv4r-vccv-mg4w",
"https://github.com/minio/minio/pull/9422",
"https://github.com/minio/minio/commit/4cd6ca02c7957aeb2de3eede08b0754332a77923",
"https://github.com/minio/minio/releases/tag/RELEASE.2020-04-23T00-58-49Z",
},
},
{
ID: "CVE-2020-11013",
Path: "2020/11xxx/CVE-2020-11013.json",
BlobHash: "094ee70f2f433077aaee4062ac5c12fb19dc8df2",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/helm/helm/security/advisories/GHSA-q8q8-93cv-v6h8",
"https://github.com/helm/helm/releases/tag/v3.2.0",
},
},
{
ID: "CVE-2020-11053",
Path: "2020/11xxx/CVE-2020-11053.json",
BlobHash: "35faf332602e9f8a188e8842e36b59318312184f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-j7px-6hwj-hpjg",
},
},
{
ID: "CVE-2020-11080",
Path: "2020/11xxx/CVE-2020-11080.json",
BlobHash: "4fa5eac63a53a7eb9f7f4eea563e03111bac58e7",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.debian.org/security/2020/dsa-4696",
"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr",
"https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090",
"https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394",
"https://www.oracle.com/security-alerts/cpuoct2020.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/",
"https://www.oracle.com/security-alerts/cpujan2021.html",
},
},
{
ID: "CVE-2020-11091",
Path: "2020/11xxx/CVE-2020-11091.json",
BlobHash: "e4d76ded9cbc0f4dfae213028ecfe4ff8003e0fb",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/weaveworks/weave/security/advisories/GHSA-59qg-grp7-5r73",
"https://github.com/weaveworks/weave/commit/15f21f1899060f7716c70a8555a084e836f39a60",
},
},
{
ID: "CVE-2020-11110",
Path: "2020/11xxx/CVE-2020-11110.json",
BlobHash: "3a67b7a18ba3de7f72afe992db666d0e7235ef6c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/grafana/blob/master/CHANGELOG.md",
"https://security.netapp.com/advisory/ntap-20200810-0002/",
},
},
{
ID: "CVE-2020-11498",
Path: "2020/11xxx/CVE-2020-11498.json",
BlobHash: "2bfc8ec0f4298b3d984e25c885470da69e1e0314",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/slackhq/nebula/pull/191",
"http://www.pwn3d.org/posts/7918501-slack-nebula-relative-path-bug-bounty-disclosure",
},
},
{
ID: "CVE-2020-11576",
Path: "2020/11xxx/CVE-2020-11576.json",
BlobHash: "f003dec53d4d2ef8de2dc76461a02cb5b3268a3d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/argoproj/argo-cd/pull/3215",
"https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1",
"https://www.soluble.ai/blog/argo-cves-2020",
},
},
{
ID: "CVE-2020-11710",
Path: "2020/11xxx/CVE-2020-11710.json",
BlobHash: "06704241be0913c4e32085f5fe9d42d3d02589f6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/Kong/kong",
"https://github.com/Kong/docs.konghq.com/commit/d693827c32144943a2f45abc017c1321b33ff611",
"https://github.com/Kong/docker-kong/commit/dfa095cadf7e8309155be51982d8720daf32e31c",
"https://github.com/Kong/docs.konghq.com/commit/e99cf875d875dd84fdb751079ac37882c9972949",
},
},
{
ID: "CVE-2020-11767",
Path: "2020/11xxx/CVE-2020-11767.json",
BlobHash: "2da1921971291d993c9d73746cef16d55339bc2f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugs.chromium.org/p/chromium/issues/detail?id=954160#c5",
"https://github.com/envoyproxy/envoy/issues/6767",
"https://github.com/istio/istio/issues/9429",
"https://github.com/istio/istio/issues/13589",
},
},
{
ID: "CVE-2020-12118",
Path: "2020/12xxx/CVE-2020-12118.json",
BlobHash: "625c805c88e57aafe0bfca5d2f8e5be9d5114990",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/binance-chain/tss-lib/pull/89",
"https://github.com/binance-chain/tss-lib/releases/tag/v1.2.0",
},
},
{
ID: "CVE-2020-12245",
Path: "2020/12xxx/CVE-2020-12245.json",
BlobHash: "616c91ca3b57b2b744bd08a30ad12b9704199d15",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/grafana/blob/master/CHANGELOG.md#673-2020-04-23",
"https://community.grafana.com/t/release-notes-v6-7-x/27119",
"https://github.com/grafana/grafana/pull/23816",
"https://security.netapp.com/advisory/ntap-20200511-0001/",
"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00060.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00009.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00017.html",
},
},
{
ID: "CVE-2020-12278",
Path: "2020/12xxx/CVE-2020-12278.json",
BlobHash: "861d14b4598cc4348972ddad1a39a4b976945a7f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/git/git/security/advisories/GHSA-5wph-8frv-58vj",
"https://github.com/libgit2/libgit2/releases/tag/v0.99.0",
"https://github.com/libgit2/libgit2/releases/tag/v0.28.4",
"https://github.com/libgit2/libgit2/commit/3f7851eadca36a99627ad78cbe56a40d3776ed01",
"https://github.com/libgit2/libgit2/commit/e1832eb20a7089f6383cfce474f213157f5300cb",
},
},
{
ID: "CVE-2020-12279",
Path: "2020/12xxx/CVE-2020-12279.json",
BlobHash: "a9ca1a376635da8365a74526596e71051eaf85bc",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/libgit2/libgit2/releases/tag/v0.99.0",
"https://github.com/libgit2/libgit2/releases/tag/v0.28.4",
"https://github.com/git/git/security/advisories/GHSA-589j-mmg9-733v",
"https://github.com/libgit2/libgit2/commit/64c612cc3e25eff5fb02c59ef5a66ba7a14751e4",
},
},
{
ID: "CVE-2020-12283",
Path: "2020/12xxx/CVE-2020-12283.json",
BlobHash: "c3d171533a26a23b619ad725f8fc12aec7637849",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/sourcegraph/sourcegraph/pull/10167",
"https://github.com/sourcegraph/sourcegraph/compare/v3.15.0...v3.15.1",
"https://github.com/sourcegraph/sourcegraph/commit/c0f48172e815c7f66471a38f0a06d1fc32a77a64",
"https://github.com/sourcegraph/sourcegraph/blob/master/CHANGELOG.md",
"https://securitylab.github.com/advisories/GHSL-2020-085-sourcegraph",
},
},
{
ID: "CVE-2020-12458",
Path: "2020/12xxx/CVE-2020-12458.json",
BlobHash: "cdec1bb3fb314b5c27d7374bad63975a26fa55e6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/grafana/issues/8283",
"https://bugzilla.redhat.com/show_bug.cgi?id=1827765",
"https://access.redhat.com/security/cve/CVE-2020-12458",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTQCKJZZYXMCSHJFZZ3YXEO5NUBANGZS/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEBCIEVSYIDDCA7FTRS2IFUOYLIQU34A/",
"https://security.netapp.com/advisory/ntap-20200518-0001/",
},
},
{
ID: "CVE-2020-12459",
Path: "2020/12xxx/CVE-2020-12459.json",
BlobHash: "03485979cc6e5e9b2c6d6cfa0360fb3f3b6477f8",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/grafana/issues/8283",
"https://access.redhat.com/security/cve/CVE-2020-12459",
"https://bugzilla.redhat.com/show_bug.cgi?id=1829724",
"https://src.fedoraproject.org/rpms/grafana/c/fab93d67363eb0a9678d9faf160cc88237f26277",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTQCKJZZYXMCSHJFZZ3YXEO5NUBANGZS/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEBCIEVSYIDDCA7FTRS2IFUOYLIQU34A/",
"https://security.netapp.com/advisory/ntap-20200518-0004/",
},
},
{
ID: "CVE-2020-12603",
Path: "2020/12xxx/CVE-2020-12603.json",
BlobHash: "7921cd1fe37271cd23d6fbd97dd6bf8648a570d2",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy-setec/issues/80",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-pc38-4q6c-85p6",
},
},
{
ID: "CVE-2020-12604",
Path: "2020/12xxx/CVE-2020-12604.json",
BlobHash: "306d21154935ffdff9526f480445a678a3466151",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy/commits/master",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-8hf8-8gvw-ggvx",
},
},
{
ID: "CVE-2020-12605",
Path: "2020/12xxx/CVE-2020-12605.json",
BlobHash: "dc93e6a6f6445f141dd06a0440940375304156f1",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy-setec/issues/137",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-fjxc-jj43-f777",
},
},
{
ID: "CVE-2020-12757",
Path: "2020/12xxx/CVE-2020-12757.json",
BlobHash: "ac21b00cd3522a4933f9bf719e1c8260b985c974",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/vault/",
"https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#142-may-21st-2020",
},
},
{
ID: "CVE-2020-12758",
Path: "2020/12xxx/CVE-2020-12758.json",
BlobHash: "b3e8bdddb005a15366c5a85809f500b72a463df2",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md",
"https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md",
"https://github.com/hashicorp/consul/pull/7783",
},
},
{
ID: "CVE-2020-12797",
Path: "2020/12xxx/CVE-2020-12797.json",
BlobHash: "db1a0c6081be54b27a441939d9628fa00abd7d79",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md",
"https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md",
"https://github.com/hashicorp/consul/pull/8047",
},
},
{
ID: "CVE-2020-13170",
Path: "2020/13xxx/CVE-2020-13170.json",
BlobHash: "c5cfc8d95bd3b388fb13f5286707ec01ee3de264",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md",
"https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md",
"https://github.com/hashicorp/consul/pull/8068",
},
},
{
ID: "CVE-2020-13223",
Path: "2020/13xxx/CVE-2020-13223.json",
BlobHash: "7b3e591fb1f19e2da0e1c47fd65218f1c28997b9",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/vault/",
"https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#142-may-21st-2020",
},
},
{
ID: "CVE-2020-13246",
Path: "2020/13xxx/CVE-2020-13246.json",
BlobHash: "9a649cb20e560e89d2bedf10e48c8d90282e74be",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/go-gitea/gitea/issues/10549",
"https://github.com/go-gitea/gitea/pull/11438",
"https://www.youtube.com/watch?v=DmVgADSVS88",
},
},
{
ID: "CVE-2020-13250",
Path: "2020/13xxx/CVE-2020-13250.json",
BlobHash: "90cd61a54bd8ca27ad801f95bab9250095ec68d0",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hashicorp/consul/pull/8023",
"https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md",
"https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md",
},
},
{
ID: "CVE-2020-13401",
Path: "2020/13xxx/CVE-2020-13401.json",
BlobHash: "5db4a90b1a48460ea29578043949b311359777e8",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://docs.docker.com/engine/release-notes/",
"http://www.openwall.com/lists/oss-security/2020/06/01/5",
"https://github.com/docker/docker-ce/releases/tag/v19.03.11",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DN4JQAOXBE3XUNK3FD423LHE3K74EMJT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJZLKRCOJMOGUIJI2AS27BOZS3RBEF3K/",
"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00040.html",
"https://www.debian.org/security/2020/dsa-4716",
"https://security.netapp.com/advisory/ntap-20200717-0002/",
"https://security.gentoo.org/glsa/202008-15",
},
},
{
ID: "CVE-2020-13430",
Path: "2020/13xxx/CVE-2020-13430.json",
BlobHash: "0196be588481d0cc2288cef28f8cb57f5417af3c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/grafana/releases/tag/v7.0.0",
"https://github.com/grafana/grafana/pull/24539",
"https://security.netapp.com/advisory/ntap-20200528-0003/",
},
},
{
ID: "CVE-2020-13449",
Path: "2020/13xxx/CVE-2020-13449.json",
BlobHash: "17a03c8be88615c863ac5cf82112d1e31a30d323",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/thecodingmachine/gotenberg/issues/199",
"http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html",
},
},
{
ID: "CVE-2020-13450",
Path: "2020/13xxx/CVE-2020-13450.json",
BlobHash: "96a4e9c87a8714691a5eab17acec86406aafeac6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/thecodingmachine/gotenberg/issues/199",
"http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html",
},
},
{
ID: "CVE-2020-13451",
Path: "2020/13xxx/CVE-2020-13451.json",
BlobHash: "1c80691154fe0a5f68df5e33af3919a910bfa597",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/thecodingmachine/gotenberg/issues/199",
"http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html",
},
},
{
ID: "CVE-2020-13452",
Path: "2020/13xxx/CVE-2020-13452.json",
BlobHash: "9ccd02a6b2b6b8f7156f996b71b11bdf8be4bdf5",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/thecodingmachine/gotenberg/issues/199",
"http://packetstormsecurity.com/files/160744/Gotenberg-6.2.0-Traversal-Code-Execution-Insecure-Permissions.html",
},
},
{
ID: "CVE-2020-13597",
Path: "2020/13xxx/CVE-2020-13597.json",
BlobHash: "9344e780825e6ee6ee9f002ff3bfca76bc8a298b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.projectcalico.org/security-bulletins/",
"https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8",
"https://github.com/kubernetes/kubernetes/issues/91507",
},
},
{
ID: "CVE-2020-13788",
Path: "2020/13xxx/CVE-2020-13788.json",
BlobHash: "94dae312a3e1a91ed7bd20ef9ca4a81f3ae95583",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/goharbor/harbor/releases",
"https://www.soluble.ai/blog/harbor-ssrf-cve-2020-13788",
"https://www.youtube.com/watch?v=v8Isqy4yR3Q",
},
},
{
ID: "CVE-2020-13794",
Path: "2020/13xxx/CVE-2020-13794.json",
BlobHash: "cb3c9de369ff824af51b6b18346b3f1d21242fb0",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/goharbor/harbor/releases",
"https://github.com/goharbor/harbor/security/advisories/GHSA-q9p8-33wc-h432",
"https://www.cybereagle.io/blog/cve-2020-13794/",
},
},
{
ID: "CVE-2020-14144",
Path: "2020/14xxx/CVE-2020-14144.json",
BlobHash: "45e745dadce235e2420c3eeead0b337d1df1ebed",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/go-gitea/gitea/releases",
"https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-3-schwachstelle-in-gitea-1125-und-gogs-0122-ermoeglicht-ausfuehrung-von-code-nach-authent/",
"https://github.com/go-gitea/gitea/pull/13058",
"https://docs.gitlab.com/ee/administration/server_hooks.html",
"https://docs.github.com/en/enterprise-server@2.19/admin/policies/creating-a-pre-receive-hook-script",
"http://packetstormsecurity.com/files/162122/Gitea-Git-Hooks-Remote-Code-Execution.html",
},
},
{
ID: "CVE-2020-14306",
Path: "2020/14xxx/CVE-2020-14306.json",
BlobHash: "7bd070a5ed90353454650d9b7c884d02a8b6d18f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/maistra/istio-operator/pull/462",
"https://bugzilla.redhat.com/show_bug.cgi?id=1850380",
},
},
{
ID: "CVE-2020-14330",
Path: "2020/14xxx/CVE-2020-14330.json",
BlobHash: "03c537b1619b4365a94d10cf314fd180e9c06e7d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ansible/ansible/issues/68400",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330",
},
},
{
ID: "CVE-2020-14332",
Path: "2020/14xxx/CVE-2020-14332.json",
BlobHash: "afb8d34597ddf56c910f3539ba26d6a12f0603b1",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ansible/ansible/pull/71033",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332",
},
},
{
ID: "CVE-2020-14958",
Path: "2020/14xxx/CVE-2020-14958.json",
BlobHash: "cf7ec412d6f491b8a2fdf30518ad5fbf8135e8ce",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gogs/gogs/commit/82ff0c5852f29daa5f95d965fd50665581e7ea3c",
"https://github.com/gogs/gogs/pull/5988",
},
},
{
ID: "CVE-2020-15104",
Path: "2020/15xxx/CVE-2020-15104.json",
BlobHash: "1edfac609c0401df144b93f68b5985348b82b10e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-w5f5-6qhq-hhrg",
},
},
{
ID: "CVE-2020-15112",
Path: "2020/15xxx/CVE-2020-15112.json",
BlobHash: "3d87891317ff107037bc0145194ab72df1890411",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "HasVuln",
TriageStateReason: "GO-2020-0005",
},
{
ID: "CVE-2020-15113",
Path: "2020/15xxx/CVE-2020-15113.json",
BlobHash: "9133c3be68ef84771bad74ec8770e1efff7bf0de",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/",
},
},
{
ID: "CVE-2020-15114",
Path: "2020/15xxx/CVE-2020-15114.json",
BlobHash: "e5fc68a458642e7cf17a7026f3c2f7c5abf88434",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/etcd-io/etcd/security/advisories/GHSA-2xhq-gv6c-p224",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/",
},
},
{
ID: "CVE-2020-15115",
Path: "2020/15xxx/CVE-2020-15115.json",
BlobHash: "f7eace29c0f83893a3d865628dd5733cdd72fd3d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/",
},
},
{
ID: "CVE-2020-15127",
Path: "2020/15xxx/CVE-2020-15127.json",
BlobHash: "56ec1fae6e4706da0e7d88f246be25d5e955d966",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/projectcontour/contour/security/advisories/GHSA-mjp8-x484-pm3r",
"https://github.com/projectcontour/contour/releases/tag/v1.7.0",
},
},
{
ID: "CVE-2020-15129",
Path: "2020/15xxx/CVE-2020-15129.json",
BlobHash: "ce972aecfeb350c6d3a365b51401a16761b2e455",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/containous/traefik/security/advisories/GHSA-6qq8-5wq3-86rp",
"https://github.com/containous/traefik/releases/tag/v1.7.26",
"https://github.com/containous/traefik/releases/tag/v2.2.8",
"https://github.com/containous/traefik/releases/tag/v2.3.0-rc3",
"https://github.com/containous/traefik/pull/7109",
"https://github.com/containous/traefik/commit/e63db782c11c7b8bfce30be4c902e7ef8f9f33d2",
},
},
{
ID: "CVE-2020-15136",
Path: "2020/15xxx/CVE-2020-15136.json",
BlobHash: "8f347e8c68494ec8f12395fdb9a73e5b5fe8919c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/etcd-io/etcd/security/advisories/GHSA-wr2v-9rpq-c35q",
"https://github.com/etcd-io/etcd/blob/master/Documentation/op-guide/gateway.md",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/",
},
},
{
ID: "CVE-2020-15157",
Path: "2020/15xxx/CVE-2020-15157.json",
BlobHash: "97c472abe48bdb0b5bcfc9476e9e986ddece309d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/containerd/containerd/security/advisories/GHSA-742w-89gc-8m9c",
"https://github.com/containerd/containerd/releases/tag/v1.2.14",
"https://usn.ubuntu.com/4589-1/",
"https://usn.ubuntu.com/4589-2/",
"https://www.debian.org/security/2021/dsa-4865",
},
},
{
ID: "CVE-2020-15184",
Path: "2020/15xxx/CVE-2020-15184.json",
BlobHash: "75627eb4432e1e8e595ad18c122450db22d13d29",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/helm/helm/security/advisories/GHSA-9vp5-m38w-j776",
"https://github.com/helm/helm/commit/e7c281564d8306e1dcf8023d97f972449ad74850",
},
},
{
ID: "CVE-2020-15185",
Path: "2020/15xxx/CVE-2020-15185.json",
BlobHash: "83e7748e619b25d85b7c23fe17b62b93fe5111bf",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/helm/helm/security/advisories/GHSA-jm56-5h66-w453",
"https://github.com/helm/helm/commit/055dd41cbe53ce131ab0357524a7f6729e6e40dc",
},
},
{
ID: "CVE-2020-15186",
Path: "2020/15xxx/CVE-2020-15186.json",
BlobHash: "bc01ca56a8da6601e8566740fbe6f53a4d9d8215",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/helm/helm/security/advisories/GHSA-m54r-vrmv-hw33",
"https://github.com/helm/helm/commit/809e2d999e2c33e20e77f6bff30652d79c287542",
},
},
{
ID: "CVE-2020-15187",
Path: "2020/15xxx/CVE-2020-15187.json",
BlobHash: "ce64bf787d290e1867052ee17f87cd6ba392f3b0",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/helm/helm/security/advisories/GHSA-c52f-pq47-2r9j",
"https://github.com/helm/helm/commit/d9ef5ce8bad512e325390c0011be1244b8380e4b",
},
},
{
ID: "CVE-2020-15190",
Path: "2020/15xxx/CVE-2020-15190.json",
BlobHash: "69b59e5bf80856e0359142de61ca85efc130db3a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4g9f-63rx-5cw4",
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html",
},
},
{
ID: "CVE-2020-15191",
Path: "2020/15xxx/CVE-2020-15191.json",
BlobHash: "bdceab9a0ef2b19dfa872378bb9d67b57fe72da1",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8qj-fc9q-cphr",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html",
},
},
{
ID: "CVE-2020-15192",
Path: "2020/15xxx/CVE-2020-15192.json",
BlobHash: "e84ea5377e0da66e43b115a03cceba37dc5222a7",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8fxw-76px-3rxv",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html",
},
},
{
ID: "CVE-2020-15193",
Path: "2020/15xxx/CVE-2020-15193.json",
BlobHash: "2943e7e3b913448345f8107a34b3e69e4fbf7763",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v",
"https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html",
},
},
{
ID: "CVE-2020-15194",
Path: "2020/15xxx/CVE-2020-15194.json",
BlobHash: "c27861ebb39abe40817ae4993e4bd96d8f92c997",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9mqp-7v2h-2382",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html",
},
},
{
ID: "CVE-2020-15195",
Path: "2020/15xxx/CVE-2020-15195.json",
BlobHash: "09764b50866a76569b24649dee251a3e5e79adfa",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr",
"https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html",
},
},
{
ID: "CVE-2020-15196",
Path: "2020/15xxx/CVE-2020-15196.json",
BlobHash: "b7f3b2b6fb43fa1c289fa5b2046b571c3d35ac69",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pg59-2f92-5cph",
},
},
{
ID: "CVE-2020-15197",
Path: "2020/15xxx/CVE-2020-15197.json",
BlobHash: "eb8804b7987a100032e5f939859ca8a8ce6c4296",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qc53-44cj-vfvx",
},
},
{
ID: "CVE-2020-15198",
Path: "2020/15xxx/CVE-2020-15198.json",
BlobHash: "67f4566285f0919fbd89e2ea900c8282c60e63b1",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jc87-6vpp-7ff3",
},
},
{
ID: "CVE-2020-15199",
Path: "2020/15xxx/CVE-2020-15199.json",
BlobHash: "2a6df28b3f1f02fab1823e37601a97fdf58a22c3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x5cp-9pcf-pp3h",
},
},
{
ID: "CVE-2020-15200",
Path: "2020/15xxx/CVE-2020-15200.json",
BlobHash: "6a686cb7695ff2798e93514481122251bb966816",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x7rp-74x2-mjf3",
"https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02",
},
},
{
ID: "CVE-2020-15201",
Path: "2020/15xxx/CVE-2020-15201.json",
BlobHash: "a184d90bf2119a79767efc4adeadc88978aa81db",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4",
},
},
{
ID: "CVE-2020-15202",
Path: "2020/15xxx/CVE-2020-15202.json",
BlobHash: "8db71c4621f5a8621f59194d98202222e8f4f73e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6fg-mjxg-hqq4",
"https://github.com/tensorflow/tensorflow/commit/27b417360cbd671ef55915e4bb6bb06af8b8a832",
"https://github.com/tensorflow/tensorflow/commit/ca8c013b5e97b1373b3bb1c97ea655e69f31a575",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html",
},
},
{
ID: "CVE-2020-15203",
Path: "2020/15xxx/CVE-2020-15203.json",
BlobHash: "be6e48983405407b7a1a0c0449ab4bf524a4caf6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xmq7-7fxm-rr79",
"https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html",
},
},
{
ID: "CVE-2020-15204",
Path: "2020/15xxx/CVE-2020-15204.json",
BlobHash: "342980aa6ae1f5c0b07fb3b3d513414e09994127",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8gv-q7wr-9jf8",
"https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html",
},
},
{
ID: "CVE-2020-15205",
Path: "2020/15xxx/CVE-2020-15205.json",
BlobHash: "d11a5519a3651939a3798ff873794184a5f691ae",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g7p5-5759-qv46",
"https://github.com/tensorflow/tensorflow/commit/0462de5b544ed4731aa2fb23946ac22c01856b80",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html",
},
},
{
ID: "CVE-2020-15206",
Path: "2020/15xxx/CVE-2020-15206.json",
BlobHash: "fe7b833644ef82b0add4530b2ab94ec513442fd2",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w5gh-2wr2-pm6g",
"https://github.com/tensorflow/tensorflow/commit/adf095206f25471e864a8e63a0f1caef53a0e3a6",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html",
},
},
{
ID: "CVE-2020-15207",
Path: "2020/15xxx/CVE-2020-15207.json",
BlobHash: "21067fd9482a3b523ceba1fb574224cb5e5dc478",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q4qf-3fc6-8x34",
"https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html",
},
},
{
ID: "CVE-2020-15208",
Path: "2020/15xxx/CVE-2020-15208.json",
BlobHash: "fbfd53b8d4a5bea542c8e11dbad4cd0b029ab8c2",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mxjj-953w-2c2v",
"https://github.com/tensorflow/tensorflow/commit/8ee24e7949a203d234489f9da2c5bf45a7d5157d",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html",
},
},
{
ID: "CVE-2020-15209",
Path: "2020/15xxx/CVE-2020-15209.json",
BlobHash: "736967f1a08f3de2611a6c5211af41d59163ef52",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qh32-6jjc-qprm",
"https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html",
},
},
{
ID: "CVE-2020-15210",
Path: "2020/15xxx/CVE-2020-15210.json",
BlobHash: "e825062e26147ca204059d7d5770f588b0686443",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x9j7-x98r-r4w2",
"https://github.com/tensorflow/tensorflow/commit/d58c96946b2880991d63d1dacacb32f0a4dfa453",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html",
},
},
{
ID: "CVE-2020-15211",
Path: "2020/15xxx/CVE-2020-15211.json",
BlobHash: "4526d71491a9bcf7f797020f1bebf47843074522",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvpc-8phh-8f45",
"https://github.com/tensorflow/tensorflow/commit/46d5b0852528ddfd614ded79bccc75589f801bd9",
"https://github.com/tensorflow/tensorflow/commit/00302787b788c5ff04cb6f62aed5a74d936e86c0",
"https://github.com/tensorflow/tensorflow/commit/e11f55585f614645b360563072ffeb5c3eeff162",
"https://github.com/tensorflow/tensorflow/commit/cd31fd0ce0449a9e0f83dcad08d6ed7f1d6bef3f",
"https://github.com/tensorflow/tensorflow/commit/1970c2158b1ffa416d159d03c3370b9a462aee35",
"https://github.com/tensorflow/tensorflow/commit/fff2c8326280c07733828f990548979bdc893859",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html",
},
},
{
ID: "CVE-2020-15212",
Path: "2020/15xxx/CVE-2020-15212.json",
BlobHash: "72d1531ceaaf0863c6d6903a9d1f79da94ce8f76",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hx2x-85gr-wrpq",
},
},
{
ID: "CVE-2020-15213",
Path: "2020/15xxx/CVE-2020-15213.json",
BlobHash: "922ec7d4d730ace15c0fe9983ee4e86692416c02",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hjmq-236j-8m87",
},
},
{
ID: "CVE-2020-15214",
Path: "2020/15xxx/CVE-2020-15214.json",
BlobHash: "ce9b6b29509589dc98577cf830707d730300fbe3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p2cq-cprg-frvm",
"https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a",
},
},
{
ID: "CVE-2020-15223",
Path: "2020/15xxx/CVE-2020-15223.json",
BlobHash: "83c8b4250af787675df5a0f49fc85d4346bd4a02",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ory/fosite/security/advisories/GHSA-7mqr-2v3q-v2wm",
"https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319",
"https://tools.ietf.org/html/rfc7009#section-2.2.1",
},
},
{
ID: "CVE-2020-15233",
Path: "2020/15xxx/CVE-2020-15233.json",
BlobHash: "3e3a32a7abdd4d693415cab662f8f3a804d3016f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf",
"https://github.com/ory/fosite/security/advisories/GHSA-rfq3-w54c-f9q5",
},
},
{
ID: "CVE-2020-15234",
Path: "2020/15xxx/CVE-2020-15234.json",
BlobHash: "1e41a8769ee0a2dc219ea475a4496fa7f45b6a90",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ory/fosite/security/advisories/GHSA-grfp-q2mm-hfp6",
"https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf",
},
},
{
ID: "CVE-2020-15254",
Path: "2020/15xxx/CVE-2020-15254.json",
BlobHash: "8ee99b9d3ed4210fe22e38d0176770eb1539ad14",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx",
"https://github.com/crossbeam-rs/crossbeam/issues/539",
"https://github.com/crossbeam-rs/crossbeam/pull/533",
"https://github.com/RustSec/advisory-db/pull/425",
},
},
{
ID: "CVE-2020-15257",
Path: "2020/15xxx/CVE-2020-15257.json",
BlobHash: "d3307806e58681229f67d2d1858ffce149a97ca4",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/containerd/containerd/security/advisories/GHSA-36xw-fx78-c5r4",
"https://github.com/containerd/containerd/commit/4a4bb851f5da563ff6e68a83dc837c7699c469ad",
"https://github.com/containerd/containerd/releases/tag/v1.4.3",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNKXLOLZWO5FMAPX63ZL7JNKTNNT5NQD/",
"https://www.debian.org/security/2021/dsa-4865",
},
},
{
ID: "CVE-2020-15265",
Path: "2020/15xxx/CVE-2020-15265.json",
BlobHash: "eb0b70648f0fd52e57b8619ffee97256e5f8b7ae",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rrfp-j2mp-hq9c",
"https://github.com/tensorflow/tensorflow/issues/42105",
"https://github.com/tensorflow/tensorflow/commit/eccb7ec454e6617738554a255d77f08e60ee0808",
},
},
{
ID: "CVE-2020-15266",
Path: "2020/15xxx/CVE-2020-15266.json",
BlobHash: "d4288afc8306d8d0da027ed34be7977ba9366b79",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xwhf-g6j5-j5gc",
"https://github.com/tensorflow/tensorflow/issues/42129",
"https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845",
},
},
{
ID: "CVE-2020-15391",
Path: "2020/15xxx/CVE-2020-15391.json",
BlobHash: "86980a5a1174555d80467f60769a8329a7bbb7d9",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/devspace-cloud/devspace/tags",
"https://github.com/devspace-cloud/devspace/releases/tag/v4.14.0",
},
},
{
ID: "CVE-2020-16248",
Path: "2020/16xxx/CVE-2020-16248.json",
BlobHash: "444ddc83f5309e202900762cb040330d169e7178",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/prometheus/blackbox_exporter/issues/669",
"https://prometheus.io/docs/operating/security/#exporters",
"https://www.openwall.com/lists/oss-security/2020/08/08/3",
"https://www.openwall.com/lists/oss-security/2020/08/08/12",
"https://seclists.org/oss-sec/2020/q3/94",
},
},
{
ID: "CVE-2020-16250",
Path: "2020/16xxx/CVE-2020-16250.json",
BlobHash: "67ef5666d43aed3715f5944b1e7c544340c016da",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/vault/",
"https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#151",
"http://packetstormsecurity.com/files/159478/Hashicorp-Vault-AWS-IAM-Integration-Authentication-Bypass.html",
},
},
{
ID: "CVE-2020-16251",
Path: "2020/16xxx/CVE-2020-16251.json",
BlobHash: "86ec5dea5110b7393008bf3db623a1d0e3982144",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/vault/",
"https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#151",
"http://packetstormsecurity.com/files/159479/Hashicorp-Vault-GCP-IAM-Integration-Authentication-Bypass.html",
},
},
{
ID: "CVE-2020-16844",
Path: "2020/16xxx/CVE-2020-16844.json",
BlobHash: "11eeb4570be6985ee8f44d76e1c8aaf4ead9ef4a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/istio/istio/releases",
"https://istio.io/latest/news/security/istio-security-2020-009/",
},
},
{
ID: "CVE-2020-1733",
Path: "2020/1xxx/CVE-2020-1733.json",
BlobHash: "7199fd13ae2ac658fb5a8ce1c28c710d568d2bf0",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733",
"https://github.com/ansible/ansible/issues/67791",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/",
"https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html",
"https://security.gentoo.org/glsa/202006-11",
},
},
{
ID: "CVE-2020-1734",
Path: "2020/1xxx/CVE-2020-1734.json",
BlobHash: "8ed8e1886e0b26a4a6122a1caf005d3c203133af",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1734",
"https://github.com/ansible/ansible/issues/67792",
},
},
{
ID: "CVE-2020-1735",
Path: "2020/1xxx/CVE-2020-1735.json",
BlobHash: "372bedb4c5a9e911ad090add905c8034a7463b2d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1735",
"https://github.com/ansible/ansible/issues/67793",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/",
"https://security.gentoo.org/glsa/202006-11",
},
},
{
ID: "CVE-2020-1736",
Path: "2020/1xxx/CVE-2020-1736.json",
BlobHash: "e64fe330f308fd24826ea5cd68cd82e3a6c91335",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1736",
"https://github.com/ansible/ansible/issues/67794",
"https://security.gentoo.org/glsa/202006-11",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NYYQP2XJB2TTRP6AKWVMBSPB2DFJNKD/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPNZWBAUP4ZHUR6PO7U6ZXEKNCX62KZ7/",
},
},
{
ID: "CVE-2020-1737",
Path: "2020/1xxx/CVE-2020-1737.json",
BlobHash: "5de1c3fd61a11dce7e1bdc450f3ec4adb319de9b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737",
"https://github.com/ansible/ansible/issues/67795",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/",
"https://security.gentoo.org/glsa/202006-11",
},
},
{
ID: "CVE-2020-1738",
Path: "2020/1xxx/CVE-2020-1738.json",
BlobHash: "313a7e1e6ef581235ee7ab691dac6bf899e9cd58",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1738",
"https://github.com/ansible/ansible/issues/67796",
"https://security.gentoo.org/glsa/202006-11",
},
},
{
ID: "CVE-2020-1739",
Path: "2020/1xxx/CVE-2020-1739.json",
BlobHash: "a8b8d6e63980a2416f6b982e5c2d1a9e32664ff1",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1739",
"https://github.com/ansible/ansible/issues/67797",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/",
"https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html",
},
},
{
ID: "CVE-2020-1740",
Path: "2020/1xxx/CVE-2020-1740.json",
BlobHash: "f73ad4f77c6fa38f410216fc3edb4d294329d165",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1740",
"https://github.com/ansible/ansible/issues/67798",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/",
"https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html",
"https://security.gentoo.org/glsa/202006-11",
},
},
{
ID: "CVE-2020-1746",
Path: "2020/1xxx/CVE-2020-1746.json",
BlobHash: "00b42e86162ea2dba91bd9be84113a850c6ec111",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1746",
"https://github.com/ansible/ansible/pull/67866",
},
},
{
ID: "CVE-2020-2023",
Path: "2020/2xxx/CVE-2020-2023.json",
BlobHash: "0a1db5ead568b7d0a196dce929750df98d16c45b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kata-containers/runtime/pull/2487",
"https://github.com/kata-containers/runtime/pull/2477",
"https://github.com/kata-containers/runtime/issues/2488",
"https://github.com/kata-containers/agent/issues/791",
"https://github.com/kata-containers/agent/pull/792",
"https://github.com/kata-containers/runtime/releases/tag/1.11.1",
"https://github.com/kata-containers/runtime/releases/tag/1.10.5",
},
},
{
ID: "CVE-2020-2024",
Path: "2020/2xxx/CVE-2020-2024.json",
BlobHash: "fabf6af796f277e2955effc7d02a09fb275163b0",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kata-containers/runtime/issues/2474",
"https://github.com/kata-containers/runtime/pull/2475",
},
},
{
ID: "CVE-2020-2025",
Path: "2020/2xxx/CVE-2020-2025.json",
BlobHash: "6f5a2fc978fbe50ed06ba771582f5c2ad128d624",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kata-containers/runtime/pull/2487",
},
},
{
ID: "CVE-2020-2026",
Path: "2020/2xxx/CVE-2020-2026.json",
BlobHash: "94164a6a0933d7d8d37c91606e6348ab38531df4",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kata-containers/runtime/releases/tag/1.11.1",
"https://github.com/kata-containers/runtime/releases/tag/1.10.5",
"https://github.com/kata-containers/runtime/issues/2712",
"https://github.com/kata-containers/runtime/pull/2713",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJAMOVB7DSOGX7J26QH5HZKU7GSSX2VU/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JPBKAQBF3OR72N55GWM2TDYQP2OHK6H/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6W5MKF7HSAIL2AX2BX6RV4WWVGUIKVLS/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWACJQSMY5BVDMVTF3FBN7HZSOSFOG3Q/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNJHSSPCKUGJDVXXIXK2JUWCRJDQX7CE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P7FHA4AF6Y6PAVJBTTQPUEHXZQUOF3P/",
},
},
{
ID: "CVE-2020-24263",
Path: "2020/24xxx/CVE-2020-24263.json",
BlobHash: "4b9a720a4cf4500fc11fae2e4c17449e6bc7df51",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/portainer/portainer/issues/4105",
},
},
{
ID: "CVE-2020-24264",
Path: "2020/24xxx/CVE-2020-24264.json",
BlobHash: "61bfb8376f06cc89f44f5460415debdb2bd47fd2",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/portainer/portainer/issues/4106",
},
},
{
ID: "CVE-2020-24303",
Path: "2020/24xxx/CVE-2020-24303.json",
BlobHash: "90f9c4a3f31035200ebc6c2f594dd761a91009d8",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/grafana/blob/master/CHANGELOG.md#710-beta-1-2020-07-01",
"https://github.com/grafana/grafana/pull/25401",
"https://security.netapp.com/advisory/ntap-20201123-0002/",
},
},
{
ID: "CVE-2020-24356",
Path: "2020/24xxx/CVE-2020-24356.json",
BlobHash: "e1f9f8f284db6f27fd4b52ec54b25b2a49052e22",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/cloudflare/cloudflared/security/advisories/GHSA-hgwp-4vp4-qmm2",
},
},
{
ID: "CVE-2020-24359",
Path: "2020/24xxx/CVE-2020-24359.json",
BlobHash: "575a9c5a5878039671c9baceb3d8de46de7f0e0c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hashicorp/vault-ssh-helper/releases",
"https://github.com/hashicorp/vault-ssh-helper/blob/master/CHANGELOG.md#020-august-19-2020",
},
},
{
ID: "CVE-2020-24707",
Path: "2020/24xxx/CVE-2020-24707.json",
BlobHash: "cafc372f5eae3e28aa11e148374e4823749ac6f0",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://herolab.usd.de/security-advisories/usd-2020-0052/",
"https://github.com/gophish/gophish/releases/tag/v0.11.0",
"https://github.com/gophish/gophish/commit/b25f5ac5e468f6730e377f43c7995e18f8fccc2b",
},
},
{
ID: "CVE-2020-24708",
Path: "2020/24xxx/CVE-2020-24708.json",
BlobHash: "f6cb45553b062072c6cf0243995699343c789e7b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://herolab.usd.de/security-advisories/usd-2020-0048/",
"https://github.com/gophish/gophish/commit/90fed5a575628b89eaf941e1627b49e0f3693812",
},
},
{
ID: "CVE-2020-24710",
Path: "2020/24xxx/CVE-2020-24710.json",
BlobHash: "37cb54072a9dae2cfee50554f5716d3a588a2e28",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gophish/gophish/commit/e3352f481e94054ffe08494c9225d3878347b005",
"https://herolab.usd.de/security-advisories/usd-2020-0054/",
"https://github.com/gophish/gophish/releases/tag/v0.11.0",
},
},
{
ID: "CVE-2020-24711",
Path: "2020/24xxx/CVE-2020-24711.json",
BlobHash: "4013ba940157a966d1c21672ab6e4d7818764a44",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gophish/gophish/commit/6df62e85fd60f0931d3c8bfdb13b436a961bc9b6",
"https://herolab.usd.de/security-advisories/usd-2020-0051/",
"https://github.com/gophish/gophish/releases/tag/v0.11.0",
},
},
{
ID: "CVE-2020-24712",
Path: "2020/24xxx/CVE-2020-24712.json",
BlobHash: "2ba575c2bbebc92e9807e033c1e30b76161c5a06",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://herolab.usd.de/security-advisories/usd-2020-0050/",
"https://github.com/gophish/gophish/commit/4e9b94b641755f359542b246cc0c555fa3bc6715",
"https://github.com/gophish/gophish/releases/tag/v0.11.0",
},
},
{
ID: "CVE-2020-25017",
Path: "2020/25xxx/CVE-2020-25017.json",
BlobHash: "157895fb235bb1aef7aa2f399d9ec89b92a6fe87",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/forum/#!forum/envoy-security-announce",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-2v25-cjjq-5f4w",
},
},
{
ID: "CVE-2020-25018",
Path: "2020/25xxx/CVE-2020-25018.json",
BlobHash: "3b6b864db078f49506cb0aa00c5ad652c5bd07ff",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/forum/#!forum/envoy-security-announce",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-fwwh-fc9w-9673",
},
},
{
ID: "CVE-2020-25201",
Path: "2020/25xxx/CVE-2020-25201.json",
BlobHash: "5cfc056da2d28378447d8e1b0f528249b754a894",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/consul",
"https://github.com/hashicorp/consul/blob/master/CHANGELOG.md#185-october-23-2020",
},
},
{
ID: "CVE-2020-25816",
Path: "2020/25xxx/CVE-2020-25816.json",
BlobHash: "b9f2c10124187ed400868b40e08f8371f32ccd09",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/vault",
"https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#154",
},
},
{
ID: "CVE-2020-25989",
Path: "2020/25xxx/CVE-2020-25989.json",
BlobHash: "1f9bfea839566f63aa9aaef6a175693c6cdd8818",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://vkas-afk.github.io/vuln-disclosures/",
"https://github.com/pritunl/pritunl-client-electron/commit/89f8c997c6f93e724f68f76f7f47f8891d9acc2d",
},
},
{
ID: "CVE-2020-26222",
Path: "2020/26xxx/CVE-2020-26222.json",
BlobHash: "4e6dedb7c01b71049ec21c0001069ab5b077d3cc",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/dependabot/dependabot-core/security/advisories/GHSA-23f7-99jx-m54r",
"https://github.com/dependabot/dependabot-core/pull/2727",
"https://github.com/dependabot/dependabot-core/commit/e089116abbe284425b976f7920e502b8e83a61b5",
},
},
{
ID: "CVE-2020-26240",
Path: "2020/26xxx/CVE-2020-26240.json",
BlobHash: "dd264dc92c67f3e2a52b2b0a337dd8de2415f6c5",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://blog.ethereum.org/2020/11/12/geth_security_release/",
"https://github.com/ethereum/go-ethereum/security/advisories/GHSA-v592-xf75-856p",
"https://github.com/ethereum/go-ethereum/pull/21793",
"https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0",
},
},
{
ID: "CVE-2020-26241",
Path: "2020/26xxx/CVE-2020-26241.json",
BlobHash: "70211d0b60bab3fba1120796f7f8051b3ee177a8",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://blog.ethereum.org/2020/11/12/geth_security_release/",
"https://github.com/ethereum/go-ethereum/security/advisories/GHSA-69v6-xc2j-r2jf",
},
},
{
ID: "CVE-2020-26242",
Path: "2020/26xxx/CVE-2020-26242.json",
BlobHash: "8413421d6e4d08facc9ccf302d2b33fe405b8f14",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m",
"https://blog.ethereum.org/2020/11/12/geth_security_release/",
},
},
{
ID: "CVE-2020-26265",
Path: "2020/26xxx/CVE-2020-26265.json",
BlobHash: "fb9e971c245f7ea0d776d8f1584a25eebdcba04e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ethereum/go-ethereum/security/advisories/GHSA-xw37-57qp-9mm4",
"https://github.com/ethereum/go-ethereum/releases/tag/v1.9.20",
},
},
{
ID: "CVE-2020-26266",
Path: "2020/26xxx/CVE-2020-26266.json",
BlobHash: "71c06d936541d40401d37bc626cb652ceec868a4",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qhxx-j73r-qpm2",
"https://github.com/tensorflow/tensorflow/commit/ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2",
},
},
{
ID: "CVE-2020-26267",
Path: "2020/26xxx/CVE-2020-26267.json",
BlobHash: "6034efe677705536fb2d23af45620f5af263ad64",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c9f3-9wfr-wgh7",
"https://github.com/tensorflow/tensorflow/commit/ebc70b7a592420d3d2f359e4b1694c236b82c7ae",
},
},
{
ID: "CVE-2020-26268",
Path: "2020/26xxx/CVE-2020-26268.json",
BlobHash: "758ba79802b734983f8a10eb3df449502f0ba4e2",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hhvc-g5hv-48c6",
"https://github.com/tensorflow/tensorflow/commit/c1e1fc899ad5f8c725dcbb6470069890b5060bc7",
},
},
{
ID: "CVE-2020-26269",
Path: "2020/26xxx/CVE-2020-26269.json",
BlobHash: "85f41f33b7ab4ecc01bcbb33556101f9eec0ab6c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9jjw-hf72-3mxw",
"https://github.com/tensorflow/tensorflow/commit/8b5b9dc96666a3a5d27fad7179ff215e3b74b67c",
},
},
{
ID: "CVE-2020-26270",
Path: "2020/26xxx/CVE-2020-26270.json",
BlobHash: "fbef802aec5e97c28eeb07e9aee1f9110ae1e6ea",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m648-33qf-v3gp",
"https://github.com/tensorflow/tensorflow/commit/14755416e364f17fb1870882fa778c7fec7f16e3",
},
},
{
ID: "CVE-2020-26271",
Path: "2020/26xxx/CVE-2020-26271.json",
BlobHash: "3dcf78c8cb6f40cb585155336b39b21df483ce6e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q263-fvxm-m5mw",
"https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b",
},
},
{
ID: "CVE-2020-26276",
Path: "2020/26xxx/CVE-2020-26276.json",
BlobHash: "dc65453786272e4661ecf8295279ce7d01ad36e2",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/fleetdm/fleet/security/advisories/GHSA-w3wf-cfx3-6gcx",
"https://github.com/fleetdm/fleet/commit/57812a532e5f749c8e18c6f6a652eca65c083607",
"https://github.com/fleetdm/fleet/blob/master/CHANGELOG.md#fleet-351-dec-14-2020",
"https://github.com/mattermost/xml-roundtrip-validator",
"https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities",
},
},
{
ID: "CVE-2020-26277",
Path: "2020/26xxx/CVE-2020-26277.json",
BlobHash: "b16123a76d209bc0d2832d178c9e86c7d1cf801c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/datacharmer/dbdeployer/security/advisories/GHSA-47wr-426j-fr82",
"https://github.com/datacharmer/dbdeployer/commit/548e256c1de2f99746e861454e7714ec6bc9bb10",
},
},
{
ID: "CVE-2020-26278",
Path: "2020/26xxx/CVE-2020-26278.json",
BlobHash: "9026560ef73c0d8c6eadb51b0aa99e880ab6114d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/weaveworks/weave/security/advisories/GHSA-pg3p-v8c6-c6h3",
"https://github.com/weaveworks/weave/commit/a0ac81b3b4cae6d0dcaf3732fd91cedefc89f720",
"https://github.com/weaveworks/weave/pull/3876",
"https://github.com/weaveworks/weave/blob/master/CHANGELOG.md#release-280",
},
},
{
ID: "CVE-2020-26279",
Path: "2020/26xxx/CVE-2020-26279.json",
BlobHash: "512ba0677a38b40714593813bb912e6d9567522b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ipfs/go-ipfs/security/advisories/GHSA-27pv-q55r-222g",
"https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2",
"https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227",
},
},
{
ID: "CVE-2020-26283",
Path: "2020/26xxx/CVE-2020-26283.json",
BlobHash: "9ea7890fad7ea4c6209896233e5a968cd908b1f1",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ipfs/go-ipfs/security/advisories/GHSA-r4gv-vj59-cccm",
"https://github.com/ipfs/go-ipfs/pull/7831",
"https://github.com/ipfs/go-ipfs/commit/fb0a9acd2d8288bd1028c3219a420de62a09683a",
},
},
{
ID: "CVE-2020-26284",
Path: "2020/26xxx/CVE-2020-26284.json",
BlobHash: "98bae0cf7fdeb463685d52b5cc46eeb855d46356",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gohugoio/hugo/security/advisories/GHSA-8j34-9876-pvfq",
"https://github.com/golang/go/issues/38736",
},
},
{
ID: "CVE-2020-26290",
Path: "2020/26xxx/CVE-2020-26290.json",
BlobHash: "2ab920db8c88363ff231559d62b621b3fabaff46",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md",
"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md",
"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md",
"https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/",
"https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5",
"https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7",
"https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8",
"https://github.com/dexidp/dex/releases/tag/v2.27.0",
},
},
{
ID: "CVE-2020-26294",
Path: "2020/26xxx/CVE-2020-26294.json",
BlobHash: "ef140bc7feed35de17a6846477303b646d766e03",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/go-vela/compiler/security/advisories/GHSA-gv2h-gf8m-r68j",
"https://github.com/go-vela/compiler/commit/f1ace5f8a05c95c4d02264556e38a959ee2d9bda",
"https://pkg.go.dev/github.com/go-vela/compiler/compiler",
},
},
{
ID: "CVE-2020-26521",
Path: "2020/26xxx/CVE-2020-26521.json",
BlobHash: "14607d51110f2f457003dd9f48388df6a06ff587",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/nats-io/nats-server/commits/master",
"http://www.openwall.com/lists/oss-security/2020/11/02/2",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT67XCLIIBYRT762SVFBYFFTQFVSM3SI/",
},
},
{
ID: "CVE-2020-26892",
Path: "2020/26xxx/CVE-2020-26892.json",
BlobHash: "e7911516f50d1fe0a6074a2b936a2f262e5cf1b9",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/nats-io/nats-server/commits/master",
"https://www.openwall.com/lists/oss-security/2020/11/02/2",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT67XCLIIBYRT762SVFBYFFTQFVSM3SI/",
},
},
{
ID: "CVE-2020-27151",
Path: "2020/27xxx/CVE-2020-27151.json",
BlobHash: "b877ce39ae927cd03544372226921ac65b9593fd",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugs.launchpad.net/katacontainers.io/+bug/1878234",
"https://github.com/kata-containers/runtime/releases/tag/1.12.0",
"https://github.com/kata-containers/runtime/releases/tag/1.11.5",
"https://github.com/kata-containers/kata-containers/releases/tag/2.0.0",
},
},
{
ID: "CVE-2020-27195",
Path: "2020/27xxx/CVE-2020-27195.json",
BlobHash: "5662c3da9f2f20260a9e35d8123ea808136a6f9d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.nomadproject.io/downloads",
"https://github.com/hashicorp/nomad/blob/master/CHANGELOG.md#0126-october-21-2020",
},
},
{
ID: "CVE-2020-27534",
Path: "2020/27xxx/CVE-2020-27534.json",
BlobHash: "060af0f2ca30afb26effcb2914e8e2b04ee2ede1",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/moby/buildkit/pull/1462",
"https://github.com/moby/moby/pull/40877",
"http://web.archive.org/web/20200530054359/https://docs.docker.com/engine/release-notes/",
"https://golang.org/pkg/io/ioutil/#TempDir",
"https://golang.org/pkg/os/#TempDir",
},
},
{
ID: "CVE-2020-27955",
Path: "2020/27xxx/CVE-2020-27955.json",
BlobHash: "12f3e2562af256a69a256d8150824fcf5fbb8aed",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://legalhackers.com",
"https://exploitbox.io",
"https://github.com/git-lfs/git-lfs/releases",
"https://legalhackers.com/advisories/Git-LFS-RCE-Exploit-CVE-2020-27955.html",
"http://seclists.org/fulldisclosure/2020/Nov/1",
"http://packetstormsecurity.com/files/159923/git-lfs-Remote-Code-Execution.html",
},
},
{
ID: "CVE-2020-28053",
Path: "2020/28xxx/CVE-2020-28053.json",
BlobHash: "7db62ac6a3d54fd3f309bf11d3e50585d7824743",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/consul",
"https://github.com/hashicorp/consul/blob/master/CHANGELOG.md#186-november-19-2020",
},
},
{
ID: "CVE-2020-28348",
Path: "2020/28xxx/CVE-2020-28348.json",
BlobHash: "56ff2fdda5c3c9577be61f5c5800787e61502dde",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hashicorp/nomad/issues/9303",
"https://github.com/hashicorp/nomad/blob/master/CHANGELOG.md#0128-november-10-2020",
},
},
{
ID: "CVE-2020-28349",
Path: "2020/28xxx/CVE-2020-28349.json",
BlobHash: "38ce17799f38d82bc9c424a3c6c7bcecdcd42de3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/brocaar/chirpstack-network-server/commit/f996bb0c6c85281b5658f59ff09db1b4a73db453",
"https://github.com/brocaar/chirpstack-network-server/commit/874fc1a9b01045ebe8a340f0bb01ed19e8256e60",
"https://www.cyberark.com/resources/threat-research-blog/lorawan-mqtt-what-to-know-when-securing-your-iot-network",
},
},
{
ID: "CVE-2020-28466",
Path: "2020/28xxx/CVE-2020-28466.json",
BlobHash: "c0a55f088ed15dc696fd1418cdb1975ef53cd29b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMNATSIONATSSERVERSERVER-1042967",
"https://github.com/nats-io/nats-server/pull/1731",
"http://www.openwall.com/lists/oss-security/2021/03/16/1",
"http://www.openwall.com/lists/oss-security/2021/03/16/2",
},
},
{
ID: "CVE-2020-28914",
Path: "2020/28xxx/CVE-2020-28914.json",
BlobHash: "48df1ceeff9786ddd4ab6046203782c765c0a05e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kata-containers/kata-containers/pull/1062",
"https://github.com/kata-containers/runtime/pull/3042",
"https://github.com/kata-containers/runtime/pull/3051",
"https://github.com/kata-containers/runtime/releases/tag/1.12.0",
"https://github.com/kata-containers/runtime/releases/tag/1.11.5",
},
},
{
ID: "CVE-2020-28924",
Path: "2020/28xxx/CVE-2020-28924.json",
BlobHash: "a62a46f6a8be3a0b924d00a575eb72eef15dddeb",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://rclone.org/downloads/",
"https://github.com/rclone/rclone/issues/4783",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIFT24Q6EFXLQZ24AER2QGFFZLMIPCD/",
},
},
{
ID: "CVE-2020-28991",
Path: "2020/28xxx/CVE-2020-28991.json",
BlobHash: "7e0fb248094364cd58c023bb7a43e7c0de3ba5df",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/go-gitea/gitea/pull/13525",
"https://github.com/go-gitea/gitea/releases/tag/v1.12.6",
},
},
{
ID: "CVE-2020-29243",
Path: "2020/29xxx/CVE-2020-29243.json",
BlobHash: "9d858baedef0166d0f7a6a9ce17e7d74968f103d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "HasVuln",
TriageStateReason: "GO-2021-0097",
},
{
ID: "CVE-2020-29244",
Path: "2020/29xxx/CVE-2020-29244.json",
BlobHash: "a026e8fb7d2e485604f3ce6668e8cb6b30073df1",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "HasVuln",
TriageStateReason: "GO-2021-0097",
},
{
ID: "CVE-2020-29245",
Path: "2020/29xxx/CVE-2020-29245.json",
BlobHash: "b3681813bc67a3ccab7454290f5c2cd4083868c8",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "HasVuln",
TriageStateReason: "GO-2021-0097",
},
{
ID: "CVE-2020-29510",
Path: "2020/29xxx/CVE-2020-29510.json",
BlobHash: "2ce59f158faad4fbc86a583cf1131ef7d3e094ab",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md",
"https://security.netapp.com/advisory/ntap-20210129-0006/",
},
},
{
ID: "CVE-2020-29511",
Path: "2020/29xxx/CVE-2020-29511.json",
BlobHash: "eca8fc190c7d851bb56638a547f8804f48cc8c5f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md",
"https://security.netapp.com/advisory/ntap-20210129-0006/",
},
},
{
ID: "CVE-2020-29662",
Path: "2020/29xxx/CVE-2020-29662.json",
BlobHash: "6d64ebca8fe685276dba327d73690016907bc8e3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/goharbor/harbor/security/advisories/GHSA-38r5-34mr-mvm7",
},
},
{
ID: "CVE-2020-35137",
Path: "2020/35xxx/CVE-2020-35137.json",
BlobHash: "cb400a4dfb8408ca20df47336d3dbdb7cbc259fd",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://play.google.com/store/apps/details?id=com.mobileiron&hl=en_US&gl=US",
"https://www.optiv.com/explore-optiv-insights/source-zero/mobileiron-mdm-contains-static-key-allowing-account-enumeration",
"https://github.com/optiv/rustyIron",
},
},
{
ID: "CVE-2020-35138",
Path: "2020/35xxx/CVE-2020-35138.json",
BlobHash: "f26259101699d38848e61ed9cc9b956ae6788e92",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://play.google.com/store/apps/details?id=com.mobileiron&hl=en_US&gl=US",
"https://www.optiv.com/explore-optiv-insights/source-zero/mobileiron-mdm-contains-static-key-allowing-account-enumeration",
"https://github.com/optiv/rustyIron",
},
},
{
ID: "CVE-2020-35177",
Path: "2020/35xxx/CVE-2020-35177.json",
BlobHash: "bbc0f5f57cd18b395d27eec0fcb4b3caf1d094ac",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#161",
"https://discuss.hashicorp.com/t/hcsec-2020-25-vault-s-ldap-auth-method-allows-user-enumeration/18984",
},
},
{
ID: "CVE-2020-35453",
Path: "2020/35xxx/CVE-2020-35453.json",
BlobHash: "54e12d4f10d80f858cc9495d0bcffd14dc988006",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#161",
"https://discuss.hashicorp.com/t/hcsec-2020-24-vault-enterprise-s-sentinel-egp-policies-may-impact-parent-or-sibling-namespaces/18983",
},
},
{
ID: "CVE-2020-35470",
Path: "2020/35xxx/CVE-2020-35470.json",
BlobHash: "b7f8e4eec6825f7f152847aeeaed65b6cd43896c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy/issues/14087",
"https://github.com/envoyproxy/envoy/pull/14131",
"https://github.com/envoyproxy/envoy/compare/v1.16.0...v1.16.1",
},
},
{
ID: "CVE-2020-35471",
Path: "2020/35xxx/CVE-2020-35471.json",
BlobHash: "ead021f3bfe67c6bbedba9a99f4616a7b580a41c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy/compare/v1.16.0...v1.16.1",
"https://github.com/envoyproxy/envoy/issues/14113",
"https://github.com/envoyproxy/envoy/pull/14122",
},
},
{
ID: "CVE-2020-36066",
Path: "2020/36xxx/CVE-2020-36066.json",
BlobHash: "0fb58953eb66d8730856107ab395e845f2a59d15",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tidwall/gjson/issues/195",
},
},
{
ID: "CVE-2020-3996",
Path: "2020/3xxx/CVE-2020-3996.json",
BlobHash: "08041a31a48cd05b1378c05bd3348b71c0714010",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/vmware-tanzu/velero/security/advisories/GHSA-72xg-3mcq-52v4",
},
},
{
ID: "CVE-2020-4037",
Path: "2020/4xxx/CVE-2020-4037.json",
BlobHash: "5ea639ff7409d1b593eabbea5920d5c293596239",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-5m6c-jp6f-2vcv",
"https://github.com/oauth2-proxy/oauth2-proxy/commit/ee5662e0f5001d76ec76562bb605abbd07c266a2",
},
},
{
ID: "CVE-2020-4053",
Path: "2020/4xxx/CVE-2020-4053.json",
BlobHash: "5f92c559cc9d64ddbb923d7b83c99e6a9082cf96",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/helm/helm/security/advisories/GHSA-qq3j-xp49-j73f",
"https://github.com/helm/helm/commit/0ad800ef43d3b826f31a5ad8dfbb4fe05d143688",
"https://github.com/helm/helm/releases/tag/v3.2.4",
},
},
{
ID: "CVE-2020-5215",
Path: "2020/5xxx/CVE-2020-5215.json",
BlobHash: "21bd7f3fc3bc78cc6af900157836ba3aec7327e8",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-977j-xj7q-2jr9",
"https://github.com/tensorflow/tensorflow/commit/5ac1b9e24ff6afc465756edf845d2e9660bd34bf",
"https://github.com/tensorflow/tensorflow/releases/tag/v1.15.2",
"https://github.com/tensorflow/tensorflow/releases/tag/v2.0.1",
},
},
{
ID: "CVE-2020-5233",
Path: "2020/5xxx/CVE-2020-5233.json",
BlobHash: "c9c511656cdfb0d8e1d4c4698c639e0d0e428c94",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/pusher/oauth2_proxy/security/advisories/GHSA-qqxw-m5fj-f7gv",
"https://github.com/pusher/oauth2_proxy/commit/a316f8a06f3c0ca2b5fc5fa18a91781b313607b2",
"https://github.com/pusher/oauth2_proxy/releases/tag/v5.0.0",
},
},
{
ID: "CVE-2020-5260",
Path: "2020/5xxx/CVE-2020-5260.json",
BlobHash: "fa891ab947bd850d7f63ffa253cc7d2c2d16a348",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q",
"https://github.com/git/git/commit/9a6bbee8006c24b46a85d29e7b38cfa79e9ab21b",
"https://lore.kernel.org/git/xmqqy2qy7xn8.fsf@gitster.c.googlers.com/",
"https://www.debian.org/security/2020/dsa-4657",
"https://lists.debian.org/debian-lts-announce/2020/04/msg00010.html",
"http://www.openwall.com/lists/oss-security/2020/04/15/5",
"http://packetstormsecurity.com/files/157250/Git-Credential-Helper-Protocol-Newline-Injection.html",
"http://www.openwall.com/lists/oss-security/2020/04/15/6",
"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00027.html",
"https://support.apple.com/kb/HT211141",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPCEOIFLLEF24L6GLVJVFZX4CREDEHDF/",
"http://www.openwall.com/lists/oss-security/2020/04/20/1",
"https://security.gentoo.org/glsa/202004-13",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7TVS5UG6JD3MYIGSBKMIOS6AF7CR5IPI/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PN3FUOXKX3AXTULYV53ACABER2W2FSOU/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MOCTR2SEHCPSCOVUQJAGFPGKFMI2VE6V/",
"https://usn.ubuntu.com/4329-1/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/74Q7WVJ6FKLIN62VS2JD2XCNWK5TNKOW/",
"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html",
},
},
{
ID: "CVE-2020-5300",
Path: "2020/5xxx/CVE-2020-5300.json",
BlobHash: "2804f2fbaa0be107dfd335b3149b46d324f82a3a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ory/hydra/security/advisories/GHSA-3p3g-vpw6-4w66",
"https://github.com/ory/hydra/commit/700d17d3b7d507de1b1d459a7261d6fb2571ebe3",
"https://github.com/ory/hydra/releases/tag/v1.4.0",
},
},
{
ID: "CVE-2020-5303",
Path: "2020/5xxx/CVE-2020-5303.json",
BlobHash: "b7c94fac03cbe007acc270ed36c755c6edbf329d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tendermint/tendermint/security/advisories/GHSA-v24h-pjjv-mcp6",
"https://hackerone.com/reports/820317",
"https://github.com/tendermint/tendermint/commit/e2d6859afd7dba4cf97c7f7d412e7d8fc908d1cd",
},
},
{
ID: "CVE-2020-5415",
Path: "2020/5xxx/CVE-2020-5415.json",
BlobHash: "95efec6f658a6b0ba8538d897802ddb37d6fc77e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/concourse/concourse/security/advisories/GHSA-627p-rr78-99rj",
"https://tanzu.vmware.com/security/cve-2020-5415",
},
},
{
ID: "CVE-2020-6016",
Path: "2020/6xxx/CVE-2020-6016.json",
BlobHash: "5c4c115c626c0fceebb52092447bb1b133f3b0dc",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ValveSoftware/GameNetworkingSockets/commit/e0c86dcb9139771db3db0cfdb1fb8bef0af19c43",
"https://research.checkpoint.com/2020/game-on-finding-vulnerabilities-in-valves-steam-sockets/",
},
},
{
ID: "CVE-2020-6017",
Path: "2020/6xxx/CVE-2020-6017.json",
BlobHash: "b0f37ea09fbfcb3024b2f02889f3145ffb16198b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ValveSoftware/GameNetworkingSockets/commit/e0c86dcb9139771db3db0cfdb1fb8bef0af19c43",
"https://research.checkpoint.com/2020/game-on-finding-vulnerabilities-in-valves-steam-sockets/",
},
},
{
ID: "CVE-2020-6018",
Path: "2020/6xxx/CVE-2020-6018.json",
BlobHash: "580bdc2d931b6585f36933c58a8abf5f42c491fa",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ValveSoftware/GameNetworkingSockets/commit/bea84e2844b647532a9b7fbc3a6a8989d66e49e3",
"https://research.checkpoint.com/2020/game-on-finding-vulnerabilities-in-valves-steam-sockets/",
},
},
{
ID: "CVE-2020-6019",
Path: "2020/6xxx/CVE-2020-6019.json",
BlobHash: "ab652b1e325affd6b88afcdea2ed653154102cff",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ValveSoftware/GameNetworkingSockets/commit/d944a10808891d202bb1d5e1998de6e0423af678",
"https://research.checkpoint.com/2020/game-on-finding-vulnerabilities-in-valves-steam-sockets/",
},
},
{
ID: "CVE-2020-7218",
Path: "2020/7xxx/CVE-2020-7218.json",
BlobHash: "bd2d1e359653c01e1ab818d1cb726631146636fb",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/nomad/",
"https://github.com/hashicorp/nomad/issues/7002",
},
},
{
ID: "CVE-2020-7219",
Path: "2020/7xxx/CVE-2020-7219.json",
BlobHash: "8d5c10c0ed8d5c77da30e575f78c42c8bd95877d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/consul/",
"https://github.com/hashicorp/consul/issues/7159",
},
},
{
ID: "CVE-2020-7220",
Path: "2020/7xxx/CVE-2020-7220.json",
BlobHash: "f66a4007b9c793f2bd539d184417a729ff9ba48d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/vault/",
"https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#132-january-22nd-2020",
},
},
{
ID: "CVE-2020-7665",
Path: "2020/7xxx/CVE-2020-7665.json",
BlobHash: "30a2a295432bb889b6d5c8e0a24dc350679c7ffc",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGUZIP-570441",
"https://github.com/u-root/u-root/pull/1817",
},
},
{
ID: "CVE-2020-7666",
Path: "2020/7xxx/CVE-2020-7666.json",
BlobHash: "2a020b03156e3b81a07beb40cdbfd2f6a9ad3da7",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/u-root/u-root/pull/1817",
"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGCPIO-570440",
},
},
{
ID: "CVE-2020-7669",
Path: "2020/7xxx/CVE-2020-7669.json",
BlobHash: "31d1031eb41e7a4b1d10ad12ab96dd32e07f2b51",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/u-root/u-root/pull/1817",
"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGTARUTIL-570428",
},
},
{
ID: "CVE-2020-7955",
Path: "2020/7xxx/CVE-2020-7955.json",
BlobHash: "e13d278b5274372bf45362bb2c501689443de7ac",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/consul/",
"https://github.com/hashicorp/consul/issues/7160",
},
},
{
ID: "CVE-2020-7956",
Path: "2020/7xxx/CVE-2020-7956.json",
BlobHash: "5bd4768bbc32b3cf56ebd583d10e05fb2dd502a4",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/nomad/",
"https://github.com/hashicorp/nomad/issues/7003",
},
},
{
ID: "CVE-2020-8551",
Path: "2020/8xxx/CVE-2020-8551.json",
BlobHash: "09ec4b0e62e1459c63bec75d9ec11f827f1a0156",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/89377",
"https://groups.google.com/forum/#!topic/kubernetes-security-announce/2UOlsba2g0s",
"https://security.netapp.com/advisory/ntap-20200413-0003/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/",
},
},
{
ID: "CVE-2020-8552",
Path: "2020/8xxx/CVE-2020-8552.json",
BlobHash: "0982590ec0d255381877b1e5b9bb7c068303cd08",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/forum/#!topic/kubernetes-security-announce/2UOlsba2g0s",
"https://github.com/kubernetes/kubernetes/issues/89378",
"https://security.netapp.com/advisory/ntap-20200413-0003/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/",
},
},
{
ID: "CVE-2020-8553",
Path: "2020/8xxx/CVE-2020-8553.json",
BlobHash: "7a2e4a618c0752663f3226bd1fc449e1ff7b7466",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/ingress-nginx/issues/5126",
},
},
{
ID: "CVE-2020-8554",
Path: "2020/8xxx/CVE-2020-8554.json",
BlobHash: "e58456be0269d61b3b3993e128541e03877e05b4",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/g/kubernetes-security-announce/c/iZWsF9nbKE8",
"https://github.com/kubernetes/kubernetes/issues/97076",
"https://lists.apache.org/thread.html/rcafa485d63550657f068775801aeb706b7a07140a8ebbdef822b3bb3@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/r0c76b3d0be348f788cd947054141de0229af00c540564711e828fd40@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/rdb223e1b82e3d7d8e4eaddce8dd1ab87252e3935cc41c859f49767b6@%3Ccommits.druid.apache.org%3E",
"https://lists.apache.org/thread.html/r1975078e44d96f2a199aa90aa874b57a202eaf7f25f2fde6d1c44942@%3Ccommits.druid.apache.org%3E",
},
},
{
ID: "CVE-2020-8555",
Path: "2020/8xxx/CVE-2020-8555.json",
BlobHash: "ffdef13b994f7ecc3e5ae844e868c5eade0ec3e7",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.openwall.com/lists/oss-security/2020/06/01/4",
"https://groups.google.com/d/topic/kubernetes-security-announce/kEK27tqqs30/discussion",
"https://github.com/kubernetes/kubernetes/issues/91542",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/",
"https://security.netapp.com/advisory/ntap-20200724-0005/",
},
},
{
ID: "CVE-2020-8557",
Path: "2020/8xxx/CVE-2020-8557.json",
BlobHash: "3c46c71bf16eb4e152d2b39490d1954c65d0159e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/93032",
"https://groups.google.com/g/kubernetes-security-announce/c/cB_JUsYEKyY/m/vVSO61AhBwAJ",
"https://security.netapp.com/advisory/ntap-20200821-0002/",
},
},
{
ID: "CVE-2020-8558",
Path: "2020/8xxx/CVE-2020-8558.json",
BlobHash: "4c416416b21504042574609fff1d379779d4600d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/92315",
"https://groups.google.com/g/kubernetes-announce/c/sI4KmlH3S2I/m/TljjxOBvBQAJ",
"https://security.netapp.com/advisory/ntap-20200821-0001/",
},
},
{
ID: "CVE-2020-8559",
Path: "2020/8xxx/CVE-2020-8559.json",
BlobHash: "603bddd77f4f116b070972262cbf19faf6c893f7",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/d/msg/kubernetes-security-announce/JAIGG5yNROs/19nHQ5wkBwAJ",
"https://github.com/kubernetes/kubernetes/issues/92914",
"https://security.netapp.com/advisory/ntap-20200810-0004/",
},
},
{
ID: "CVE-2020-8563",
Path: "2020/8xxx/CVE-2020-8563.json",
BlobHash: "1ba7a7715ba9b749e94cc5b2eb0048b52e7d1011",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kubernetes/kubernetes/issues/95621",
"https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ",
"https://security.netapp.com/advisory/ntap-20210122-0006/",
},
},
{
ID: "CVE-2020-8566",
Path: "2020/8xxx/CVE-2020-8566.json",
BlobHash: "c5e81c9e5a057e9840a14221d3df018be34e3b32",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ",
"https://github.com/kubernetes/kubernetes/issues/95624",
"https://security.netapp.com/advisory/ntap-20210122-0006/",
},
},
{
ID: "CVE-2020-8569",
Path: "2020/8xxx/CVE-2020-8569.json",
BlobHash: "5f0759887fb13de6d35b124c55bc2eabacbf00c8",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/g/kubernetes-security-announce/c/1EzCr1qUxxU",
"https://github.com/kubernetes-csi/external-snapshotter/issues/380",
},
},
{
ID: "CVE-2020-8595",
Path: "2020/8xxx/CVE-2020-8595.json",
BlobHash: "6071d2ddeaf2d2d89ed12edc7a5de18009f7fc17",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/istio/istio/commits/master",
"https://istio.io/news/security/",
"https://access.redhat.com/errata/RHSA-2020:0477",
"https://access.redhat.com/security/cve/cve-2020-8595",
"https://istio.io/news/security/istio-security-2020-001/",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-8595",
},
},
{
ID: "CVE-2020-8659",
Path: "2020/8xxx/CVE-2020-8659.json",
BlobHash: "b0dc65fdeb534c984ec215f2f4327eab9c2ae3db",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-jwcm-4pwp-c2qv",
"https://access.redhat.com/errata/RHSA-2020:0734",
},
},
{
ID: "CVE-2020-8660",
Path: "2020/8xxx/CVE-2020-8660.json",
BlobHash: "acddebf5b2fc96e6a2f4a3e0fad2421f0657275b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-c4g8-7grc-5wvx",
"https://access.redhat.com/errata/RHSA-2020:0734",
},
},
{
ID: "CVE-2020-8661",
Path: "2020/8xxx/CVE-2020-8661.json",
BlobHash: "14e31e81f1b7bf25da58aaf52bc420301fa3bda9",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-36cq-ww7h-p4j7",
"https://access.redhat.com/errata/RHSA-2020:0734",
},
},
{
ID: "CVE-2020-8663",
Path: "2020/8xxx/CVE-2020-8663.json",
BlobHash: "1aa92bbeb6c1f17c2c5475fb42bc4a3bbcdbb6f0",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-v8q7-fq78-4997",
},
},
{
ID: "CVE-2020-8664",
Path: "2020/8xxx/CVE-2020-8664.json",
BlobHash: "85aeb8e32d460e381a7464d2daadd6bb84a64875",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-3x9m-pgmg-xpx8",
"https://access.redhat.com/errata/RHSA-2020:0734",
},
},
{
ID: "CVE-2020-8826",
Path: "2020/8xxx/CVE-2020-8826.json",
BlobHash: "62b21aea4341b73f8faf0ad7961ceb31958fb441",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/argoproj/argo/releases",
"https://www.soluble.ai/blog/argo-cves-2020",
"https://argoproj.github.io/argo-cd/security_considerations/",
},
},
{
ID: "CVE-2020-8827",
Path: "2020/8xxx/CVE-2020-8827.json",
BlobHash: "b0c1ff33bfdd649b6987e035775afcf826972a36",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/argoproj/argo/releases",
"https://www.soluble.ai/blog/argo-cves-2020",
"https://argoproj.github.io/argo-cd/security_considerations/",
"https://argoproj.github.io/argo-cd/operator-manual/user-management/#disable-admin-user",
},
},
{
ID: "CVE-2020-8828",
Path: "2020/8xxx/CVE-2020-8828.json",
BlobHash: "21fe5b894a68ece2ed54cc4c6497129f02c0b5b0",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/argoproj/argo/releases",
"https://www.soluble.ai/blog/argo-cves-2020",
"https://argoproj.github.io/argo-cd/security_considerations/",
},
},
{
ID: "CVE-2020-8843",
Path: "2020/8xxx/CVE-2020-8843.json",
BlobHash: "7266cfa62b86bdb3fa3967b3b1383aed8f77f204",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/istio/istio/commits/master",
"https://istio.io/news/security/",
"https://istio.io/news/security/istio-security-2020-002/",
},
},
{
ID: "CVE-2020-8927",
Path: "2020/8xxx/CVE-2020-8927.json",
BlobHash: "a74b79d653c28d5411481b759920e926d3f116fb",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/google/brotli/releases/tag/v1.0.9",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP/",
"https://usn.ubuntu.com/4568-1/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH/",
"https://lists.debian.org/debian-lts-announce/2020/12/msg00003.html",
"https://www.debian.org/security/2020/dsa-4801",
},
},
{
ID: "CVE-2020-8929",
Path: "2020/8xxx/CVE-2020-8929.json",
BlobHash: "6687103ed33ba44db734d45dc9bf83a6755bdbfd",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/google/tink/commit/93d839a5865b9d950dffdc9d0bc99b71280a8899",
"https://github.com/google/tink/security/advisories/GHSA-g5vf-v6wf-7w2r",
},
},
{
ID: "CVE-2020-9321",
Path: "2020/9xxx/CVE-2020-9321.json",
BlobHash: "7dd986987adca8f06cae07dbb79ffad46e10f31c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/containous/traefik/pull/6281",
"https://github.com/containous/traefik/releases/tag/v2.1.4",
},
},
{
ID: "CVE-2020-9329",
Path: "2020/9xxx/CVE-2020-9329.json",
BlobHash: "77443824e256f2f79f659817791d65215d19cc72",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gogs/gogs/issues/5926",
},
},
{
ID: "CVE-2021-20198",
Path: "2021/20xxx/CVE-2021-20198.json",
BlobHash: "36f39b7dec6ed1972bb53296ee4ead1810c35b04",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1920764",
},
},
{
ID: "CVE-2021-20199",
Path: "2021/20xxx/CVE-2021-20199.json",
BlobHash: "036706579ffcc0f5251f5fe77e2b1497e13fa85b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1919050",
"https://github.com/containers/podman/issues/5138",
"https://github.com/rootless-containers/rootlesskit/pull/206",
"https://github.com/containers/podman/pull/9052",
},
},
{
ID: "CVE-2021-20218",
Path: "2021/20xxx/CVE-2021-20218.json",
BlobHash: "41e4faa44f343eac8722b74e31baee7f9a3b6f87",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1923405",
"https://github.com/fabric8io/kubernetes-client/issues/2715",
},
},
{
ID: "CVE-2021-20291",
Path: "2021/20xxx/CVE-2021-20291.json",
BlobHash: "50e725a2db767f452cefbf2eb01028a24fa5603f",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1939485",
},
},
{
ID: "CVE-2021-21271",
Path: "2021/21xxx/CVE-2021-21271.json",
BlobHash: "978caf2547d11f0b49d2089bb10582324287eb96",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tendermint/tendermint/security/advisories/GHSA-p658-8693-mhvg",
"https://github.com/tendermint/tendermint/blob/v0.34.3/CHANGELOG.md#v0.34.3",
"https://github.com/tendermint/tendermint/commit/a2a6852ab99e4a0f9e79f0ea8c1726e262e25c76",
},
},
{
ID: "CVE-2021-21284",
Path: "2021/21xxx/CVE-2021-21284.json",
BlobHash: "30c62672c6ef54c5784409a23208fc40197b4f49",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://docs.docker.com/engine/release-notes/#20103",
"https://github.com/moby/moby/releases/tag/v20.10.3",
"https://github.com/moby/moby/releases/tag/v19.03.15",
"https://github.com/moby/moby/security/advisories/GHSA-7452-xqpj-6rpc",
"https://github.com/moby/moby/commit/64bd4485b3a66a597c02c95f5776395e540b2c7c",
"https://security.netapp.com/advisory/ntap-20210226-0005/",
"https://www.debian.org/security/2021/dsa-4865",
},
},
{
ID: "CVE-2021-21285",
Path: "2021/21xxx/CVE-2021-21285.json",
BlobHash: "86f5c8e875762d39fc91eadd1f304afcf3d5dcf3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/moby/moby/security/advisories/GHSA-6fj5-m822-rqx8",
"https://docs.docker.com/engine/release-notes/#20103",
"https://github.com/moby/moby/releases/tag/v20.10.3",
"https://github.com/moby/moby/releases/tag/v19.03.15",
"https://github.com/moby/moby/commit/8d3179546e79065adefa67cc697c09d0ab137d30",
"https://security.netapp.com/advisory/ntap-20210226-0005/",
"https://www.debian.org/security/2021/dsa-4865",
},
},
{
ID: "CVE-2021-21287",
Path: "2021/21xxx/CVE-2021-21287.json",
BlobHash: "15436dba58b58830e5fbe2e705ec4288af28b3dc",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q",
"https://github.com/minio/minio/pull/11337",
"https://github.com/minio/minio/commit/eb6871ecd960d570f70698877209e6db181bf276",
"https://github.com/minio/minio/releases/tag/RELEASE.2021-01-30T00-20-58Z",
},
},
{
ID: "CVE-2021-21291",
Path: "2021/21xxx/CVE-2021-21291.json",
BlobHash: "f881d6472d7fa68fb4553fddccc75150413a0097",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-4mf2-f3wh-gvf2",
"https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v7.0.0",
"https://pkg.go.dev/github.com/oauth2-proxy/oauth2-proxy/v7",
"https://github.com/oauth2-proxy/oauth2-proxy/commit/780ae4f3c99b579cb2ea9845121caebb6192f725",
},
},
{
ID: "CVE-2021-21296",
Path: "2021/21xxx/CVE-2021-21296.json",
BlobHash: "c89066f834f7df81387343c61b002a63cb6e2224",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/fleetdm/fleet/security/advisories/GHSA-xwh8-9p3f-3x45",
"https://www.npmjs.com/package/fleetctl",
"https://github.com/fleetdm/fleet/commit/f68f4238e83b45b2164e4ed05df14af0f06eaf40",
},
},
{
ID: "CVE-2021-21300",
Path: "2021/21xxx/CVE-2021-21300.json",
BlobHash: "f2dafbd39d2eadea6c56513663a4d296f475a47c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm",
"https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/",
"https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks",
"https://git-scm.com/docs/gitattributes#_filter",
"https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592",
"http://www.openwall.com/lists/oss-security/2021/03/09/3",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCLJJLKKMS5WRFO6C475AOUZTWQLIARX/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LMXX2POK5X576BSDWSXGU7EIK6I72ERU/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBPNGLQSYJHLZZ37BO42YY6S5OTIF4L4/",
},
},
{
ID: "CVE-2021-21303",
Path: "2021/21xxx/CVE-2021-21303.json",
BlobHash: "d11843a853e5e85164821385ed91a62834180092",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/helm/helm/security/advisories/GHSA-c38g-469g-cmgx",
"https://github.com/helm/helm/commit/6ce9ba60b73013857e2e7c73d3f86ed70bc1ac9a",
"https://github.com/helm/helm/releases/tag/v3.5.2",
},
},
{
ID: "CVE-2021-21334",
Path: "2021/21xxx/CVE-2021-21334.json",
BlobHash: "be2655d8200ac614b22315b90181f6c5cbc7c756",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/containerd/containerd/security/advisories/GHSA-6g2q-w5j3-fwh4",
"https://github.com/containerd/containerd/releases/tag/v1.4.4",
"https://github.com/containerd/containerd/releases/tag/v1.3.10",
"https://github.com/containerd/containerd/commit/05f951a3781f4f2c1911b05e61c160e9c30eaa8e",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUE2Z2ZUWBHRU36ZGBD2YSJCYB6ELPXE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QIBPKSX5IOWPM3ZPFB3JVLXWDHSZTTWT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VTXHA5JOWQRCCUZH7ZQBEYN6KZKJEYSD/",
},
},
{
ID: "CVE-2021-21362",
Path: "2021/21xxx/CVE-2021-21362.json",
BlobHash: "303ed59cb9f1685d2e51e0fb37de0b61f43a9315",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/minio/minio/security/advisories/GHSA-hq5j-6r98-9m8v",
"https://github.com/minio/minio/pull/11682",
"https://github.com/minio/minio/commit/039f59b552319fcc2f83631bb421a7d4b82bc482",
"https://github.com/minio/minio/releases/tag/RELEASE.2021-03-04T00-53-13Z",
},
},
{
ID: "CVE-2021-21363",
Path: "2021/21xxx/CVE-2021-21363.json",
BlobHash: "b0697dcfd6d2cb36677757a058c46f5a4e40a15e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-pc22-3g76-gm6j",
"https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89",
},
},
{
ID: "CVE-2021-21364",
Path: "2021/21xxx/CVE-2021-21364.json",
BlobHash: "2b47524049b50602bc70e72913bc6c20ac7387a3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-hpv8-9rq5-hq7w",
"https://github.com/swagger-api/swagger-codegen/commit/35adbd552d5f99b3ff1e0e59da228becc85190f2",
},
},
{
ID: "CVE-2021-21378",
Path: "2021/21xxx/CVE-2021-21378.json",
BlobHash: "f0d766bee258a38351382e41af42da47c96492fe",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-4996-m8hf-hj27",
"https://github.com/envoyproxy/envoy/pull/15194",
"https://github.com/envoyproxy/envoy/commit/ea39e3cba652bcc4b11bb0d5c62b017e584d2e5a",
},
},
{
ID: "CVE-2021-21390",
Path: "2021/21xxx/CVE-2021-21390.json",
BlobHash: "1f0ffef9cc992a8bbc3e15668c9380b016ea9df1",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/minio/minio/security/advisories/GHSA-xr7r-7gpj-5pgp",
"https://github.com/minio/minio/pull/11801",
"https://github.com/minio/minio/commit/e197800f9055489415b53cf137e31e194aaf7ba0",
},
},
{
ID: "CVE-2021-21404",
Path: "2021/21xxx/CVE-2021-21404.json",
BlobHash: "f52a011c5031b91375d3cbe7e8f0c5d640502144",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/syncthing/syncthing/security/advisories/GHSA-x462-89pf-6r5h",
"https://pkg.go.dev/github.com/syncthing/syncthing",
"https://github.com/syncthing/syncthing/commit/fb4fdaf4c0a79c22cad000c42ac1394e3ccb6a97",
"https://github.com/syncthing/syncthing/releases/tag/v1.15.0",
},
},
{
ID: "CVE-2021-21411",
Path: "2021/21xxx/CVE-2021-21411.json",
BlobHash: "c0e226682ede3fdfde49ddb7b94e3bf0bbb2e61e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://pkg.go.dev/github.com/oauth2-proxy/oauth2-proxy/v7",
"https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-652x-m2gr-hppm",
"https://github.com/oauth2-proxy/oauth2-proxy/commit/0279fa7dff1752f1710707dbd1ffac839de8bbfc",
"https://docs.gitlab.com/ee/user/group/",
"https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v7.1.0",
},
},
{
ID: "CVE-2021-21432",
Path: "2021/21xxx/CVE-2021-21432.json",
BlobHash: "328bc5221f5d982efa361723e742526ab53427f3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/go-vela/server/security/advisories/GHSA-8j3f-mhq8-gmh4",
"https://pkg.go.dev/github.com/go-vela/server",
"https://github.com/go-vela/server/releases/tag/v0.7.5",
"https://github.com/go-vela/server/pull/337",
"https://github.com/go-vela/server/commit/cb4352918b8ecace9fe969b90404d337b0744d46",
},
},
{
ID: "CVE-2021-22538",
Path: "2021/22xxx/CVE-2021-22538.json",
BlobHash: "c99e02a596b7de10c88315315d804d33285e634a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/google/exposure-notifications-verification-server/security/advisories/GHSA-5v95-v8c8-3rh6",
"https://github.com/google/exposure-notifications-verification-server/commit/eb8cf40b12dbe79304f1133c06fb73419383cd95",
"https://github.com/google/exposure-notifications-verification-server/releases/tag/v0.23.1",
"https://github.com/google/exposure-notifications-verification-server/releases/tag/v0.24.0",
},
},
{
ID: "CVE-2021-23345",
Path: "2021/23xxx/CVE-2021-23345.json",
BlobHash: "f7fdaec22b9dac4f5cc50dd383427ec611a1004c",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTHECODINGMACHINEGOTENBERG-1062043",
"https://github.com/thecodingmachine/gotenberg/issues/261",
},
},
{
ID: "CVE-2021-23347",
Path: "2021/23xxx/CVE-2021-23347.json",
BlobHash: "346f5ec02402d7dadbb69d56467fd57fca40f8b3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMARGOPROJARGOCDCMD-1078291",
"https://github.com/argoproj/argo-cd/pull/5563",
},
},
{
ID: "CVE-2021-23351",
Path: "2021/23xxx/CVE-2021-23351.json",
BlobHash: "568be6cfe865f943f6f8a45058ef7a74f01148f8",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1081577",
"https://github.com/pires/go-proxyproto/pull/71",
"https://github.com/pires/go-proxyproto/issues/69",
"https://github.com/pires/go-proxyproto/commit/7f48261db810703d173f27f3309a808cc2b49b8b",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BNVGJMVI3ZTZ675EFPUHPGXCKCGSX46/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36IBVOZXRTWM7MGTRUTOM56P5RR74VU/",
},
},
{
ID: "CVE-2021-23357",
Path: "2021/23xxx/CVE-2021-23357.json",
BlobHash: "a9678541d5fe167a1c9825bb4883b056590461e2",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTECHNOLOGIESTYKGATEWAY-1078516",
"https://github.com/TykTechnologies/tyk/issues/3390",
},
},
{
ID: "CVE-2021-23827",
Path: "2021/23xxx/CVE-2021-23827.json",
BlobHash: "a2578d805be173c453968081730d81ccbe16bad6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/keybase/client/releases",
"https://johnjhacking.com/blog/cve-2021-23827/",
"https://hackerone.com/reports/1074930",
},
},
{
ID: "CVE-2021-25313",
Path: "2021/25xxx/CVE-2021-25313.json",
BlobHash: "760454b213f7a9c1ca5721635a73f847ec06099d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.suse.com/show_bug.cgi?id=1181852",
"https://github.com/rancher/rancher/issues/31583",
"https://github.com/rancher/rancher/releases/tag/v2.5.6",
},
},
{
ID: "CVE-2021-25834",
Path: "2021/25xxx/CVE-2021-25834.json",
BlobHash: "4a088aef94c3ce4b3667a8296db56f974a47331b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/cosmos/ethermint/issues/686",
},
},
{
ID: "CVE-2021-25835",
Path: "2021/25xxx/CVE-2021-25835.json",
BlobHash: "bd2490d03a0accbf294384a5d0c4b7f46f442ac6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/cosmos/ethermint/issues/687",
"https://github.com/cosmos/ethermint/pull/692",
},
},
{
ID: "CVE-2021-25836",
Path: "2021/25xxx/CVE-2021-25836.json",
BlobHash: "784031dd9a871068b40d967d146de12606c8f1e0",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/cosmos/ethermint/issues/667#issuecomment-759284303",
},
},
{
ID: "CVE-2021-25837",
Path: "2021/25xxx/CVE-2021-25837.json",
BlobHash: "6a11801aae616e08a19eb9f38a88f5e4da0277bb",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/cosmos/ethermint/issues/667#issuecomment-759284107",
},
},
{
ID: "CVE-2021-26921",
Path: "2021/26xxx/CVE-2021-26921.json",
BlobHash: "d4787d5df538c35322c74936a787102399c24a75",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/argoproj/argo-cd/compare/v1.8.3...v1.8.4",
"https://github.com/argoproj/argo-cd/commit/f5b0db240b4e3abf18e97f6fd99096b4f9e94dc5",
"https://github.com/argoproj/argo-cd/security/advisories/GHSA-9h6w-j7w4-jr52",
},
},
{
ID: "CVE-2021-26923",
Path: "2021/26xxx/CVE-2021-26923.json",
BlobHash: "f0bd85a75f16cca777a0476a3094fe70784cdf9b",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/argoproj/argo-cd/compare/v1.8.3...v1.8.4",
"https://github.com/argoproj/argo-cd/security/advisories/GHSA-pfgj-mh5m-2p48",
},
},
{
ID: "CVE-2021-26924",
Path: "2021/26xxx/CVE-2021-26924.json",
BlobHash: "d29ca782e39d26dc2c068caf8012236a5b847f89",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/argoproj/argo-cd/compare/v1.8.3...v1.8.4",
"https://github.com/argoproj/argo-cd/security/advisories/GHSA-pg99-h5gc-446r",
},
},
{
ID: "CVE-2021-27098",
Path: "2021/27xxx/CVE-2021-27098.json",
BlobHash: "539f3f2377b46e2dad9e378e4db48c3aa819cba0",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/spiffe/spire/security/advisories/GHSA-h746-rm5q-8mgq",
},
},
{
ID: "CVE-2021-27099",
Path: "2021/27xxx/CVE-2021-27099.json",
BlobHash: "c005ee5a8bac6d91625b5111c4516391cb7e0796",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/spiffe/spire/security/advisories/GHSA-q7gm-mjrg-44h9",
},
},
{
ID: "CVE-2021-27358",
Path: "2021/27xxx/CVE-2021-27358.json",
BlobHash: "aba8205fd68a792685ad77217a278384c8b9e8b4",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/grafana/blob/master/CHANGELOG.md",
"https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-2/",
"https://github.com/grafana/grafana/blob/master/CHANGELOG.md#742-2021-02-17",
},
},
{
ID: "CVE-2021-27375",
Path: "2021/27xxx/CVE-2021-27375.json",
BlobHash: "a9b8cf26eb914e7056badec571dfbb318272579e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/traefik/traefik/pull/7904",
"https://github.com/traefik/traefik/releases/tag/v2.4.5",
},
},
{
ID: "CVE-2021-27935",
Path: "2021/27xxx/CVE-2021-27935.json",
BlobHash: "f1fbf363fc76f87dfc5d3205c1e371aef24f938d",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/AdguardTeam/AdGuardHome/issues/2470",
},
},
{
ID: "CVE-2021-27940",
Path: "2021/27xxx/CVE-2021-27940.json",
BlobHash: "35ea4e985c93d6d8449ba1e50766b39aa0857c96",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/openark/orchestrator/pull/1313",
"https://github.com/openark/orchestrator/releases/tag/v3.2.4",
"https://www.youtube.com/watch?v=DOYm0DIS3Us",
},
},
{
ID: "CVE-2021-28361",
Path: "2021/28xxx/CVE-2021-28361.json",
BlobHash: "0de97584b55224ffd84e0c77080e3cd75432f3b9",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/spdk/spdk/releases/tag/v21.01.1",
},
},
{
ID: "CVE-2021-28378",
Path: "2021/28xxx/CVE-2021-28378.json",
BlobHash: "c5c41d55d5713b680020faad631c31040d381508",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/go-gitea/gitea/pull/14898",
"https://blog.gitea.io/2021/03/gitea-1.13.4-is-released/",
},
},
{
ID: "CVE-2021-28681",
Path: "2021/28xxx/CVE-2021-28681.json",
BlobHash: "ffd61ae772a9228c6b39b632a1a1efb42b539f55",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/pion/webrtc/issues/1708",
"https://github.com/pion/webrtc/security/advisories/GHSA-74xm-qj29-cq8p",
},
},
{
ID: "CVE-2021-28954",
Path: "2021/28xxx/CVE-2021-28954.json",
BlobHash: "c96faf1a3c298a8d302bde4a33e53922056325b4",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/chriswalz/bit/releases/tag/v1.0.5",
"https://vuln.ryotak.me/advisories/17",
},
},
{
ID: "CVE-2021-28955",
Path: "2021/28xxx/CVE-2021-28955.json",
BlobHash: "7c3869ed9845a4062e9529893144b191b8842cb2",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/MichaelMure/git-bug/security/advisories/GHSA-m898-h4pm-pqfr",
"https://vuln.ryotak.me/advisories/18",
},
},
{
ID: "CVE-2021-29136",
Path: "2021/29xxx/CVE-2021-29136.json",
BlobHash: "942c7f190f4df5dbbe3e0e0f766c8c177b3f4eb3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.openwall.com/lists/oss-security/2021/04/06/2",
"https://github.com/opencontainers/umoci/security/advisories/GHSA-9m95-8hx6-7p9v",
"https://github.com/opencontainers/umoci/commit/d9efc31daf2206f7d3fdb839863cf7a576a2eb57",
},
},
{
ID: "CVE-2021-29271",
Path: "2021/29xxx/CVE-2021-29271.json",
BlobHash: "0296f139e8bb821d7e853cd0196bda02c3eac2d3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/umputun/remark42/compare/v1.6.0...v1.6.1",
"https://vuln.ryotak.me/advisories/19",
},
},
{
ID: "CVE-2021-29272",
Path: "2021/29xxx/CVE-2021-29272.json",
BlobHash: "49dbdd5ac9bf867a0115a5892116495ab83509a3",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/microcosm-cc/bluemonday/releases/tag/v1.0.5",
"https://vuln.ryotak.me/advisories/4",
},
},
{
ID: "CVE-2021-29417",
Path: "2021/29xxx/CVE-2021-29417.json",
BlobHash: "899a3cfaae898f0f4490c3eae0dbd9ffee040d3a",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/liamg/gitjacker/releases/tag/v0.1.0",
"https://github.com/liamg/gitjacker/compare/v0.0.3...v0.1.0",
"https://vuln.ryotak.me/advisories/5",
},
},
{
ID: "CVE-2021-29651",
Path: "2021/29xxx/CVE-2021-29651.json",
BlobHash: "072c610f315a16d8ff3e37bbaa92b0f9bd65d8a6",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/pomerium/pomerium/security/advisories/GHSA-35vc-w93w-75c2",
},
},
{
ID: "CVE-2021-29652",
Path: "2021/29xxx/CVE-2021-29652.json",
BlobHash: "9d55b7d4d0a1750890880ca5070f0aaaa74bf3f4",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/pomerium/pomerium/security/advisories/GHSA-fv82-r8qv-ch4v",
},
},
{
ID: "CVE-2021-3344",
Path: "2021/3xxx/CVE-2021-3344.json",
BlobHash: "05e0c6e64ea180e7ff2b4bc93696d1d430e4dcb2",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1921450",
},
},
{
ID: "CVE-2021-3382",
Path: "2021/3xxx/CVE-2021-3382.json",
BlobHash: "6dbdcf6d4e58c1264b1b9066295ed35e61e9ffb0",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/go-gitea/gitea/pull/14390",
},
},
{
ID: "CVE-2021-3391",
Path: "2021/3xxx/CVE-2021-3391.json",
BlobHash: "047ec1a6d8af1ac4b251c1c4dbbdaf209178a92e",
CommitHash: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
CommitTime: time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.mobileiron.com/en/blog/mobileiron-security-updates-available",
"https://www.optiv.com/explore-optiv-insights/source-zero/mobileiron-mdm-contains-static-key-allowing-account-enumeration",
"https://github.com/optiv/rustyIron",
},
},
{
ID: "CVE-2020-27847",
Path: "2020/27xxx/CVE-2020-27847.json",
BlobHash: "7a69948e5eed4bfed39f606583914f2983ea3007",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/",
"https://bugzilla.redhat.com/show_bug.cgi?id=1907732",
"https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5",
},
},
{
ID: "CVE-2020-7731",
Path: "2020/7xxx/CVE-2020-7731.json",
BlobHash: "84d3ee645657f3058b9e470f634c775105214c73",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOSAML2-608302",
"https://github.com/russellhaering/gosaml2/issues/59",
},
},
{
ID: "CVE-2020-28851",
Path: "2020/28xxx/CVE-2020-28851.json",
BlobHash: "236c70a1561d1bb784e225ed716d42127133b482",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/golang/go/issues/42535",
"https://security.netapp.com/advisory/ntap-20210212-0004/",
},
},
{
ID: "CVE-2020-28852",
Path: "2020/28xxx/CVE-2020-28852.json",
BlobHash: "1c5f2daee464e715687e3423febc10cd4c76d1f5",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/golang/go/issues/42536",
"https://security.netapp.com/advisory/ntap-20210212-0004/",
},
},
{
ID: "CVE-2020-10729",
Path: "2020/10xxx/CVE-2020-10729.json",
BlobHash: "8b8bbd0c954d31aa029e8cd777837545d31a2bcd",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1831089",
"https://github.com/ansible/ansible/issues/34144",
"https://www.debian.org/security/2021/dsa-4950",
},
},
{
ID: "CVE-2020-10808",
Path: "2020/10xxx/CVE-2020-10808.json",
BlobHash: "1554aedd6d7c7fc2d8d957e056697277433c61d1",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://forum.vestacp.com/viewforum.php?f=25",
"https://pentest.blog/vesta-control-panel-second-order-remote-code-execution-0day-step-by-step-analysis/",
"https://github.com/rapid7/metasploit-framework/pull/13094",
"http://packetstormsecurity.com/files/157111/Vesta-Control-Panel-Authenticated-Remote-Code-Execution.html",
"http://packetstormsecurity.com/files/157219/Vesta-Control-Panel-Authenticated-Remote-Code-Execution.html",
},
},
{
ID: "CVE-2020-18032",
Path: "2020/18xxx/CVE-2020-18032.json",
BlobHash: "dfa390b301a1064a8d54bbf703d5c4fc2333ac08",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://gitlab.com/graphviz/graphviz/-/issues/1700",
"https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html",
"https://www.debian.org/security/2021/dsa-4914",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/",
"https://security.gentoo.org/glsa/202107-04",
},
},
{
ID: "CVE-2020-19498",
Path: "2020/19xxx/CVE-2020-19498.json",
BlobHash: "86e6073863789e332b09d507a6a0b7e093ff5ba7",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/strukturag/libheif/issues/139",
"https://github.com/strukturag/libheif/commit/2710c930918609caaf0a664e9c7bc3dce05d5b58",
},
},
{
ID: "CVE-2020-19499",
Path: "2020/19xxx/CVE-2020-19499.json",
BlobHash: "61b2beb78d46027d5d8d0d1ecca33b3f47839e83",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/strukturag/libheif/issues/138",
"https://github.com/strukturag/libheif/commit/f7399b62d7fbc596f1b2871578c1d2053bedf1dd",
},
},
{
ID: "CVE-2020-23109",
Path: "2020/23xxx/CVE-2020-23109.json",
BlobHash: "16426b7912aff0b364acd86087ed330d21124483",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/strukturag/libheif/issues/207",
},
},
{
ID: "CVE-2020-27386",
Path: "2020/27xxx/CVE-2020-27386.json",
BlobHash: "715de3dfd05b255dd650df3bc91759ce4f7c2f39",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/MacdonaldRobinson/FlexDotnetCMS/releases/tag/v1.5.9",
"https://blog.vonahi.io/whats-in-a-re-name/",
"https://github.com/rapid7/metasploit-framework/pull/14339",
"http://packetstormsecurity.com/files/160411/FlexDotnetCMS-1.5.8-Arbitrary-ASP-File-Upload.html",
},
},
{
ID: "CVE-2020-27387",
Path: "2020/27xxx/CVE-2020-27387.json",
BlobHash: "0ede9f0de5e4debb19ecab0331853c154b4ad049",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/pull/14340",
"https://github.com/ttimot24/HorizontCMS/commit/436b5ab679fd27afa3d99c023dbe103113da4fee",
"https://blog.vonahi.io/whats-in-a-re-name/",
"http://packetstormsecurity.com/files/160046/HorizontCMS-1.0.0-beta-Shell-Upload.html",
},
},
{
ID: "CVE-2020-28347",
Path: "2020/28xxx/CVE-2020-28347.json",
BlobHash: "7f354a67a4870f4d85a347abf84ab56da3fd58f0",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2020/minesweeper.md",
"https://github.com/rdomanski/Exploits_and_Advisories/blob/master/advisories/Pwn2Own/Tokyo2020/minesweeper.md",
"https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2019/lao_bomb/lao_bomb.md",
"https://github.com/rdomanski/Exploits_and_Advisories/blob/master/advisories/Pwn2Own/Tokyo2019/lao_bomb.md",
"https://github.com/rapid7/metasploit-framework/pull/14365",
},
},
{
ID: "CVE-2020-36404",
Path: "2020/36xxx/CVE-2020-36404.json",
BlobHash: "f20fd0cf59912c175ecd89557c8c1a20c376a333",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22371",
"https://github.com/google/oss-fuzz-vulns/blob/main/vulns/keystone/OSV-2020-1506.yaml",
"https://github.com/keystone-engine/keystone/releases",
},
},
{
ID: "CVE-2020-36405",
Path: "2020/36xxx/CVE-2020-36405.json",
BlobHash: "28b6333bb289776801f79406e4c5bd9433e880e0",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/keystone-engine/keystone/releases",
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22850",
"https://github.com/google/oss-fuzz-vulns/blob/main/vulns/keystone/OSV-2020-789.yaml",
},
},
{
ID: "CVE-2020-7350",
Path: "2020/7xxx/CVE-2020-7350.json",
BlobHash: "072675947597475cae1d47440cc4ad3245282780",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/issues/13026",
},
},
{
ID: "CVE-2020-7351",
Path: "2020/7xxx/CVE-2020-7351.json",
BlobHash: "8b20736854df0eac414d609e20a23f91bdae0e62",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/pull/13353",
"http://packetstormsecurity.com/files/157565/TrixBox-CE-2.8.0.4-Command-Execution.html",
},
},
{
ID: "CVE-2020-7352",
Path: "2020/7xxx/CVE-2020-7352.json",
BlobHash: "e7019c4b50cc9a18967414c1695f0b37352b3bf2",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/pull/13444",
"https://www.positronsecurity.com/blog/2020-04-28-gog-galaxy-client-local-privilege-escalation/",
},
},
{
ID: "CVE-2020-7356",
Path: "2020/7xxx/CVE-2020-7356.json",
BlobHash: "89e3ebe9096a8b3ac10e60ab873580fd1f659f41",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5571.php",
"https://github.com/rapid7/metasploit-framework/pull/13607",
},
},
{
ID: "CVE-2020-7357",
Path: "2020/7xxx/CVE-2020-7357.json",
BlobHash: "827862988ec5b4edb609c43508dcb99e60f440c7",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/pull/13607",
"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5570.php",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/182925",
},
},
{
ID: "CVE-2020-7361",
Path: "2020/7xxx/CVE-2020-7361.json",
BlobHash: "b553d9e6918e5e35ea7c2260bb8492cb7a5ee0d5",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/pull/13828",
},
},
{
ID: "CVE-2020-7373",
Path: "2020/7xxx/CVE-2020-7373.json",
BlobHash: "9daec6d1ef7d7a68d907ad25009d745995d0fb8b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/",
"https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4445227-vbulletin-5-6-0-5-6-1-5-6-2-security-patch",
"https://seclists.org/fulldisclosure/2020/Aug/5",
"https://github.com/rapid7/metasploit-framework/pull/13970",
},
},
{
ID: "CVE-2020-7374",
Path: "2020/7xxx/CVE-2020-7374.json",
BlobHash: "50f8d93bd534eca7a19b71f5382b45bd9edf2184",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/pull/13517",
},
},
{
ID: "CVE-2020-7376",
Path: "2020/7xxx/CVE-2020-7376.json",
BlobHash: "b02deb95087b967deecf7d38798c5911b83fac9b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/issues/14008",
},
},
{
ID: "CVE-2020-7377",
Path: "2020/7xxx/CVE-2020-7377.json",
BlobHash: "c0445d606b0d11cd189e76b89becf639d8759b33",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/issues/14015",
},
},
{
ID: "CVE-2020-7384",
Path: "2020/7xxx/CVE-2020-7384.json",
BlobHash: "4298e0db8998a490bb824c59441bc7717a386d1d",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/pull/14288",
"http://packetstormsecurity.com/files/160004/Rapid7-Metasploit-Framework-msfvenom-APK-Template-Command-Injection.html",
"http://packetstormsecurity.com/files/161200/Metasploit-Framework-6.0.11-Command-Injection.html",
},
},
{
ID: "CVE-2020-7385",
Path: "2020/7xxx/CVE-2020-7385.json",
BlobHash: "80d92ca5cd5254a78026a9a0d88cc472ce0c380a",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/pull/14300",
"https://help.rapid7.com/metasploit/release-notes/archive/2020/10/",
"https://github.com/rapid7/metasploit-framework/pull/14335",
},
},
{
ID: "CVE-2021-20178",
Path: "2021/20xxx/CVE-2021-20178.json",
BlobHash: "50b35aeab3824833e3271f70c8065c7c7c68bc4a",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37/",
"https://bugzilla.redhat.com/show_bug.cgi?id=1914774",
"https://github.com/ansible-collections/community.general/pull/1635,",
"https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes,",
},
},
{
ID: "CVE-2021-20228",
Path: "2021/20xxx/CVE-2021-20228.json",
BlobHash: "cd16c86e6dd40578a8eb273de4b4a2b752c446b6",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1925002",
"https://github.com/ansible/ansible/pull/73487",
"https://www.debian.org/security/2021/dsa-4950",
},
},
{
ID: "CVE-2021-20286",
Path: "2021/20xxx/CVE-2021-20286.json",
BlobHash: "f1c6ebcd7aeb537284708fed9791c0f7d20700d0",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugzilla.redhat.com/show_bug.cgi?id=1934727",
"https://gitlab.com/nbdkit/libnbd/-/commit/fb4440de9cc76e9c14bd3ddf3333e78621f40ad0",
},
},
{
ID: "CVE-2021-21414",
Path: "2021/21xxx/CVE-2021-21414.json",
BlobHash: "80520aea5534460effceda3272091a7a1ce37066",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/prisma/prisma/security/advisories/GHSA-pxcc-hj8w-fmm7",
"https://github.com/prisma/prisma/pull/6245",
"https://security.netapp.com/advisory/ntap-20210618-0003/",
},
},
{
ID: "CVE-2021-21428",
Path: "2021/21xxx/CVE-2021-21428.json",
BlobHash: "1fe1a051cdba682862d01218f90bd6ae83911fc4",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-23x4-m842-fmwf",
"https://github.com/OpenAPITools/openapi-generator/pull/8788",
},
},
{
ID: "CVE-2021-21429",
Path: "2021/21xxx/CVE-2021-21429.json",
BlobHash: "92e421921a0eee55d318ba39498d378b847b9380",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-867q-77cc-98mv",
"https://github.com/OpenAPITools/openapi-generator/pull/8795",
},
},
{
ID: "CVE-2021-21430",
Path: "2021/21xxx/CVE-2021-21430.json",
BlobHash: "3e236e275cd4665795513a982cd0e610a2ab9ba7",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-cqxr-xf2w-943w",
"https://github.com/OpenAPITools/openapi-generator/pull/8791",
"https://github.com/OpenAPITools/openapi-generator/pull/8787",
},
},
{
ID: "CVE-2021-24028",
Path: "2021/24xxx/CVE-2021-24028.json",
BlobHash: "f818ce5d6b9e8059a0e1e29f95a73d3181a3e9c7",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/facebook/fbthrift/commit/bfda1efa547dce11a38592820916db01b05b9339",
"https://www.facebook.com/security/advisories/cve-2021-24028",
},
},
{
ID: "CVE-2021-28682",
Path: "2021/28xxx/CVE-2021-28682.json",
BlobHash: "5da720ae6746d42843b2017842fc160a900ee904",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy/releases",
"https://blog.envoyproxy.io",
"https://github.com/envoyproxy/envoy/blob/15e3b9dbcc9aaa9d391fa8033904aad1ea1ae70d/api/envoy/api/v2/cluster.proto#L36",
},
},
{
ID: "CVE-2021-28683",
Path: "2021/28xxx/CVE-2021-28683.json",
BlobHash: "ad0312f4c9586388b57cf8913e479143479c4245",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy/releases",
"https://blog.envoyproxy.io",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-r22g-5f3x-xjgg",
},
},
{
ID: "CVE-2021-29133",
Path: "2021/29xxx/CVE-2021-29133.json",
BlobHash: "62bf66f86b66abb05496ed7c8b1aaf7790c86302",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/pull/14833",
"https://gitlab.alpinelinux.org/alpine/aports/-/issues/12539",
"https://twitter.com/steaIth/status/1364940271054712842",
"https://github.com/rapid7/metasploit-framework/pull/14833/commits/5bf6b2d094deb22fa8183ce161b90cbe4fd40a70",
},
},
{
ID: "CVE-2021-29258",
Path: "2021/29xxx/CVE-2021-29258.json",
BlobHash: "8bcb6f82b7662b63fd0a7a483b3782a9ebede6ce",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://blog.envoyproxy.io",
"https://github.com/envoyproxy/envoy-setec/pull/230",
"https://github.com/envoyproxy/envoy/releases/tag/v1.14.0",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-xw4q-6pj2-5gfg",
},
},
{
ID: "CVE-2021-29492",
Path: "2021/29xxx/CVE-2021-29492.json",
BlobHash: "d79a2d53d94c9cafa72549ee521b32f8752aa38f",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-4987-27fx-x6cf",
},
},
{
ID: "CVE-2021-32777",
Path: "2021/32xxx/CVE-2021-32777.json",
BlobHash: "e4dfaf518c221d984e013e1b1d0ea947d3a8af5a",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h",
"https://www.envoyproxy.io/docs/envoy/v1.19.0/version_history/version_history",
},
},
{
ID: "CVE-2021-32778",
Path: "2021/32xxx/CVE-2021-32778.json",
BlobHash: "2c24f3a23493dd734db2db4404ef653bbe493e21",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.envoyproxy.io/docs/envoy/v1.19.0/version_history/version_history",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc",
},
},
{
ID: "CVE-2021-32779",
Path: "2021/32xxx/CVE-2021-32779.json",
BlobHash: "e485a50765f62cfec6883c9373b0d95fae72b6a5",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.envoyproxy.io/docs/envoy/v1.19.0/version_history/version_history",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9",
},
},
{
ID: "CVE-2021-32780",
Path: "2021/32xxx/CVE-2021-32780.json",
BlobHash: "85bbb6610a44fe89836be60f9b870847bf6c5414",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.envoyproxy.io/docs/envoy/v1.19.0/version_history/version_history",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8",
},
},
{
ID: "CVE-2021-32781",
Path: "2021/32xxx/CVE-2021-32781.json",
BlobHash: "73d368a39f8ffb2ef9a9bd18b558a6b17a3836f3",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.envoyproxy.io/docs/envoy/v1.19.0/version_history/version_history",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-5vhv-gp9v-42qv",
},
},
{
ID: "CVE-2021-32810",
Path: "2021/32xxx/CVE-2021-32810.json",
BlobHash: "fa6df001b0ffc0ee223cff322ae170e7e4a83c85",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26/",
},
},
{
ID: "CVE-2021-36753",
Path: "2021/36xxx/CVE-2021-36753.json",
BlobHash: "803ea8792bf35d2561f847100bc95e2a4b1a201f",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/sharkdp/bat/releases/tag/v0.18.2",
"https://github.com/sharkdp/bat/pull/1724",
"https://github.com/sharkdp/bat/commit/bf2b2df9c9e218e35e5a38ce3d03cffb7c363956",
"https://vuln.ryotak.me/advisories/53",
},
},
{
ID: "CVE-2021-36979",
Path: "2021/36xxx/CVE-2021-36979.json",
BlobHash: "0109f84612789077ebc45dadecb42733a511436a",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/google/oss-fuzz-vulns/blob/main/vulns/unicorn/OSV-2020-2305.yaml",
"https://github.com/unicorn-engine/unicorn/commit/bf1713d9e011b55ca1f502a6779fc4722b4bb077",
"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30391",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ6LOCJXHQVU6SCJLFDJINBOVJYYENLX/",
},
},
{
ID: "CVE-2021-39204",
Path: "2021/39xxx/CVE-2021-39204.json",
BlobHash: "c31bab15245849dd6d7a376d51ca2ae738088740",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc",
"https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r",
},
},
{
ID: "CVE-2021-39206",
Path: "2021/39xxx/CVE-2021-39206.json",
BlobHash: "c24982e6d4d40e56c77c8ccba12ff2e8ff56a2e3",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h",
"https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ",
"https://github.com/pomerium/pomerium/security/advisories/GHSA-cfc2-wjcm-c8fm",
},
},
{
ID: "CVE-2021-40330",
Path: "2021/40xxx/CVE-2021-40330.json",
BlobHash: "714eaaec31d0b5e6a49bb8eed8aeebdbc926411e",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473",
"https://github.com/git/git/compare/v2.30.0...v2.30.1",
},
},
{
ID: "CVE-2021-42840",
Path: "2021/42xxx/CVE-2021-42840.json",
BlobHash: "3199db8c5c41f5f9cf7af06983c63480219de0ad",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_19",
"https://github.com/rapid7/metasploit-framework/commits/master/modules/exploits/linux/http/suitecrm_log_file_rce.rb",
"https://suitecrm.com/time-to-upgrade-suitecrm-7-11-19-7-10-30-lts-released/",
"https://theyhack.me/SuiteCRM-RCE-2/",
},
},
{
ID: "CVE-2021-29923",
Path: "2021/29xxx/CVE-2021-29923.json",
BlobHash: "dab85989329b57c06e385579c44efb6cfc300e43",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://golang.org/pkg/net/#ParseCIDR",
"https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis",
"https://github.com/golang/go/issues/43389",
"https://github.com/golang/go/issues/30999",
"https://go-review.googlesource.com/c/go/+/325829/",
"https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md",
},
},
{
ID: "CVE-2020-13310",
Path: "2020/13xxx/CVE-2020-13310.json",
BlobHash: "7cd357bf2c1460f3b80fe135424f6a8411ef2f13",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://gitlab.com/gitlab-org/gitlab-runner/-/issues/25857",
"https://gitlab.com/gitlab-org/gitlab-runner/-/issues/26819",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13310.json",
},
},
{
ID: "CVE-2020-13327",
Path: "2020/13xxx/CVE-2020-13327.json",
BlobHash: "3fc59d299603ae42a7165cc5a3debc87b2b7002f",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://gitlab.com/gitlab-org/gitlab-runner/-/issues/26833",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13327.json",
},
},
{
ID: "CVE-2020-13347",
Path: "2020/13xxx/CVE-2020-13347.json",
BlobHash: "2e453e6a559269ae47d324b14d9aaae11b3f351b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://gitlab.com/gitlab-org/gitlab-runner/-/issues/26725",
"https://hackerone.com/reports/955016",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13347.json",
},
},
{
ID: "CVE-2020-13353",
Path: "2020/13xxx/CVE-2020-13353.json",
BlobHash: "911fa5d5929386aee980fa3187448a9053a786df",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://gitlab.com/gitlab-org/gitaly/-/issues/2882",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13353.json",
},
},
{
ID: "CVE-2020-13845",
Path: "2020/13xxx/CVE-2020-13845.json",
BlobHash: "313900e146d8d42def520ab271a1b3d78d62301c",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://medium.com/sylabs",
"https://github.com/hpcng/singularity/security/advisories/GHSA-pmfr-63c2-jr5c",
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html",
},
},
{
ID: "CVE-2020-13846",
Path: "2020/13xxx/CVE-2020-13846.json",
BlobHash: "9caeed25e378f0e8d425f90bb19fe518f3b3a899",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://medium.com/sylabs",
"https://github.com/hpcng/singularity/security/advisories/GHSA-6w7g-p4jh-rf92",
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html",
},
},
{
ID: "CVE-2020-13847",
Path: "2020/13xxx/CVE-2020-13847.json",
BlobHash: "82d6c63dc2d47ae8754b463988aa605284accd1c",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://medium.com/sylabs",
"https://github.com/hpcng/singularity/security/advisories/GHSA-m7j2-9565-4h9v",
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html",
},
},
{
ID: "CVE-2020-14160",
Path: "2020/14xxx/CVE-2020-14160.json",
BlobHash: "51eb7d117e7bd980078a7f2a088d95f9105964e7",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/thecodingmachine/gotenberg/releases",
"https://github.com/gotenberg/gotenberg/pull/319",
"https://github.com/gotenberg/gotenberg/issues/215",
},
},
{
ID: "CVE-2020-14161",
Path: "2020/14xxx/CVE-2020-14161.json",
BlobHash: "8f72b91defab16b58752054a16ae449ebc1e02a7",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/thecodingmachine/gotenberg/releases",
"https://github.com/gotenberg/gotenberg/pull/319",
"https://github.com/gotenberg/gotenberg/issues/215",
},
},
{
ID: "CVE-2020-15167",
Path: "2020/15xxx/CVE-2020-15167.json",
BlobHash: "159a98e2ec15033ac2dff0974f08c3c99e21cb60",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/johnkerl/miller/security/advisories/GHSA-mw2v-4q78-j2cw",
},
},
{
ID: "CVE-2020-15229",
Path: "2020/15xxx/CVE-2020-15229.json",
BlobHash: "e7356211754fca1064f13e28d59f1c001a02a81e",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hpcng/singularity/security/advisories/GHSA-7gcp-w6ww-2xv9",
"https://github.com/hpcng/singularity/blob/v3.6.4/CHANGELOG.md#security-related-fixes",
"https://github.com/hpcng/singularity/pull/5611",
"https://github.com/hpcng/singularity/commit/eba3dea260b117198fdb6faf41f2482ab2f8d53e",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00071.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00070.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00009.html",
},
},
{
ID: "CVE-2020-24130",
Path: "2020/24xxx/CVE-2020-24130.json",
BlobHash: "8f737e195225cf0bb2de6bf71dc3bf9feb11b760",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ponzu-cms/ponzu/issues/352",
},
},
{
ID: "CVE-2020-25039",
Path: "2020/25xxx/CVE-2020-25039.json",
BlobHash: "e965e78bee0c636576ba83f71a25fcb3a0181d3b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://medium.com/sylabs",
"https://github.com/hpcng/singularity/security/advisories/GHSA-w6v2-qchm-grj7",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html",
},
},
{
ID: "CVE-2020-25040",
Path: "2020/25xxx/CVE-2020-25040.json",
BlobHash: "50f05f51bb6868732e263eff7b722f00da7bbd73",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://medium.com/sylabs",
"https://github.com/hpcng/singularity/security/advisories/GHSA-jv9c-w74q-6762",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html",
},
},
{
ID: "CVE-2020-26213",
Path: "2020/26xxx/CVE-2020-26213.json",
BlobHash: "20029afa2dd5b4fbf4c5490e84f286a2659db36a",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kitabisa/teler/security/advisories/GHSA-jhj6-5mh6-4pvf",
"https://github.com/kitabisa/teler/commit/ec6082049dba9e44a21f35fb7b123d42ce1a1a7e",
},
},
{
ID: "CVE-2020-27519",
Path: "2020/27xxx/CVE-2020-27519.json",
BlobHash: "f0c95b5e1dd505ed2db06446781ed10393e20685",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/pritunl/pritunl-client-electron/commit/c0aeb159351e5e99d752c27b87133eca299bdfce",
"https://github.com/pritunl/pritunl-client-electron/commit/87ceeae9b8ee415541d7d71de10675e699a76e5e",
"https://github.com/pritunl/pritunl-client-electron/commit/87ceeae9b8ee415541d7d71de10675e699a76e5e#diff-5c6a264bee3576f2a147b8db70332e9a16dd43d073782cf6d32a372abb22b899",
},
},
{
ID: "CVE-2020-28366",
Path: "2020/28xxx/CVE-2020-28366.json",
BlobHash: "6991618a3e0e5c49ef2ef9f453da30bb0779e265",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E",
"https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM",
"https://github.com/golang/go/issues/42559",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/",
"https://security.netapp.com/advisory/ntap-20201202-0004/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/",
},
},
{
ID: "CVE-2020-28367",
Path: "2020/28xxx/CVE-2020-28367.json",
BlobHash: "cd73325803765fa1c55de87365a65f199a74c866",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E",
"https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM",
"https://github.com/golang/go/issues/42556",
"https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/",
"https://security.netapp.com/advisory/ntap-20201202-0004/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/",
},
},
{
ID: "CVE-2020-8561",
Path: "2020/8xxx/CVE-2020-8561.json",
BlobHash: "ca573e983eedfed22be7e1a98a59adf2cf9cd50c",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/g/kubernetes-security-announce/c/RV2IhwcrQsY",
"https://github.com/kubernetes/kubernetes/issues/104720",
"https://security.netapp.com/advisory/ntap-20211014-0002/",
},
},
{
ID: "CVE-2021-21405",
Path: "2021/21xxx/CVE-2021-21405.json",
BlobHash: "e50c2ee4ba2140aa0bfaa9e546009e4ac8ff8de2",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/filecoin-project/lotus/security/advisories/GHSA-4g52-pqcj-phvh",
"https://github.com/filecoin-project/lotus/pull/5393",
"https://gist.github.com/wadeAlexC/2490d522e81a796af9efcad1686e6754",
},
},
{
ID: "CVE-2021-22171",
Path: "2021/22xxx/CVE-2021-22171.json",
BlobHash: "ee360b2a23c43ae3ebb32b598a41b50effec89c1",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://gitlab.com/gitlab-org/gitlab-pages/-/issues/262",
"https://hackerone.com/reports/718460",
"https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22171.json",
},
},
{
ID: "CVE-2021-23135",
Path: "2021/23xxx/CVE-2021-23135.json",
BlobHash: "cee4ec6914399f20ea06d886b121240ef93f8540",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/argoproj/argo-cd/security/advisories/GHSA-fp89-h8pj-8894",
},
},
{
ID: "CVE-2021-23365",
Path: "2021/23xxx/CVE-2021-23365.json",
BlobHash: "45c75417820cd9b136d5b6bf1edf878195f74e94",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTECHNOLOGIESTYKIDENTITYBROKER-1089720",
"https://github.com/TykTechnologies/tyk-identity-broker/releases/tag/v1.1.1",
"https://github.com/TykTechnologies/tyk-identity-broker/commit/243092965b0f93a95a14cb882b5b9a3df61dd5c0",
"https://github.com/TykTechnologies/tyk-identity-broker/commit/46f70420e0911e4e8b638575e29d394c227c75d0",
"https://github.com/TykTechnologies/tyk-identity-broker/pull/147",
},
},
{
ID: "CVE-2021-25735",
Path: "2021/25xxx/CVE-2021-25735.json",
BlobHash: "3f5c4b437b8a9310c213dffe734c9337ba9a7576",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/g/kubernetes-security-announce/c/FKAGqT4jx9Y",
"https://github.com/kubernetes/kubernetes/issues/100096",
},
},
{
ID: "CVE-2021-25737",
Path: "2021/25xxx/CVE-2021-25737.json",
BlobHash: "a6b8bfd7fca6a044b0c10610f92893f8f69379c8",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/g/kubernetes-security-announce/c/xAiN3924thY",
"https://github.com/kubernetes/kubernetes/issues/102106",
"https://security.netapp.com/advisory/ntap-20211004-0004/",
},
},
{
ID: "CVE-2021-25740",
Path: "2021/25xxx/CVE-2021-25740.json",
BlobHash: "e874709f3750d1c9268d336c394782938c48c4bf",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/g/kubernetes-security-announce/c/WYE9ptrhSLE",
"https://github.com/kubernetes/kubernetes/issues/103675",
"https://security.netapp.com/advisory/ntap-20211014-0001/",
},
},
{
ID: "CVE-2021-25741",
Path: "2021/25xxx/CVE-2021-25741.json",
BlobHash: "cac9e5adfb3e98a5c5c54a252162bc8b3ada6766",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/g/kubernetes-security-announce/c/nyfdhK24H7s",
"https://github.com/kubernetes/kubernetes/issues/104980",
"https://security.netapp.com/advisory/ntap-20211008-0006/",
},
},
{
ID: "CVE-2021-25742",
Path: "2021/25xxx/CVE-2021-25742.json",
BlobHash: "699711e000a62d13a49883b05ef2b44e28cc4f29",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/g/kubernetes-security-announce/c/mT4JJxi9tQY",
"https://github.com/kubernetes/ingress-nginx/issues/7837",
},
},
{
ID: "CVE-2021-25938",
Path: "2021/25xxx/CVE-2021-25938.json",
BlobHash: "d5637fccdb0180cd9374f04cdbb946dd234cfa96",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25938",
"https://github.com/arangodb/arangodb/commit/3e486b9bc33cc97e92645dd279899000e57f61f4",
},
},
{
ID: "CVE-2021-28484",
Path: "2021/28xxx/CVE-2021-28484.json",
BlobHash: "8fcc74408f9fff2820874075922283099d7f4410",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/Yubico/yubihsm-connector/releases",
"https://www.yubico.com/support/security-advisories/ysa-2021-02/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B7Q2KGXSPQEEONAWMFZRVH2TXWX3QPCQ/",
},
},
{
ID: "CVE-2021-29453",
Path: "2021/29xxx/CVE-2021-29453.json",
BlobHash: "8044d8edbac082ac621b8508d44f6c7247b72832",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/turt2live/matrix-media-repo/security/advisories/GHSA-j889-h476-hh9h",
"https://hub.docker.com/r/turt2live/matrix-media-repo/tags?page=1&ordering=last_updated",
"https://github.com/turt2live/matrix-media-repo/releases/tag/v1.2.7",
},
},
{
ID: "CVE-2021-29456",
Path: "2021/29xxx/CVE-2021-29456.json",
BlobHash: "2485e06666aae92f966d08281365f8416a6c4246",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/authelia/authelia/security/advisories/GHSA-36f2-fcrx-fp4j",
},
},
{
ID: "CVE-2021-29499",
Path: "2021/29xxx/CVE-2021-29499.json",
BlobHash: "e683e6ade287e30bec69fe6c4573b4f84f310445",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/sylabs/sif/security/advisories/GHSA-4gh8-x3vv-phhg",
},
},
{
ID: "CVE-2021-29622",
Path: "2021/29xxx/CVE-2021-29622.json",
BlobHash: "22e401d7a48e58d80e5e93f518bdf3a302bd2260",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7",
"https://github.com/prometheus/prometheus/releases/tag/v2.26.1",
"https://github.com/prometheus/prometheus/releases/tag/v2.27.1",
},
},
{
ID: "CVE-2021-30465",
Path: "2021/30xxx/CVE-2021-30465.json",
BlobHash: "b2b45802777545ebcb2fef020e36c662610d597e",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/opencontainers/runc/releases",
"http://www.openwall.com/lists/oss-security/2021/05/19/2",
"http://www.openwall.com/lists/oss-security/2021/05/19/2",
"https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HOARVIT47RULTTFWAU7XBG4WY6TDDHV/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35ZW6NBZSBH5PWIT7JU4HXOXGFVDCOHH/",
"https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f",
"https://bugzilla.opensuse.org/show_bug.cgi?id=1185405",
"https://security.netapp.com/advisory/ntap-20210708-0003/",
"https://security.gentoo.org/glsa/202107-26",
},
},
{
ID: "CVE-2021-30476",
Path: "2021/30xxx/CVE-2021-30476.json",
BlobHash: "63d79129b97316fe9215582418c27fa025dd8b85",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/hashicorp/terraform-provider-vault/issues/996",
"https://discuss.hashicorp.com/t/hcsec-2021-11-terraform-s-vault-provider-did-not-correctly-configure-bound-labels-for-gcp-auth/23464/2",
},
},
{
ID: "CVE-2021-31232",
Path: "2021/31xxx/CVE-2021-31232.json",
BlobHash: "0570a0ea0701c0633dda797b1621f39253bc8d9a",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://community.grafana.com/c/security-announcements",
"https://github.com/cortexproject/cortex",
"https://github.com/cortexproject/cortex/pull/4129/files",
"https://lists.cncf.io/g/cortex-users/message/50",
},
},
{
ID: "CVE-2021-31856",
Path: "2021/31xxx/CVE-2021-31856.json",
BlobHash: "5acbf03a44123d8658d593d0eeb77a2c55ffca66",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://meshery.io",
"https://github.com/layer5io/meshery/pull/2745",
},
},
{
ID: "CVE-2021-32574",
Path: "2021/32xxx/CVE-2021-32574.json",
BlobHash: "605868ceccc4470e014b25dbae4699e72a4d1981",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/consul",
"https://github.com/hashicorp/consul/releases/tag/v1.10.1",
"https://discuss.hashicorp.com/t/hcsec-2021-17-consul-s-envoy-tls-configuration-did-not-validate-destination-service-subject-alternative-names/26856",
},
},
{
ID: "CVE-2021-32635",
Path: "2021/32xxx/CVE-2021-32635.json",
BlobHash: "56b7204981e734a6855cfbc04c297fbac7fe3044",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394",
"https://github.com/sylabs/singularity/releases/tag/v3.7.4",
"https://security.gentoo.org/glsa/202107-50",
},
},
{
ID: "CVE-2021-32637",
Path: "2021/32xxx/CVE-2021-32637.json",
BlobHash: "fe6638d9fa572c51137cd56d822d9ce0485d302b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/authelia/authelia/security/advisories/GHSA-68wm-pfjf-wqp6",
"https://github.com/authelia/authelia/commit/c62dbd43d6e69ae81530e7c4f8763857f8ff1dda",
},
},
{
ID: "CVE-2021-32690",
Path: "2021/32xxx/CVE-2021-32690.json",
BlobHash: "883bf8bc3e58c594c5985f5ae4b3072ddcae73cc",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf",
"https://github.com/helm/helm/releases/tag/v3.6.1",
},
},
{
ID: "CVE-2021-32699",
Path: "2021/32xxx/CVE-2021-32699.json",
BlobHash: "944ca62f5ac741204313067ab60820f0d472fa6e",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/pterodactyl/wings/security/advisories/GHSA-jj6m-r8jc-2gp7",
"https://github.com/pterodactyl/wings/commit/e0078eee0a71d61573a94c75e6efcad069d78de3",
},
},
{
ID: "CVE-2021-32701",
Path: "2021/32xxx/CVE-2021-32701.json",
BlobHash: "15008d02418867070e9fc905f95ae1fb42cba49e",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/ory/oathkeeper/security/advisories/GHSA-qvp4-rpmr-xwrr",
"https://github.com/ory/oathkeeper/pull/424",
"https://github.com/ory/oathkeeper/commit/1f9f625c1a49e134ae2299ee95b8cf158feec932",
},
},
{
ID: "CVE-2021-32753",
Path: "2021/32xxx/CVE-2021-32753.json",
BlobHash: "7b93f19ea0987ced2c4b529037587002ccdb0343",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/edgexfoundry/edgex-go/security/advisories/GHSA-xph4-vmcc-52gh",
"https://docs.konghq.com/hub/kong-inc/oauth2/#create-a-consumer",
},
},
{
ID: "CVE-2021-32760",
Path: "2021/32xxx/CVE-2021-32760.json",
BlobHash: "279418d78ca95f250eeba875782939e42c7768e4",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/containerd/containerd/security/advisories/GHSA-c72p-9xmj-rx3w",
"https://github.com/containerd/containerd/releases/tag/v1.4.8",
"https://github.com/containerd/containerd/releases/tag/v1.5.4",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDMNDPJJTP3J5GOEDB66F6MGXUTRG3Y3/",
},
},
{
ID: "CVE-2021-32783",
Path: "2021/32xxx/CVE-2021-32783.json",
BlobHash: "a553d154d3e283d95c36ba1b7f30ba81986f3e66",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/projectcontour/contour/security/advisories/GHSA-5ph6-qq5x-7jwc",
"https://github.com/projectcontour/contour/commit/b53a5c4fd927f4ea2c6cf02f1359d8e28bef852e",
"https://github.com/projectcontour/contour/releases/tag/v1.17.1",
},
},
{
ID: "CVE-2021-32787",
Path: "2021/32xxx/CVE-2021-32787.json",
BlobHash: "111c9aac564a691e9f0f3566014d9c42772bdfda",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/sourcegraph/sourcegraph/security/advisories/GHSA-mq5p-477h-xgwv",
"https://github.com/sourcegraph/sourcegraph/commit/6e51f4546368d959a1f9f173d16e5f20c55deb56",
},
},
{
ID: "CVE-2021-32813",
Path: "2021/32xxx/CVE-2021-32813.json",
BlobHash: "87595735b655c68d591273e6c074c1c9849f5c82",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/traefik/traefik/security/advisories/GHSA-m697-4v8f-55qg",
"https://github.com/traefik/traefik/pull/8319/commits/cbaf86a93014a969b8accf39301932c17d0d73f9",
"https://github.com/traefik/traefik/releases/tag/v2.4.13",
},
},
{
ID: "CVE-2021-32825",
Path: "2021/32xxx/CVE-2021-32825.json",
BlobHash: "10172d66709a990388265b554b15055cc5805c84",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://securitylab.github.com/advisories/GHSL-2020-258-zipslip-bblfshd/",
"https://github.com/bblfsh/bblfshd/pull/341",
"https://github.com/bblfsh/bblfshd/commit/4265465b9b6fb5663c30ee43806126012066aad4",
},
},
{
ID: "CVE-2021-33359",
Path: "2021/33xxx/CVE-2021-33359.json",
BlobHash: "cbaa0c546331dd81b5ad92df3916c4fba0196538",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://twitter.com/leonjza/status/1395283512433971202?s=19",
"https://github.com/sensepost/gowitness/releases/tag/2.3.6",
},
},
{
ID: "CVE-2021-33496",
Path: "2021/33xxx/CVE-2021-33496.json",
BlobHash: "55e30234009babb3188900f48b274637bc73f933",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/dutchcoders/transfer.sh/releases/tag/v1.2.4",
"https://github.com/dutchcoders/transfer.sh/commit/9df18fdc69de2e71f30d8c1e6bfab2fda2e52eb4",
"https://vuln.ryotak.me/advisories/43",
"https://github.com/dutchcoders/transfer.sh/pull/373",
"https://github.com/dutchcoders/transfer.sh/releases/tag/v1.2.4",
},
},
{
ID: "CVE-2021-33497",
Path: "2021/33xxx/CVE-2021-33497.json",
BlobHash: "3949236218b74996c901e31fe55ab91baf3630e1",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/dutchcoders/transfer.sh/releases/tag/v1.2.4",
"https://github.com/dutchcoders/transfer.sh/pull/373",
"https://github.com/dutchcoders/transfer.sh/releases/tag/v1.2.4",
"https://vuln.ryotak.me/advisories/44",
},
},
{
ID: "CVE-2021-33708",
Path: "2021/33xxx/CVE-2021-33708.json",
BlobHash: "57c373130cbb668146555d7756e86f8b076314b6",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/kyma-project/kyma/security/advisories/GHSA-f2jp-5gj4-q9c9",
},
},
{
ID: "CVE-2021-34824",
Path: "2021/34xxx/CVE-2021-34824.json",
BlobHash: "8f2ff5b0bd5379d457c80ccc26c7b808c27690f7",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/istio/istio/releases",
"https://istio.io/latest/news/security/istio-security-2021-007",
},
},
{
ID: "CVE-2021-35206",
Path: "2021/35xxx/CVE-2021-35206.json",
BlobHash: "7ef18a1f48caf3f6166b1695aa95c45d96952937",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gitpod-io/gitpod/pull/2879",
"https://github.com/gitpod-io/gitpod/pull/2879#issuecomment-865662372",
"https://github.com/gitpod-io/gitpod/pull/4567",
"https://www.gitpod.io/changelog",
"https://github.com/gitpod-io/gitpod/blob/main/CHANGELOG.md",
"https://github.com/gitpod-io/gitpod/commit/8ca431f86ae3a6f9a17afcfed51cdd065fcff1a5",
"https://github.com/gitpod-io/gitpod/compare/0.6.0-beta5...0.6.0",
"https://github.com/gitpod-io/gitpod/pull/4567/commits/f78b7d18e509e28e71b65bbd4dfd52c16ca57c18",
},
},
{
ID: "CVE-2021-36156",
Path: "2021/36xxx/CVE-2021-36156.json",
BlobHash: "9d0d0ef84b543b266a69e02aa00ff7ba29809c7f",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/loki/pull/4020#issue-694377133",
"https://github.com/grafana/loki/releases/tag/v2.3.0",
},
},
{
ID: "CVE-2021-36157",
Path: "2021/36xxx/CVE-2021-36157.json",
BlobHash: "ec95fdaef628a0297c479358998c88ea12f2c603",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://grafana.com/docs/grafana/latest/release-notes/",
"https://github.com/cortexproject/cortex/pull/4375",
},
},
{
ID: "CVE-2021-3619",
Path: "2021/3xxx/CVE-2021-3619.json",
BlobHash: "c859a1ac13dbac52ee0092a7d5d64fae2395fe21",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/Velocidex/velociraptor/pull/1118",
"https://github.com/Velocidex/velociraptor/releases/tag/v0.6.0",
},
},
{
ID: "CVE-2021-36213",
Path: "2021/36xxx/CVE-2021-36213.json",
BlobHash: "18ed08f2a33af3a0f6b947e379938ddb12921a61",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.hashicorp.com/blog/category/consul",
"https://github.com/hashicorp/consul/releases/tag/v1.10.1",
"https://discuss.hashicorp.com/t/hcsec-2021-16-consul-s-application-aware-intentions-deny-action-fails-open-when-combined-with-default-deny-policy/26855",
},
},
{
ID: "CVE-2021-36371",
Path: "2021/36xxx/CVE-2021-36371.json",
BlobHash: "066ff55a14fccd1ecc0e8474d6af1f87d92a42e2",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/emissary-ingress/emissary/issues/3340",
"https://github.com/emissary-ingress/emissary/releases/tag/v2.0.0-ea",
},
},
{
ID: "CVE-2021-37794",
Path: "2021/37xxx/CVE-2021-37794.json",
BlobHash: "179935f10dc1958e8dd81d2e266e80ca0977bc5a",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/filebrowser/filebrowser",
"https://gist.github.com/omriinbar/1e28649f31d795b0e9b7698a9d255b5c",
"https://github.com/filebrowser/filebrowser/commit/201329abce4e92ae9071b9ded81e267aae159fbd",
},
},
{
ID: "CVE-2021-37914",
Path: "2021/37xxx/CVE-2021-37914.json",
BlobHash: "67d450b953010ee669b4fd40a861228bd139043e",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/argoproj/argo-workflows/issues/6441",
"https://github.com/argoproj/argo-workflows/pull/6442",
},
},
{
ID: "CVE-2021-38197",
Path: "2021/38xxx/CVE-2021-38197.json",
BlobHash: "2f4735c4baaa366f46e2b8c2779900aff4c8039e",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gen2brain/go-unarr/issues/21",
},
},
{
ID: "CVE-2021-38599",
Path: "2021/38xxx/CVE-2021-38599.json",
BlobHash: "ea12d5bb450569cc84f0582b1199fa9c08ef2933",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/wal-g/wal-g/pull/1062",
"https://github.com/wal-g/wal-g/commit/cadf598e1c2a345915a21a44518c5a4d5401e2e3",
},
},
{
ID: "CVE-2021-39155",
Path: "2021/39xxx/CVE-2021-39155.json",
BlobHash: "778d2ac7f21017002c54664bf333cd33da164475",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/istio/istio/security/advisories/GHSA-7774-7vr3-cc8j",
"https://datatracker.ietf.org/doc/html/rfc4343",
},
},
{
ID: "CVE-2021-39156",
Path: "2021/39xxx/CVE-2021-39156.json",
BlobHash: "e310b27a1b9721d7b7fbe895a58dd5cf4a8b21be",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/istio/istio/security/advisories/GHSA-hqxw-mm44-gc4r",
"https://istio.io/latest/news/security/istio-security-2021-008",
},
},
{
ID: "CVE-2021-39162",
Path: "2021/39xxx/CVE-2021-39162.json",
BlobHash: "b9cdd71f685a644e41ea3daf957e183f291ec42b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ",
"https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv",
"https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8",
},
},
{
ID: "CVE-2021-39226",
Path: "2021/39xxx/CVE-2021-39226.json",
BlobHash: "fb2769bb898a587471b696a0834dd8804ca67ec8",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/grafana/security/advisories/GHSA-69j6-29vr-p3j9",
"https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269",
"https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/",
"https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/",
"http://www.openwall.com/lists/oss-security/2021/10/05/4",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6ANHRDBXQT6TURLP2THM26ZPDINFBEG/",
"https://security.netapp.com/advisory/ntap-20211029-0008/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCKBFUSY6V4VU5AQUYWKISREZX5NLQJT/",
},
},
{
ID: "CVE-2021-39391",
Path: "2021/39xxx/CVE-2021-39391.json",
BlobHash: "8402a2f31728ba6755cceff3699544d9f08d01bf",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/beego/beego",
"https://github.com/beego/beego/issues/4727",
},
},
{
ID: "CVE-2021-41087",
Path: "2021/41xxx/CVE-2021-41087.json",
BlobHash: "8ab85481712fba4381a88a864b705486f0e7b914",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/in-toto/in-toto-golang/security/advisories/GHSA-vrxp-mg9f-hwf3",
"https://github.com/in-toto/in-toto-golang/commit/f2c57d1e0f15e3ffbeac531829c696b72ecc4290",
},
},
{
ID: "CVE-2021-41088",
Path: "2021/41xxx/CVE-2021-41088.json",
BlobHash: "6f2897cf788d501820cc75ce512ffa5ebd4c9400",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/elves/elvish/security/advisories/GHSA-fpv6-f8jw-rc3r",
"https://github.com/elves/elvish/commit/ccc2750037bbbfafe9c1b7a78eadd3bd16e81fe5",
},
},
{
ID: "CVE-2021-41089",
Path: "2021/41xxx/CVE-2021-41089.json",
BlobHash: "8e3dd2218832af1569b7578dc4e23e1fd56f1784",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/moby/moby/security/advisories/GHSA-v994-f8vw-g7j4",
"https://github.com/moby/moby/commit/bce32e5c93be4caf1a592582155b9cb837fc129a",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNFADTCHHYWVM6W4NJ6CB4FNFM2VMBIB/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Q6G6I4W5COQE25QMC7FJY3I3PAYFBB/",
},
},
{
ID: "CVE-2021-41091",
Path: "2021/41xxx/CVE-2021-41091.json",
BlobHash: "23cf8221c5b8adfa5057d8bcdd8cc757a907200a",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/moby/moby/security/advisories/GHSA-3fwx-pjgw-3558",
"https://github.com/moby/moby/commit/f0ab919f518c47240ea0e72d0999576bb8008e64",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNFADTCHHYWVM6W4NJ6CB4FNFM2VMBIB/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Q6G6I4W5COQE25QMC7FJY3I3PAYFBB/",
},
},
{
ID: "CVE-2021-41092",
Path: "2021/41xxx/CVE-2021-41092.json",
BlobHash: "3528357553b0533d45be6aa0c13fd83715e0bb15",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/docker/cli/security/advisories/GHSA-99pg-grm5-qq3v",
"https://github.com/docker/cli/commit/893e52cf4ba4b048d72e99748e0f86b2767c6c6b",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNFADTCHHYWVM6W4NJ6CB4FNFM2VMBIB/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Q6G6I4W5COQE25QMC7FJY3I3PAYFBB/",
},
},
{
ID: "CVE-2021-41103",
Path: "2021/41xxx/CVE-2021-41103.json",
BlobHash: "24f2712dc073ec3fee0753bc409cbaeea0fe2fa6",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/containerd/containerd/security/advisories/GHSA-c2h3-6mxw-7mvq",
"https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNFADTCHHYWVM6W4NJ6CB4FNFM2VMBIB/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Q6G6I4W5COQE25QMC7FJY3I3PAYFBB/",
},
},
{
ID: "CVE-2021-41137",
Path: "2021/41xxx/CVE-2021-41137.json",
BlobHash: "1433feb43b40beaffc27093e708bcb272437ddbf",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/minio/minio/security/advisories/GHSA-v64v-g97p-577c",
"https://github.com/minio/minio/pull/13388",
"https://github.com/minio/minio/pull/13422",
"https://github.com/minio/minio/commit/415bbc74aacd53a120e54a663e941b1809982dbd",
},
},
{
ID: "CVE-2021-41174",
Path: "2021/41xxx/CVE-2021-41174.json",
BlobHash: "a84c9346b2b0e88a6f206b9fa612a7f506da8ea3",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/grafana/grafana/security/advisories/GHSA-3j9m-hcv9-rpj8",
"https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912",
"https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82",
"https://github.com/grafana/grafana/commit/fb85ed691290d211a5baa44d9a641ab137f0de88",
},
},
{
ID: "CVE-2021-41232",
Path: "2021/41xxx/CVE-2021-41232.json",
BlobHash: "03cbc34ec7c53dff3e4573006562c694508825de",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/StevenWeathers/thunderdome-planning-poker/security/advisories/GHSA-26cm-qrc6-mfgj",
"https://github.com/github/securitylab/issues/464#issuecomment-957094994",
"https://github.com/StevenWeathers/thunderdome-planning-poker/commit/f1524d01e8a0f2d6c3db5461c742456c692dd8c1",
},
},
{
ID: "CVE-2021-41323",
Path: "2021/41xxx/CVE-2021-41323.json",
BlobHash: "76168e1c24904e7374c083aa32f9e8c8a475e16b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://pydio.com/fr/community/releases/pydio-cells/pydio-cells-enterprise-2212",
"https://github.com/pydio/cells/releases/tag/v2.2.12",
"https://charonv.net/Pydio-Broken-Access-Control/",
},
},
{
ID: "CVE-2021-41324",
Path: "2021/41xxx/CVE-2021-41324.json",
BlobHash: "b2ba9608b619b4ce47e5bf2239d1482a1b680265",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://pydio.com/fr/community/releases/pydio-cells/pydio-cells-enterprise-2212",
"https://github.com/pydio/cells/releases/tag/v2.2.12",
"https://charonv.net/Pydio-Broken-Access-Control/",
},
},
{
ID: "CVE-2021-41325",
Path: "2021/41xxx/CVE-2021-41325.json",
BlobHash: "c7c2ac019e227d233f5733f17e4f6abc99cc17ef",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://pydio.com/fr/community/releases/pydio-cells/pydio-cells-enterprise-2212",
"https://github.com/pydio/cells/releases/tag/v2.2.12",
"https://charonv.net/Pydio-Broken-Access-Control/",
},
},
{
ID: "CVE-2021-41393",
Path: "2021/41xxx/CVE-2021-41393.json",
BlobHash: "9865ab8e9aac1d03024f5a1305c9d80c79735543",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gravitational/teleport/releases/tag/v4.4.11",
"https://github.com/gravitational/teleport/releases/tag/v5.2.4",
"https://github.com/gravitational/teleport/releases/tag/v6.2.12",
"https://github.com/gravitational/teleport/releases/tag/v7.1.1",
},
},
{
ID: "CVE-2021-41394",
Path: "2021/41xxx/CVE-2021-41394.json",
BlobHash: "5dc255b26a37d4389ea61aec66232093a9ea20a9",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gravitational/teleport/releases/tag/v4.4.11",
"https://github.com/gravitational/teleport/releases/tag/v5.2.4",
"https://github.com/gravitational/teleport/releases/tag/v6.2.12",
"https://github.com/gravitational/teleport/releases/tag/v7.1.1",
},
},
{
ID: "CVE-2021-41395",
Path: "2021/41xxx/CVE-2021-41395.json",
BlobHash: "e58a6e110d9acd93706bab3e7a5e9fc665bd656c",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/gravitational/teleport/releases/tag/v6.2.12",
"https://github.com/gravitational/teleport/releases/tag/v7.1.1",
},
},
{
ID: "CVE-2021-41593",
Path: "2021/41xxx/CVE-2021-41593.json",
BlobHash: "0108f99fc4ed25f3acd954bf4830add92437717d",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html",
"https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing",
"https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html",
"https://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-beta",
"https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.md",
"https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.html",
},
},
{
ID: "CVE-2021-42650",
Path: "2021/42xxx/CVE-2021-42650.json",
BlobHash: "de895b4af7f1f60675ebaff00f41d347ccd85dbf",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/portainer/portainer/pull/5766",
"https://github.com/purple-WL/Security-vulnerability/blob/main/Portainer%20Custom%20Templates%20xss",
},
},
{
ID: "CVE-2020-22741",
Path: "2020/22xxx/CVE-2020-22741.json",
BlobHash: "17a8a16d638c7fecf8cf2b1ae0f561c7dd582a8c",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/xuperchain/xuperchain/issues/782",
},
},
{
ID: "CVE-2020-26772",
Path: "2020/26xxx/CVE-2020-26772.json",
BlobHash: "e0f30b99bb5f1c8434c9d77e29de8a7af01d3a70",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://blog.csdn.net/qq_33020901/article/details/108938473",
"https://github.com/george518/PPGo_Job/issues/56",
},
},
{
ID: "CVE-2021-36605",
Path: "2021/36xxx/CVE-2021-36605.json",
BlobHash: "3a4475f7ccdeb8c589d017cf0af793f99242fb73",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/3xxx/engineercms/issues/52",
},
},
{
ID: "CVE-2021-29512",
Path: "2021/29xxx/CVE-2021-29512.json",
BlobHash: "d6e37e85c6fc99c4ca1b8783754af95861152e47",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4278-2v5v-65r4",
"https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5",
},
},
{
ID: "CVE-2021-29513",
Path: "2021/29xxx/CVE-2021-29513.json",
BlobHash: "b40c2f218ef427a889e4d69a4f5d31d4485f23ff",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-452g-f7fp-9jf7",
"https://github.com/tensorflow/tensorflow/commit/030af767d357d1b4088c4a25c72cb3906abac489",
},
},
{
ID: "CVE-2021-29514",
Path: "2021/29xxx/CVE-2021-29514.json",
BlobHash: "907b3b927cc76e65000fc552f45161519daba0e7",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8h46-5m9h-7553",
},
},
{
ID: "CVE-2021-29515",
Path: "2021/29xxx/CVE-2021-29515.json",
BlobHash: "feeffaad27b478e59e542d1c25929a8f7daabba0",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hc6c-75p4-hmq4",
"https://github.com/tensorflow/tensorflow/commit/a7116dd3913c4a4afd2a3a938573aa7c785fdfc6",
},
},
{
ID: "CVE-2021-29516",
Path: "2021/29xxx/CVE-2021-29516.json",
BlobHash: "c7a5d39f721434da563c41e71e82dd12a97d002d",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-84mw-34w6-2q43",
"https://github.com/tensorflow/tensorflow/commit/b055b9c474cd376259dde8779908f9eeaf097d93",
},
},
{
ID: "CVE-2021-29517",
Path: "2021/29xxx/CVE-2021-29517.json",
BlobHash: "9044b124a3c891b1c2727fa4c5ae64369b6641de",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-772p-x54p-hjrv",
"https://github.com/tensorflow/tensorflow/commit/799f835a3dfa00a4d852defa29b15841eea9d64f",
},
},
{
ID: "CVE-2021-29518",
Path: "2021/29xxx/CVE-2021-29518.json",
BlobHash: "edf330bec1460bd7b97a1448601ecc61e72ca3d5",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-62gx-355r-9fhg",
"https://github.com/tensorflow/tensorflow/commit/ff70c47a396ef1e3cb73c90513da4f5cb71bebba",
},
},
{
ID: "CVE-2021-29519",
Path: "2021/29xxx/CVE-2021-29519.json",
BlobHash: "d8ce4f463a1928d3856b5c21ac33f2967b931ccf",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-772j-h9xw-ffp5",
"https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025",
},
},
{
ID: "CVE-2021-29520",
Path: "2021/29xxx/CVE-2021-29520.json",
BlobHash: "8e8eeeafa130eae4cc4fa854fe9869d9b330de51",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-qrj6-9pfm",
"https://github.com/tensorflow/tensorflow/commit/8f37b52e1320d8d72a9529b2468277791a261197",
},
},
{
ID: "CVE-2021-29521",
Path: "2021/29xxx/CVE-2021-29521.json",
BlobHash: "b4d1224e91843e21cee7034ae037f6eb0ed89ae0",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hr84-fqvp-48mm",
"https://github.com/tensorflow/tensorflow/commit/c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5",
},
},
{
ID: "CVE-2021-29522",
Path: "2021/29xxx/CVE-2021-29522.json",
BlobHash: "613cf3544ea55dea68762ff606a0a0fe2be713d6",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c968-pq7h-7fxv",
"https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa",
},
},
{
ID: "CVE-2021-29523",
Path: "2021/29xxx/CVE-2021-29523.json",
BlobHash: "0a9365651a2953dcb31e256e98421c46698da88c",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2cpx-427x-q2c6",
},
},
{
ID: "CVE-2021-29524",
Path: "2021/29xxx/CVE-2021-29524.json",
BlobHash: "09e4340b482cf99aa88475160f8808385e1f7b6e",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4pj-74mg-8868",
"https://github.com/tensorflow/tensorflow/commit/fca9874a9b42a2134f907d2fb46ab774a831404a",
},
},
{
ID: "CVE-2021-29525",
Path: "2021/29xxx/CVE-2021-29525.json",
BlobHash: "4c007083fd949bc16a7d956cd5b4ebd59805b0f8",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xm2v-8rrw-w9pm",
"https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535",
},
},
{
ID: "CVE-2021-29526",
Path: "2021/29xxx/CVE-2021-29526.json",
BlobHash: "e4214aa6a6d3f55a6699455f2a793115ddda0252",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vf2-4xcg-65cx",
"https://github.com/tensorflow/tensorflow/commit/b12aa1d44352de21d1a6faaf04172d8c2508b42b",
},
},
{
ID: "CVE-2021-29527",
Path: "2021/29xxx/CVE-2021-29527.json",
BlobHash: "d83ee6a1f382bf2d88f00f72adc569fc6519b47f",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4g7-fvjj-prg8",
"https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b",
},
},
{
ID: "CVE-2021-29528",
Path: "2021/29xxx/CVE-2021-29528.json",
BlobHash: "ebd673c1fdd2c123136a295e63837d19e7626787",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6f84-42vf-ppwp",
"https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6",
},
},
{
ID: "CVE-2021-29529",
Path: "2021/29xxx/CVE-2021-29529.json",
BlobHash: "8f8a8074e92fd2c1c388377f0591c9ddd9b28329",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jfp7-4j67-8r3q",
"https://github.com/tensorflow/tensorflow/commit/f851613f8f0fb0c838d160ced13c134f778e3ce7",
},
},
{
ID: "CVE-2021-29530",
Path: "2021/29xxx/CVE-2021-29530.json",
BlobHash: "6a8b488f15bf381aa64cdf94466b11110772c938",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xcwj-wfcm-m23c",
"https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd",
},
},
{
ID: "CVE-2021-29531",
Path: "2021/29xxx/CVE-2021-29531.json",
BlobHash: "bbec5ff60ac68f7b13039cba3d6d870f96b93576",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3qxp-qjq7-w4hf",
"https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1",
},
},
{
ID: "CVE-2021-29532",
Path: "2021/29xxx/CVE-2021-29532.json",
BlobHash: "6fcaa0ed779ac36651d046e32d29fee644d02496",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j47f-4232-hvv8",
"https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a",
},
},
{
ID: "CVE-2021-29533",
Path: "2021/29xxx/CVE-2021-29533.json",
BlobHash: "244c43c12320c7de97bfa4b4ed52ee2d5794e600",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-393f-2jr3-cp69",
"https://github.com/tensorflow/tensorflow/commit/b432a38fe0e1b4b904a6c222cbce794c39703e87",
},
},
{
ID: "CVE-2021-29534",
Path: "2021/29xxx/CVE-2021-29534.json",
BlobHash: "52fdf7f05575153c665f453423222806e3e7e970",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6j9c-grc6-5m6g",
"https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c",
},
},
{
ID: "CVE-2021-29535",
Path: "2021/29xxx/CVE-2021-29535.json",
BlobHash: "91d6fb959bd7a5c037c2b169ffcd1420eb20ea3a",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m3f9-w3p3-p669",
"https://github.com/tensorflow/tensorflow/commit/efea03b38fb8d3b81762237dc85e579cc5fc6e87",
},
},
{
ID: "CVE-2021-29536",
Path: "2021/29xxx/CVE-2021-29536.json",
BlobHash: "430c9c3c5477fff74322d8e8c5a574f68652c540",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2gfx-95x2-5v3x",
"https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e",
},
},
{
ID: "CVE-2021-29537",
Path: "2021/29xxx/CVE-2021-29537.json",
BlobHash: "f754c501a6fcad326b673e5de9289bd7b654da60",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8c89-2vwr-chcq",
"https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694",
},
},
{
ID: "CVE-2021-29538",
Path: "2021/29xxx/CVE-2021-29538.json",
BlobHash: "a848d84ad1d8c48ebdda72e0c811b8cdffddb641",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qc-5fqr-52fp",
},
},
{
ID: "CVE-2021-29539",
Path: "2021/29xxx/CVE-2021-29539.json",
BlobHash: "feaa24124f2a327837220f7b2ac4c98dd3f4fb7d",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g4h2-gqm3-c9wq",
"https://github.com/tensorflow/tensorflow/commit/4f663d4b8f0bec1b48da6fa091a7d29609980fa4",
},
},
{
ID: "CVE-2021-29540",
Path: "2021/29xxx/CVE-2021-29540.json",
BlobHash: "9fe58121bca85e1dbbebc3e10919e4865b6909b8",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xgc3-m89p-vr3x",
"https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96",
},
},
{
ID: "CVE-2021-29541",
Path: "2021/29xxx/CVE-2021-29541.json",
BlobHash: "83fbdac4e2e69ae2d67e2e937adc61321d91bb65",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-35wv-m3cr",
},
},
{
ID: "CVE-2021-29542",
Path: "2021/29xxx/CVE-2021-29542.json",
BlobHash: "54718986fb88454c9b59e6f9fa30dd951c5bff84",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hrh-9vmp-2jgg",
"https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b",
},
},
{
ID: "CVE-2021-29543",
Path: "2021/29xxx/CVE-2021-29543.json",
BlobHash: "cc3d1929ae017ce0551d7f840d27d864b0f0dafe",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fphq-gw9m-ghrv",
"https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2",
},
},
{
ID: "CVE-2021-29544",
Path: "2021/29xxx/CVE-2021-29544.json",
BlobHash: "ca70a941303006c4db20d3333c140bd3e11cfceb",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6g85-3hm8-83f9",
"https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b",
},
},
{
ID: "CVE-2021-29545",
Path: "2021/29xxx/CVE-2021-29545.json",
BlobHash: "a558f828e7960dfd95b529fdbab51a30696cfbfe",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hmg3-c7xj-6qwm",
"https://github.com/tensorflow/tensorflow/commit/1e922ccdf6bf46a3a52641f99fd47d54c1decd13",
},
},
{
ID: "CVE-2021-29546",
Path: "2021/29xxx/CVE-2021-29546.json",
BlobHash: "812fe128e8c730dcea94bfc1fb8424ba1de13bf6",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m34j-p8rj-wjxq",
"https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb",
},
},
{
ID: "CVE-2021-29547",
Path: "2021/29xxx/CVE-2021-29547.json",
BlobHash: "cef8f6591c8c4767aa6869c9ea549d1df8a9f2da",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4fg4-p75j-w5xj",
},
},
{
ID: "CVE-2021-29548",
Path: "2021/29xxx/CVE-2021-29548.json",
BlobHash: "e184a6051dd7981e993b9f78599dc7f4359fbb83",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p45v-v4pw-77jr",
"https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b",
},
},
{
ID: "CVE-2021-29549",
Path: "2021/29xxx/CVE-2021-29549.json",
BlobHash: "61b2d062b7507d90fd96de42b405648f7853e5b2",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x83m-p7pv-ch8v",
"https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16",
},
},
{
ID: "CVE-2021-29550",
Path: "2021/29xxx/CVE-2021-29550.json",
BlobHash: "8b975b4bbd8e96a0dab6939db81b4a7aacc50667",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f78g-q7r4-9wcv",
"https://github.com/tensorflow/tensorflow/commit/548b5eaf23685d86f722233d8fbc21d0a4aecb96",
},
},
{
ID: "CVE-2021-29551",
Path: "2021/29xxx/CVE-2021-29551.json",
BlobHash: "d9fb2bab29f75dc872f0132190d91c048abf0c85",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vqw6-72r7-fgw7",
"https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68",
},
},
{
ID: "CVE-2021-29552",
Path: "2021/29xxx/CVE-2021-29552.json",
BlobHash: "b07a085222a4ec2cd3852741690b45f422957f9f",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jhq9-wm9m-cf89",
"https://github.com/tensorflow/tensorflow/commit/704866eabe03a9aeda044ec91a8d0c83fc1ebdbe",
},
},
{
ID: "CVE-2021-29553",
Path: "2021/29xxx/CVE-2021-29553.json",
BlobHash: "cc358ef3ab08e9c89277bf8aaf6c4bf9ff6a5dd1",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h9px-9vqg-222h",
"https://github.com/tensorflow/tensorflow/commit/99085e8ff02c3763a0ec2263e44daec416f6a387",
},
},
{
ID: "CVE-2021-29554",
Path: "2021/29xxx/CVE-2021-29554.json",
BlobHash: "1bf60b933dc236f19a6f262c9008cdf35537b7ae",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qg48-85hg-mqc5",
"https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f",
},
},
{
ID: "CVE-2021-29555",
Path: "2021/29xxx/CVE-2021-29555.json",
BlobHash: "89e484b63783545640e868517a5d1ef0e34a581a",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r35g-4525-29fq",
"https://github.com/tensorflow/tensorflow/commit/1a2a87229d1d61e23a39373777c056161eb4084d",
},
},
{
ID: "CVE-2021-29556",
Path: "2021/29xxx/CVE-2021-29556.json",
BlobHash: "db95a56db0e2845b31c922f8aa9b56e81803e469",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fxqh-cfjm-fp93",
"https://github.com/tensorflow/tensorflow/commit/4071d8e2f6c45c1955a811fee757ca2adbe462c1",
},
},
{
ID: "CVE-2021-29557",
Path: "2021/29xxx/CVE-2021-29557.json",
BlobHash: "00a26a931147ce6115a22bc9324f9124df72d3f2",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xw93-v57j-fcgh",
"https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5",
},
},
{
ID: "CVE-2021-29558",
Path: "2021/29xxx/CVE-2021-29558.json",
BlobHash: "d7bed6991573c8f0227a4dd25761fee10dfce0f4",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mqh2-9wrp-vx84",
"https://github.com/tensorflow/tensorflow/commit/8ba6fa29cd8bf9cef9b718dc31c78c73081f5b31",
},
},
{
ID: "CVE-2021-29559",
Path: "2021/29xxx/CVE-2021-29559.json",
BlobHash: "6bb39bbf2760f41364710d3d97d3f1828b2626c7",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-59q2-x2qc-4c97",
"https://github.com/tensorflow/tensorflow/commit/51300ba1cc2f487aefec6e6631fef03b0e08b298",
},
},
{
ID: "CVE-2021-29560",
Path: "2021/29xxx/CVE-2021-29560.json",
BlobHash: "ea466060122200e9cc43087a99a9ed55e6872c3f",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8gv3-57p6-g35r",
"https://github.com/tensorflow/tensorflow/commit/a84358aa12f0b1518e606095ab9cfddbf597c121",
},
},
{
ID: "CVE-2021-29561",
Path: "2021/29xxx/CVE-2021-29561.json",
BlobHash: "bb649b997a0674820579f6682e2b3aa5905c2aaf",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gvm4-h8j3-rjrq",
"https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4",
},
},
{
ID: "CVE-2021-29562",
Path: "2021/29xxx/CVE-2021-29562.json",
BlobHash: "c1b815a1debff0b736205f1f88b2e1049ec8bf3c",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-36vm-xw34-x4pj",
"https://github.com/tensorflow/tensorflow/commit/1c56f53be0b722ca657cbc7df461ed676c8642a2",
},
},
{
ID: "CVE-2021-29563",
Path: "2021/29xxx/CVE-2021-29563.json",
BlobHash: "daf9d9cbd19c00c23b40e472e8614e4c7f3b236f",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ph87-fvjr-v33w",
"https://github.com/tensorflow/tensorflow/commit/31bd5026304677faa8a0b77602c6154171b9aec1",
},
},
{
ID: "CVE-2021-29564",
Path: "2021/29xxx/CVE-2021-29564.json",
BlobHash: "23b658554754ad3b117456656f07dde3e578c77b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-75f6-78jr-4656",
"https://github.com/tensorflow/tensorflow/commit/f4c364a5d6880557f6f5b6eb5cee2c407f0186b3",
},
},
{
ID: "CVE-2021-29565",
Path: "2021/29xxx/CVE-2021-29565.json",
BlobHash: "605b7080ef5b3992d4045708aca4fc5198d2c2bc",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6pg-pjwc-j585",
"https://github.com/tensorflow/tensorflow/commit/faa76f39014ed3b5e2c158593b1335522e573c7f",
},
},
{
ID: "CVE-2021-29566",
Path: "2021/29xxx/CVE-2021-29566.json",
BlobHash: "018777dc337a63d7c07b36c6a535768fd141b6f0",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pvrc-hg3f-58r6",
"https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f",
},
},
{
ID: "CVE-2021-29567",
Path: "2021/29xxx/CVE-2021-29567.json",
BlobHash: "20fc4b1dd8fd7adbe8710f1cb47ed32eebd7987a",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wp3c-xw9g-gpcg",
"https://github.com/tensorflow/tensorflow/commit/7ae2af34087fb4b5c8915279efd03da3b81028bc",
},
},
{
ID: "CVE-2021-29568",
Path: "2021/29xxx/CVE-2021-29568.json",
BlobHash: "17e1e6fe5eb841b33b1278aae17befc915f7defb",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4p4p-www8-8fv9",
"https://github.com/tensorflow/tensorflow/commit/5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8",
},
},
{
ID: "CVE-2021-29569",
Path: "2021/29xxx/CVE-2021-29569.json",
BlobHash: "7d5078b73f60cef8d56ae260f352f6e9504cfb49",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3h8m-483j-7xxm",
"https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e",
},
},
{
ID: "CVE-2021-29570",
Path: "2021/29xxx/CVE-2021-29570.json",
BlobHash: "6710b283c7706f3ab9f31db4a5d9b93deff374c7",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-545v-42p7-98fq",
"https://github.com/tensorflow/tensorflow/commit/dcd7867de0fea4b72a2b34bd41eb74548dc23886",
},
},
{
ID: "CVE-2021-29571",
Path: "2021/29xxx/CVE-2021-29571.json",
BlobHash: "8334da93ae1e275e2278aee6e4c936bec2058d83",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-whr9-vfh2-7hm6",
"https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517",
},
},
{
ID: "CVE-2021-29572",
Path: "2021/29xxx/CVE-2021-29572.json",
BlobHash: "576c27d216f71b9fb9f5977519fad1e217d41c51",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5gqf-456p-4836",
"https://github.com/tensorflow/tensorflow/commit/f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb",
},
},
{
ID: "CVE-2021-29573",
Path: "2021/29xxx/CVE-2021-29573.json",
BlobHash: "9ca2bbf85750438ed5af84390eb8e622cd3638ec",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9vpm-rcf4-9wqw",
"https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d",
},
},
{
ID: "CVE-2021-29574",
Path: "2021/29xxx/CVE-2021-29574.json",
BlobHash: "676e075619c1d86bd2720c1cf6f5ae10f34b0af1",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-828x-qc2p-wprq",
"https://github.com/tensorflow/tensorflow/commit/a3d9f9be9ac2296615644061b40cefcee341dcc4",
},
},
{
ID: "CVE-2021-29575",
Path: "2021/29xxx/CVE-2021-29575.json",
BlobHash: "03929785f3eae3eba20c727b0ff37d1475ccb4b2",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6qgm-fv6v-rfpv",
"https://github.com/tensorflow/tensorflow/commit/ecf768cbe50cedc0a45ce1ee223146a3d3d26d23",
},
},
{
ID: "CVE-2021-29576",
Path: "2021/29xxx/CVE-2021-29576.json",
BlobHash: "e8501aad3d36177b585041115f20b7410dd827c2",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7cqx-92hp-x6wh",
"https://github.com/tensorflow/tensorflow/commit/63c6a29d0f2d692b247f7bf81f8732d6442fad09",
},
},
{
ID: "CVE-2021-29577",
Path: "2021/29xxx/CVE-2021-29577.json",
BlobHash: "790874e4d36ec5ebab8d2cbd7318001aa4ad2852",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v6r6-84gr-92rm",
"https://github.com/tensorflow/tensorflow/commit/6fc9141f42f6a72180ecd24021c3e6b36165fe0d",
},
},
{
ID: "CVE-2021-29578",
Path: "2021/29xxx/CVE-2021-29578.json",
BlobHash: "07e565e419a645ac0bb8c972f3e04d30260827dc",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6f89-8j54-29xf",
"https://github.com/tensorflow/tensorflow/commit/12c727cee857fa19be717f336943d95fca4ffe4f",
},
},
{
ID: "CVE-2021-29579",
Path: "2021/29xxx/CVE-2021-29579.json",
BlobHash: "7da3aa035fb9463c2891c3fa4d588caef4e7dedf",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-79fv-9865-4qcv",
"https://github.com/tensorflow/tensorflow/commit/a74768f8e4efbda4def9f16ee7e13cf3922ac5f7",
},
},
{
ID: "CVE-2021-29580",
Path: "2021/29xxx/CVE-2021-29580.json",
BlobHash: "42174dc544c40ce3900880f92e4f22a002d5a93a",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x8h6-xgqx-jqgp",
"https://github.com/tensorflow/tensorflow/commit/32fdcbff9d06d010d908fcc4bd4b36eb3ce15925",
},
},
{
ID: "CVE-2021-29581",
Path: "2021/29xxx/CVE-2021-29581.json",
BlobHash: "896bb2bbff62b72522073498333c51ce5b23217b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vq2r-5xvm-3hc3",
"https://github.com/tensorflow/tensorflow/commit/b1b323042264740c398140da32e93fb9c2c9f33e",
},
},
{
ID: "CVE-2021-29582",
Path: "2021/29xxx/CVE-2021-29582.json",
BlobHash: "30eb7f7d1b7ae8f7853c07894fb7d07161b77e63",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c45w-2wxr-pp53",
"https://github.com/tensorflow/tensorflow/commit/5899741d0421391ca878da47907b1452f06aaf1b",
},
},
{
ID: "CVE-2021-29583",
Path: "2021/29xxx/CVE-2021-29583.json",
BlobHash: "cada79f1166ff259518f2ce0b0bd9d10f08a24d8",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9xh4-23q4-v6wr",
"https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0",
},
},
{
ID: "CVE-2021-29584",
Path: "2021/29xxx/CVE-2021-29584.json",
BlobHash: "411f168303620b72dc2e96c398c9c005c3e55e60",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xvjm-fvxx-q3hv",
"https://github.com/tensorflow/tensorflow/commit/4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60",
},
},
{
ID: "CVE-2021-29585",
Path: "2021/29xxx/CVE-2021-29585.json",
BlobHash: "092ad17aa4c388a0cf0ccfc42122c41f7e1037d1",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mv78-g7wq-mhp4",
"https://github.com/tensorflow/tensorflow/commit/49847ae69a4e1a97ae7f2db5e217c77721e37948",
},
},
{
ID: "CVE-2021-29586",
Path: "2021/29xxx/CVE-2021-29586.json",
BlobHash: "86208a653e96c775fc4551103644b8322ce3c8b2",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-26j7-6w8w-7922",
"https://github.com/tensorflow/tensorflow/commit/5f7975d09eac0f10ed8a17dbb6f5964977725adc",
},
},
{
ID: "CVE-2021-29587",
Path: "2021/29xxx/CVE-2021-29587.json",
BlobHash: "32c075877856de15928be18c5f725d5e73b39aa0",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j7rm-8ww4-xx2g",
"https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7",
},
},
{
ID: "CVE-2021-29588",
Path: "2021/29xxx/CVE-2021-29588.json",
BlobHash: "73f9aab3668378186ad5a0a4c561f6e744d08408",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vfr4-x8j2-3rf9",
"https://github.com/tensorflow/tensorflow/commit/801c1c6be5324219689c98e1bd3e0ca365ee834d",
},
},
{
ID: "CVE-2021-29589",
Path: "2021/29xxx/CVE-2021-29589.json",
BlobHash: "a409873b2509b56e14c76eb8b84d365fd097b8a3",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3w67-q784-6w7c",
"https://github.com/tensorflow/tensorflow/commit/8e45822aa0b9f5df4b4c64f221e64dc930a70a9d",
},
},
{
ID: "CVE-2021-29590",
Path: "2021/29xxx/CVE-2021-29590.json",
BlobHash: "c9d29feab97ef2bcc5149244107e1868151bc8c9",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x6-8c7m-hv3f",
"https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578",
},
},
{
ID: "CVE-2021-29591",
Path: "2021/29xxx/CVE-2021-29591.json",
BlobHash: "ea918f39028b1559391fb481cc1b0a7ee8dbb68c",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cwv3-863g-39vx",
"https://github.com/tensorflow/tensorflow/commit/9c1dc920d8ffb4893d6c9d27d1f039607b326743",
"https://github.com/tensorflow/tensorflow/commit/c6173f5fe66cdbab74f4f869311fe6aae2ba35f4",
},
},
{
ID: "CVE-2021-29592",
Path: "2021/29xxx/CVE-2021-29592.json",
BlobHash: "9a9027d9d3296aa9e5876b72b6416e31ec03847b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jjr8-m8g8-p6wv",
"https://github.com/tensorflow/tensorflow/commit/f8378920345f4f4604202d4ab15ef64b2aceaa16",
},
},
{
ID: "CVE-2021-29593",
Path: "2021/29xxx/CVE-2021-29593.json",
BlobHash: "23d9dfd1e9a9a69465c09ad45346c3e851089159",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfx7-2xpc-8w4h",
"https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044",
},
},
{
ID: "CVE-2021-29594",
Path: "2021/29xxx/CVE-2021-29594.json",
BlobHash: "927ce5d1aa3354f1880a4bf85180a345ec412819",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3qgw-p4fm-x7gf",
"https://github.com/tensorflow/tensorflow/commit/ff489d95a9006be080ad14feb378f2b4dac35552",
},
},
{
ID: "CVE-2021-29595",
Path: "2021/29xxx/CVE-2021-29595.json",
BlobHash: "8bc6dadc43651587cd2d848ebbede2d22042c716",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vf94-36g5-69v8",
"https://github.com/tensorflow/tensorflow/commit/106d8f4fb89335a2c52d7c895b7a7485465ca8d9",
},
},
{
ID: "CVE-2021-29596",
Path: "2021/29xxx/CVE-2021-29596.json",
BlobHash: "252008bf8dfeca66e21912aeb30254a7630d6759",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vrf-ff7v-hpgr",
"https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e",
},
},
{
ID: "CVE-2021-29597",
Path: "2021/29xxx/CVE-2021-29597.json",
BlobHash: "044c8f8d3c64a0e16b27c433aa1560bde992c33f",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v52p-hfjf-wg88",
"https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708",
},
},
{
ID: "CVE-2021-29598",
Path: "2021/29xxx/CVE-2021-29598.json",
BlobHash: "8703f6776bf85dbcdf56dc10b3da4ac2803d9531",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pmpr-55fj-r229",
"https://github.com/tensorflow/tensorflow/commit/6841e522a3e7d48706a02e8819836e809f738682",
},
},
{
ID: "CVE-2021-29599",
Path: "2021/29xxx/CVE-2021-29599.json",
BlobHash: "a7ce0f45810e5806239f2bb7357876df3b868d94",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-97wf-p777-86jq",
"https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d",
},
},
{
ID: "CVE-2021-29600",
Path: "2021/29xxx/CVE-2021-29600.json",
BlobHash: "7a69da1d5f48547e46485d1d89f46039ac78b052",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qh-3xrq-c825",
"https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5",
},
},
{
ID: "CVE-2021-29601",
Path: "2021/29xxx/CVE-2021-29601.json",
BlobHash: "9955f1e6d5462d38683b3645c5bc26db02f1c81c",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c84-4hx6-xmm4",
"https://github.com/tensorflow/tensorflow/commit/4253f96a58486ffe84b61c0415bb234a4632ee73",
},
},
{
ID: "CVE-2021-29602",
Path: "2021/29xxx/CVE-2021-29602.json",
BlobHash: "88714048b3c1aaf959706978c10b42c559d098b4",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rf3h-xgv5-2q39",
"https://github.com/tensorflow/tensorflow/commit/cbda3c6b2dbbd3fbdc482ff8c0170a78ec2e97d0",
},
},
{
ID: "CVE-2021-29603",
Path: "2021/29xxx/CVE-2021-29603.json",
BlobHash: "63a4c7de6a98c91263eec5f432bb0cc5bd908ca6",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-crch-j389-5f84",
"https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683",
},
},
{
ID: "CVE-2021-29604",
Path: "2021/29xxx/CVE-2021-29604.json",
BlobHash: "656211ab32662fa19a060b02f7ac050dd0649428",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rm6-75mf-7r7r",
"https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2",
},
},
{
ID: "CVE-2021-29605",
Path: "2021/29xxx/CVE-2021-29605.json",
BlobHash: "959de6436d664e7aff72d6a4e010fe81d1d2305b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jf7h-7m85-w2v2",
"https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5",
},
},
{
ID: "CVE-2021-29606",
Path: "2021/29xxx/CVE-2021-29606.json",
BlobHash: "d8af5922c85bff86069b1454a1060edfb0fe63a9",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h4pc-gx2w-f2xv",
"https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412",
},
},
{
ID: "CVE-2021-29607",
Path: "2021/29xxx/CVE-2021-29607.json",
BlobHash: "615e3e396f6d850a833a5e8e6e00b36a082a2e8c",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gv26-jpj9-c8gq",
"https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a",
},
},
{
ID: "CVE-2021-29608",
Path: "2021/29xxx/CVE-2021-29608.json",
BlobHash: "997dd422884a2cbf7c1889388bc2766e2f9004a7",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rgvq-pcvf-hx75",
"https://github.com/tensorflow/tensorflow/commit/b761c9b652af2107cfbc33efd19be0ce41daa33e",
"https://github.com/tensorflow/tensorflow/commit/c4d7afb6a5986b04505aca4466ae1951686c80f6",
"https://github.com/tensorflow/tensorflow/commit/f94ef358bb3e91d517446454edff6535bcfe8e4a",
},
},
{
ID: "CVE-2021-29609",
Path: "2021/29xxx/CVE-2021-29609.json",
BlobHash: "70f717e91875c62d884503429208fb857ab8c30d",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cjc7-49v2-jp64",
"https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc",
"https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3",
},
},
{
ID: "CVE-2021-29610",
Path: "2021/29xxx/CVE-2021-29610.json",
BlobHash: "ef31fbfaa08f1be4fb5100e6f73254a31beccae2",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mq5c-prh3-3f3h",
"https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9",
},
},
{
ID: "CVE-2021-29611",
Path: "2021/29xxx/CVE-2021-29611.json",
BlobHash: "29c72b3c6512b55a2650f36ee8addfc880cb1d40",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9rpc-5v9q-5r7f",
"https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6",
},
},
{
ID: "CVE-2021-29612",
Path: "2021/29xxx/CVE-2021-29612.json",
BlobHash: "520b9cdb93048d8d34a48eae19331546a7ce83a1",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2xgj-xhgf-ggjv",
"https://github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0",
"https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2",
},
},
{
ID: "CVE-2021-29613",
Path: "2021/29xxx/CVE-2021-29613.json",
BlobHash: "79023aac17a09c17f749296fc0687939d3d81e91",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vvg4-vgrv-xfr7",
"https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c",
"https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b",
},
},
{
ID: "CVE-2021-29614",
Path: "2021/29xxx/CVE-2021-29614.json",
BlobHash: "df13f08859f7c29646973ad4ca747e4ab667f76b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8pmx-p244-g88h",
"https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d",
},
},
{
ID: "CVE-2021-29615",
Path: "2021/29xxx/CVE-2021-29615.json",
BlobHash: "0963835c888a38e7773d332457a7968962080c7b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qw5h-7f53-xrp6",
"https://github.com/tensorflow/tensorflow/commit/e07e1c3d26492c06f078c7e5bf2d138043e199c1",
},
},
{
ID: "CVE-2021-29616",
Path: "2021/29xxx/CVE-2021-29616.json",
BlobHash: "97eeefaff3d7fee7feb382eb513ccd5c072bf955",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvv-7x94-7vq8",
"https://github.com/tensorflow/tensorflow/commit/e6340f0665d53716ef3197ada88936c2a5f7a2d3",
},
},
{
ID: "CVE-2021-29617",
Path: "2021/29xxx/CVE-2021-29617.json",
BlobHash: "cf369cb48b679bf74801bf95e2deecce20e9648b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mmq6-q8r3-48fm",
"https://github.com/tensorflow/tensorflow/commit/890f7164b70354c57d40eda52dcdd7658677c09f",
"https://github.com/tensorflow/issues/46900",
"https://github.com/tensorflow/issues/46974",
},
},
{
ID: "CVE-2021-29618",
Path: "2021/29xxx/CVE-2021-29618.json",
BlobHash: "f099ec467b6196f7301c8ccfff0a0c58ba891b98",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-cr6q-pc8w",
"https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88",
"https://github.com/tensorflow/issues/42105",
"https://github.com/tensorflow/issues/46973",
},
},
{
ID: "CVE-2021-29619",
Path: "2021/29xxx/CVE-2021-29619.json",
BlobHash: "8e4413cb2d59e0cf8deccdc6af62c5072f25614b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wvjw-p9f5-vq28",
"https://github.com/tensorflow/tensorflow/commit/82e6203221865de4008445b13c69b6826d2b28d9",
},
},
{
ID: "CVE-2021-35958",
Path: "2021/35xxx/CVE-2021-35958.json",
BlobHash: "781fe32b0a3bbe547577f053cc71f5e463b5a5df",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://vuln.ryotak.me/advisories/52",
"https://github.com/tensorflow/tensorflow/blob/b8cad4c631096a34461ff8a07840d5f4d123ce32/tensorflow/python/keras/utils/data_utils.py#L137",
"https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall",
"https://keras.io/api/",
"https://github.com/tensorflow/tensorflow/blob/b8cad4c631096a34461ff8a07840d5f4d123ce32/tensorflow/python/keras/README.md",
},
},
{
ID: "CVE-2021-37635",
Path: "2021/37xxx/CVE-2021-37635.json",
BlobHash: "642c89c869189f919f43c736f25e3f05959212d2",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cgfm-62j4-v4rf",
"https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750",
},
},
{
ID: "CVE-2021-37636",
Path: "2021/37xxx/CVE-2021-37636.json",
BlobHash: "de0aa160d1b38af958f3c3bfd214a00d834a347d",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hp4c-x6r7-6555",
"https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9",
},
},
{
ID: "CVE-2021-37637",
Path: "2021/37xxx/CVE-2021-37637.json",
BlobHash: "bed8385118bd1bb0c50f85adf8f096ed4c1dc8da",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c9qf-r67m-p7cg",
"https://github.com/tensorflow/tensorflow/commit/5dc7f6981fdaf74c8c5be41f393df705841fb7c5",
},
},
{
ID: "CVE-2021-37638",
Path: "2021/37xxx/CVE-2021-37638.json",
BlobHash: "9e0c47ded28ee3c2f274c439a6822e3eb455b394",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hwr7-8gxx-fj5p",
"https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314",
},
},
{
ID: "CVE-2021-37639",
Path: "2021/37xxx/CVE-2021-37639.json",
BlobHash: "f959718f4e03dafefc0a7ab56dc20257f1528d6b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh6x-4whr-2qv4",
"https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622",
},
},
{
ID: "CVE-2021-37640",
Path: "2021/37xxx/CVE-2021-37640.json",
BlobHash: "deeb75c61f29cac413427342d130b9e716eab9b8",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-95xm-g58g-3p88",
"https://github.com/tensorflow/tensorflow/commit/4923de56ec94fff7770df259ab7f2288a74feb41",
},
},
{
ID: "CVE-2021-37641",
Path: "2021/37xxx/CVE-2021-37641.json",
BlobHash: "da8307da4d5e92de3a30314680cda76894ea1dc8",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-vvrj-w2p8",
"https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373",
},
},
{
ID: "CVE-2021-37642",
Path: "2021/37xxx/CVE-2021-37642.json",
BlobHash: "1b47df79e705a83c8c8907285af89f96b1c92fc2",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ch4f-829c-v5pw",
"https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76",
},
},
{
ID: "CVE-2021-37643",
Path: "2021/37xxx/CVE-2021-37643.json",
BlobHash: "349f28ad92eca81909c6e02dab860df6ee4f1a19",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fcwc-p4fc-c5cc",
"https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988",
},
},
{
ID: "CVE-2021-37644",
Path: "2021/37xxx/CVE-2021-37644.json",
BlobHash: "a2a4d98164afe8b1713ad0962b34149ad5477aa3",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27j5-4p9v-pp67",
"https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2",
},
},
{
ID: "CVE-2021-37645",
Path: "2021/37xxx/CVE-2021-37645.json",
BlobHash: "8b3ac954d72e386d875b471611072e0461a4a3e8",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9w2p-5mgw-p94c",
"https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1",
},
},
{
ID: "CVE-2021-37646",
Path: "2021/37xxx/CVE-2021-37646.json",
BlobHash: "4744e500007686a1653aec62c747f3fc6f91a02b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6jh-7gv5-28vg",
"https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5",
},
},
{
ID: "CVE-2021-37647",
Path: "2021/37xxx/CVE-2021-37647.json",
BlobHash: "4996c5c7827304203d7cd963bfa11c30db4b4286",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c5x2-p679-95wc",
"https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7",
},
},
{
ID: "CVE-2021-37648",
Path: "2021/37xxx/CVE-2021-37648.json",
BlobHash: "2d9bf48b1f668d2a91c8ae1637772a231b6c3f61",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wp77-4gmm-7cq8",
"https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986",
},
},
{
ID: "CVE-2021-37649",
Path: "2021/37xxx/CVE-2021-37649.json",
BlobHash: "6302db09d66e8e9f0eb8b8119f0e32e089170307",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gv8-p3vj-pxvr",
"https://github.com/tensorflow/tensorflow/commit/7bdf50bb4f5c54a4997c379092888546c97c3ebd",
},
},
{
ID: "CVE-2021-37650",
Path: "2021/37xxx/CVE-2021-37650.json",
BlobHash: "a071c2a3edbf5e10d1379ce15fd666534d7ef9e3",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f8h4-7rgh-q2gm",
"https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876",
},
},
{
ID: "CVE-2021-37651",
Path: "2021/37xxx/CVE-2021-37651.json",
BlobHash: "24d164737bd72c4b4b23b36d0243d88d007068f7",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hpv4-7p9c-mvfr",
"https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30",
},
},
{
ID: "CVE-2021-37652",
Path: "2021/37xxx/CVE-2021-37652.json",
BlobHash: "edd7e795fa78b7b4e87f25a90c499b785b855c88",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m7fm-4jfh-jrg6",
"https://github.com/tensorflow/tensorflow/commit/5ecec9c6fbdbc6be03295685190a45e7eee726ab",
},
},
{
ID: "CVE-2021-37653",
Path: "2021/37xxx/CVE-2021-37653.json",
BlobHash: "45a0708102c02f0475e71e2d559877f439751bdb",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjj8-32p7-h289",
"https://github.com/tensorflow/tensorflow/commit/ac117ee8a8ea57b73d34665cdf00ef3303bc0b11",
},
},
{
ID: "CVE-2021-37654",
Path: "2021/37xxx/CVE-2021-37654.json",
BlobHash: "be1c6edd99673cd4cb58d63e49e073b2a737d6f7",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2r8p-fg3c-wcj4",
"https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d",
},
},
{
ID: "CVE-2021-37655",
Path: "2021/37xxx/CVE-2021-37655.json",
BlobHash: "eb38f095e0bbc39e0de6919d9fbf78a9202b00d7",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7fvx-3jfc-2cpc",
"https://github.com/tensorflow/tensorflow/commit/01cff3f986259d661103412a20745928c727326f",
},
},
{
ID: "CVE-2021-37656",
Path: "2021/37xxx/CVE-2021-37656.json",
BlobHash: "4edd74f0dc0535de474e9e3a49da8513347cc9ef",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4xfp-4pfp-89wg",
"https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece",
},
},
{
ID: "CVE-2021-37657",
Path: "2021/37xxx/CVE-2021-37657.json",
BlobHash: "c41a47d9966732c98e90a7cd187d8c1252ec7206",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5xwc-mrhx-5g3m",
"https://github.com/tensorflow/tensorflow/commit/f2a673bd34f0d64b8e40a551ac78989d16daad09",
},
},
{
ID: "CVE-2021-37658",
Path: "2021/37xxx/CVE-2021-37658.json",
BlobHash: "a153ce709c052950f7fccbfb3c4fc134cb7b4933",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6p5r-g9mq-ggh2",
"https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b",
},
},
{
ID: "CVE-2021-37659",
Path: "2021/37xxx/CVE-2021-37659.json",
BlobHash: "c3dce61c71ea715d4d6352eaec5de9a093416553",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q3g3-h9r4-prrc",
"https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec",
},
},
{
ID: "CVE-2021-37660",
Path: "2021/37xxx/CVE-2021-37660.json",
BlobHash: "5cf3141539b063216ea99b91253e037f9136d6ae",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cm5x-837x-jf3c",
"https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618",
},
},
{
ID: "CVE-2021-37661",
Path: "2021/37xxx/CVE-2021-37661.json",
BlobHash: "75bf5f046f02d9e67cabfa626e79be0f6a60cf3b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf88-j2mg-cc82",
"https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992",
},
},
{
ID: "CVE-2021-37662",
Path: "2021/37xxx/CVE-2021-37662.json",
BlobHash: "c014bc54e2b0a3a67db648db2962b67b9becbcd4",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f5cx-5wr3-5qrc",
"https://github.com/tensorflow/tensorflow/commit/429f009d2b2c09028647dd4bb7b3f6f414bbaad7",
"https://github.com/tensorflow/tensorflow/commit/9c87c32c710d0b5b53dc6fd3bfde4046e1f7a5ad",
},
},
{
ID: "CVE-2021-37663",
Path: "2021/37xxx/CVE-2021-37663.json",
BlobHash: "7b34ff40488cc06dd61a2e15f26b4665f8647124",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g25h-jr74-qp5j",
"https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708",
},
},
{
ID: "CVE-2021-37664",
Path: "2021/37xxx/CVE-2021-37664.json",
BlobHash: "d90c85af0faa5884b8d548f366cd91a6c06d71a4",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4c4-5fpq-56wg",
"https://github.com/tensorflow/tensorflow/commit/e84c975313e8e8e38bb2ea118196369c45c51378",
},
},
{
ID: "CVE-2021-37665",
Path: "2021/37xxx/CVE-2021-37665.json",
BlobHash: "d00cde4daf50fb2a31058baf2759d7d3cefcd550",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v82p-hv3v-p6qp",
"https://github.com/tensorflow/tensorflow/commit/203214568f5bc237603dbab6e1fd389f1572f5c9",
"https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69",
},
},
{
ID: "CVE-2021-37666",
Path: "2021/37xxx/CVE-2021-37666.json",
BlobHash: "0642a21b40f51d16ea8eb33fe24c7f9902f1719e",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w4xf-2pqw-5mq7",
"https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612",
},
},
{
ID: "CVE-2021-37667",
Path: "2021/37xxx/CVE-2021-37667.json",
BlobHash: "5befd6bfdae686bace9f983a82add5104c5959cc",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w74j-v8xh-3w5h",
"https://github.com/tensorflow/tensorflow/commit/2e0ee46f1a47675152d3d865797a18358881d7a6",
},
},
{
ID: "CVE-2021-37668",
Path: "2021/37xxx/CVE-2021-37668.json",
BlobHash: "ad453d9228771dd404b0ed316cd6346961f69e8a",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2wmv-37vq-52g5",
"https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233",
},
},
{
ID: "CVE-2021-37669",
Path: "2021/37xxx/CVE-2021-37669.json",
BlobHash: "ced9b164192b78bfbd1e5ec3bbe23a12c2f46d23",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vmjw-c2vp-p33c",
"https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d",
"https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58",
},
},
{
ID: "CVE-2021-37670",
Path: "2021/37xxx/CVE-2021-37670.json",
BlobHash: "00f1a3bce81be2901c86359ae9d96f4fd43a89fd",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7",
"https://github.com/tensorflow/tensorflow/commit/42459e4273c2e47a3232cc16c4f4fff3b3a35c38",
},
},
{
ID: "CVE-2021-37671",
Path: "2021/37xxx/CVE-2021-37671.json",
BlobHash: "3dbe46f6de616076fe72b0e09207f20f8fa51625",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qr82-2c78-4m8h",
"https://github.com/tensorflow/tensorflow/commit/532f5c5a547126c634fefd43bbad1dc6417678ac",
},
},
{
ID: "CVE-2021-37672",
Path: "2021/37xxx/CVE-2021-37672.json",
BlobHash: "cf98b0683ecfbe85966628ed47dbdde7a82df1a9",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hj3-vjjf-f5m7",
"https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6",
},
},
{
ID: "CVE-2021-37673",
Path: "2021/37xxx/CVE-2021-37673.json",
BlobHash: "3f8c0d7bb418069e4c6cf4c602d4954d068ca49e",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-278g-rq84-9hmg",
"https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d",
},
},
{
ID: "CVE-2021-37674",
Path: "2021/37xxx/CVE-2021-37674.json",
BlobHash: "18fd81f627c00355c8500acdca215038b15eeb0d",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7ghq-fvr3-pj2x",
"https://github.com/tensorflow/tensorflow/commit/136b51f10903e044308cf77117c0ed9871350475",
"https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-068.md",
},
},
{
ID: "CVE-2021-37675",
Path: "2021/37xxx/CVE-2021-37675.json",
BlobHash: "da173290531fd5520d10dcccdb97e64f96042cba",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-2mv3-49ww",
"https://github.com/tensorflow/tensorflow/commit/8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4",
},
},
{
ID: "CVE-2021-37676",
Path: "2021/37xxx/CVE-2021-37676.json",
BlobHash: "77dff7969871db4fc359119e9c6c39edd52a6a18",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v768-w7m9-2vmm",
"https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed",
},
},
{
ID: "CVE-2021-37677",
Path: "2021/37xxx/CVE-2021-37677.json",
BlobHash: "3dc38e667d94f0d9cc448fb89a7d279f36a2036e",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qfpc-5pjr-mh26",
"https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764",
},
},
{
ID: "CVE-2021-37678",
Path: "2021/37xxx/CVE-2021-37678.json",
BlobHash: "330dd1e8e59321e4f77199d35901951139850e4e",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6jx-9g48-2r5r",
"https://github.com/tensorflow/tensorflow/commit/23d6383eb6c14084a8fc3bdf164043b974818012",
},
},
{
ID: "CVE-2021-37679",
Path: "2021/37xxx/CVE-2021-37679.json",
BlobHash: "1e85bf10695dab7ea5a4278e2b32dfeebf353b0c",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g8wg-cjwc-xhhp",
"https://github.com/tensorflow/tensorflow/commit/4e2565483d0ffcadc719bd44893fb7f609bb5f12",
},
},
{
ID: "CVE-2021-37680",
Path: "2021/37xxx/CVE-2021-37680.json",
BlobHash: "3fd7bbd6bf43ed7e17c92c767bb9c107b8d236aa",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfpj-3q4c-jhvr",
"https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f",
},
},
{
ID: "CVE-2021-37681",
Path: "2021/37xxx/CVE-2021-37681.json",
BlobHash: "9c0ddf576f9b3df3d43f2d61c5639c984a09ed06",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7xwj-5r4v-429p",
"https://github.com/tensorflow/tensorflow/commit/5b048e87e4e55990dae6b547add4dae59f4e1c76",
},
},
{
ID: "CVE-2021-37682",
Path: "2021/37xxx/CVE-2021-37682.json",
BlobHash: "109cde8be690d3c506d1f46ad023fe82284befed",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4c4g-crqm-xrxw",
"https://github.com/tensorflow/tensorflow/commit/4a91f2069f7145aab6ba2d8cfe41be8a110c18a5",
"https://github.com/tensorflow/tensorflow/commit/537bc7c723439b9194a358f64d871dd326c18887",
"https://github.com/tensorflow/tensorflow/commit/8933b8a21280696ab119b63263babdb54c298538",
},
},
{
ID: "CVE-2021-37683",
Path: "2021/37xxx/CVE-2021-37683.json",
BlobHash: "045db36608dd334a6c877390e2f5df022e534857",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rhrq-64mq-hf9h",
"https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28",
},
},
{
ID: "CVE-2021-37684",
Path: "2021/37xxx/CVE-2021-37684.json",
BlobHash: "86cdcabb766cf7ea1ab0e0c0498c5e14778d7ccf",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q7f7-544h-67h9",
},
},
{
ID: "CVE-2021-37685",
Path: "2021/37xxx/CVE-2021-37685.json",
BlobHash: "4a07f76988235fb0ada03ced9dc039efd3dfb12b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c545-c4f9-rf6v",
"https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257",
},
},
{
ID: "CVE-2021-37686",
Path: "2021/37xxx/CVE-2021-37686.json",
BlobHash: "0b6c6ab7b37e76b62a039fa4385c42136364d89c",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mhhc-q96p-mfm9",
"https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695",
},
},
{
ID: "CVE-2021-37687",
Path: "2021/37xxx/CVE-2021-37687.json",
BlobHash: "ebe88f94f13b110e4ab62bc121435bca02fe3236",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jwf9-w5xm-f437",
"https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f",
"https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d",
},
},
{
ID: "CVE-2021-37688",
Path: "2021/37xxx/CVE-2021-37688.json",
BlobHash: "04ceb89bdcca04ada2e1bd8e8610485b5914405c",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vcjj-9vg7-vf68",
"https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c",
},
},
{
ID: "CVE-2021-37689",
Path: "2021/37xxx/CVE-2021-37689.json",
BlobHash: "e6b5df4b16b1dd1379c4932526a7780daad60b2b",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wf5p-c75w-w3wh",
"https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955",
},
},
{
ID: "CVE-2021-37690",
Path: "2021/37xxx/CVE-2021-37690.json",
BlobHash: "c946682d7f40b599bfebf87b2f295fcd26626411",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3hxh-8cp2-g4hg",
"https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1",
},
},
{
ID: "CVE-2021-37691",
Path: "2021/37xxx/CVE-2021-37691.json",
BlobHash: "8e78b8b987c6d1a20cde572e800e403d409addc1",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27qf-jwm8-g7f3",
"https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9",
},
},
{
ID: "CVE-2021-37692",
Path: "2021/37xxx/CVE-2021-37692.json",
BlobHash: "08838dcccbbbfc26b59b2e3d28aa3c8cd5769903",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cmgw-8vpc-rc59",
"https://github.com/tensorflow/tensorflow/pull/50508",
"https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22",
},
},
{
ID: "CVE-2021-41195",
Path: "2021/41xxx/CVE-2021-41195.json",
BlobHash: "e92f78f1ee3c559fa82ee81b7d9acc207a0158d8",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cq76-mxrc-vchh",
"https://github.com/tensorflow/tensorflow/issues/46888",
"https://github.com/tensorflow/tensorflow/pull/51733",
"https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429",
},
},
{
ID: "CVE-2021-41196",
Path: "2021/41xxx/CVE-2021-41196.json",
BlobHash: "1a95356814aa34a21ce55b972e41ec956742478c",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8",
"https://github.com/tensorflow/tensorflow/issues/51936",
"https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b",
},
},
{
ID: "CVE-2021-41197",
Path: "2021/41xxx/CVE-2021-41197.json",
BlobHash: "d7e5aa3ce04c6fe031e85a42fa0606938a97c8d6",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p",
"https://github.com/tensorflow/tensorflow/issues/46890",
"https://github.com/tensorflow/tensorflow/issues/51908",
"https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85",
"https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf",
"https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15",
},
},
{
ID: "CVE-2021-41198",
Path: "2021/41xxx/CVE-2021-41198.json",
BlobHash: "fa197f8d57cb70c762060020bcc0f74f7a66c24a",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2p25-55c9-h58q",
"https://github.com/tensorflow/tensorflow/issues/46911",
"https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f",
},
},
{
ID: "CVE-2021-41199",
Path: "2021/41xxx/CVE-2021-41199.json",
BlobHash: "e86f15f0f69b8ad5bc9646bbe0d5edf3a7ea6732",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hx2-qx8j-qjqm",
"https://github.com/tensorflow/tensorflow/issues/46914",
"https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837",
},
},
{
ID: "CVE-2021-41200",
Path: "2021/41xxx/CVE-2021-41200.json",
BlobHash: "2b92f54aac84403691c7b68587e025b3e22a1ec4",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f",
"https://github.com/tensorflow/tensorflow/issues/46909",
"https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e",
},
},
{
ID: "CVE-2021-41201",
Path: "2021/41xxx/CVE-2021-41201.json",
BlobHash: "1303d512b7b88291b717cbba085d077ed9984dad",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j86v-p27c-73fm",
"https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6",
},
},
{
ID: "CVE-2021-41202",
Path: "2021/41xxx/CVE-2021-41202.json",
BlobHash: "67260d92c87a3ae53101a4d68e14ce109fbebb2d",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx",
"https://github.com/tensorflow/tensorflow/issues/46889",
"https://github.com/tensorflow/tensorflow/issues/46912",
"https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94",
"https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899",
},
},
{
ID: "CVE-2021-41203",
Path: "2021/41xxx/CVE-2021-41203.json",
BlobHash: "102d48cc1ee147c3c3cf3d60d43f3a4983e6d0f7",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7pxj-m4jf-r6h2",
"https://github.com/tensorflow/tensorflow/commit/368af875869a204b4ac552b9ddda59f6a46a56ec",
"https://github.com/tensorflow/tensorflow/commit/abcced051cb1bd8fb05046ac3b6023a7ebcc4578",
"https://github.com/tensorflow/tensorflow/commit/b619c6f865715ca3b15ef1842b5b95edbaa710ad",
"https://github.com/tensorflow/tensorflow/commit/e8dc63704c88007ee4713076605c90188d66f3d2",
},
},
{
ID: "CVE-2021-41204",
Path: "2021/41xxx/CVE-2021-41204.json",
BlobHash: "571c0e1bc2d31dbbc05feeae0648b33d16d96054",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-786j-5qwq-r36x",
"https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659",
},
},
{
ID: "CVE-2021-41205",
Path: "2021/41xxx/CVE-2021-41205.json",
BlobHash: "c0f10ab88eee56e0aea968f4e07fe450b48cf798",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rx-x2rw-pc6f",
"https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d",
},
},
{
ID: "CVE-2021-41206",
Path: "2021/41xxx/CVE-2021-41206.json",
BlobHash: "3d54d810d0e5b37210acd68aad4810d935f19107",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69",
"https://github.com/tensorflow/tensorflow/commit/4d74d8a00b07441cba090a02e0dd9ed385145bf4",
"https://github.com/tensorflow/tensorflow/commit/4dddb2fd0b01cdd196101afbba6518658a2c9e07",
"https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d",
"https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a",
"https://github.com/tensorflow/tensorflow/commit/da4aad5946be30e5f049920fa076e1f7ef021261",
"https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904",
},
},
{
ID: "CVE-2021-41207",
Path: "2021/41xxx/CVE-2021-41207.json",
BlobHash: "fa1051c54a52ca44a08d33cd4d82f947aa09c925",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7v94-64hj-m82h",
},
},
{
ID: "CVE-2021-41208",
Path: "2021/41xxx/CVE-2021-41208.json",
BlobHash: "4f252abee49ce00acb427fb4e55c7b5a10e598e5",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88",
"https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c",
},
},
{
ID: "CVE-2021-41209",
Path: "2021/41xxx/CVE-2021-41209.json",
BlobHash: "b43d692231c102fe2f05c2eb8079595464d4e7e1",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hpv-v2rx-c5g6",
"https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235",
},
},
{
ID: "CVE-2021-41210",
Path: "2021/41xxx/CVE-2021-41210.json",
BlobHash: "c0298e2202c14bcead40ae8050af3249443c2e75",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m342-ff57-4jcc",
"https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2",
},
},
{
ID: "CVE-2021-41211",
Path: "2021/41xxx/CVE-2021-41211.json",
BlobHash: "3570ae9b84c641ee011c8d0427761a70b6a81df3",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvgx-3v3q-m36c",
"https://github.com/tensorflow/tensorflow/commit/a0d64445116c43cf46a5666bd4eee28e7a82f244",
},
},
{
ID: "CVE-2021-41212",
Path: "2021/41xxx/CVE-2021-41212.json",
BlobHash: "860bf94c111913f6e7ff52bb1e804d1d39df1f77",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fr77-rrx3-cp7g",
"https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8",
},
},
{
ID: "CVE-2021-41213",
Path: "2021/41xxx/CVE-2021-41213.json",
BlobHash: "f34bf7f8d4203c8d61f1a3dc20fad6be6de5d751",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h67m-xg8f-fxcf",
"https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7",
},
},
{
ID: "CVE-2021-41214",
Path: "2021/41xxx/CVE-2021-41214.json",
BlobHash: "d1709a96071c4bce502bec2d04327829b215fa86",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8",
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vwhq-49r4-gj9v",
},
},
{
ID: "CVE-2021-41215",
Path: "2021/41xxx/CVE-2021-41215.json",
BlobHash: "0057873c0f537daa0f9c853ed4d11bf4ac8fe0d9",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x3v8-c8qx-3j3r",
"https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850",
},
},
{
ID: "CVE-2021-41216",
Path: "2021/41xxx/CVE-2021-41216.json",
BlobHash: "9371bcec59f2f4f8c1c361f3169b4508d417a6cb",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3ff2-r28g-w7h9",
"https://github.com/tensorflow/tensorflow/commit/c79ba87153ee343401dbe9d1954d7f79e521eb14",
},
},
{
ID: "CVE-2021-41217",
Path: "2021/41xxx/CVE-2021-41217.json",
BlobHash: "56b688e85d30362d699d530309d4f5ddc0ab3179",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5crj-c72x-m7gq",
"https://github.com/tensorflow/tensorflow/commit/05cbebd3c6bb8f517a158b0155debb8df79017ff",
},
},
{
ID: "CVE-2021-41218",
Path: "2021/41xxx/CVE-2021-41218.json",
BlobHash: "aa9d42c74cb8ceae6a2bfaa8be6f0338e14ce559",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9crf-c6qr-r273",
"https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc",
},
},
{
ID: "CVE-2021-41219",
Path: "2021/41xxx/CVE-2021-41219.json",
BlobHash: "7d7729c55b029cc4d77ca0b5af7cc5c925ed53f2",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4f99-p9c2-3j8x",
"https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae",
},
},
{
ID: "CVE-2021-41220",
Path: "2021/41xxx/CVE-2021-41220.json",
BlobHash: "173b397e148ab86cbf839b7bff3a4b3c1b6edb11",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gpfh-jvf9-7wg5",
"https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75",
},
},
{
ID: "CVE-2021-41221",
Path: "2021/41xxx/CVE-2021-41221.json",
BlobHash: "f187e9cd068385fbdfe324f18d05064c3bf3cfa1",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cqv6-3phm-hcwx",
"https://github.com/tensorflow/tensorflow/commit/af5fcebb37c8b5d71c237f4e59c6477015c78ce6",
},
},
{
ID: "CVE-2021-41222",
Path: "2021/41xxx/CVE-2021-41222.json",
BlobHash: "e955ef931fe19e2615b821cf97becd8396918750",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cpf4-wx82-gxp6",
"https://github.com/tensorflow/tensorflow/commit/25d622ffc432acc736b14ca3904177579e733cc6",
},
},
{
ID: "CVE-2021-41223",
Path: "2021/41xxx/CVE-2021-41223.json",
BlobHash: "5c5e6aaf5a8acbdddfec06ba9c7f4912e2b5951a",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f54p-f6jp-4rhr",
"https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda",
},
},
{
ID: "CVE-2021-41224",
Path: "2021/41xxx/CVE-2021-41224.json",
BlobHash: "cae7338931654c4d45e62e8fed8a72a6f1655828",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rg3m-hqc5-344v",
"https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b",
},
},
{
ID: "CVE-2021-41225",
Path: "2021/41xxx/CVE-2021-41225.json",
BlobHash: "0c755722793d71a42d45d70a8dcd12ae39fe06af",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7r94-xv9v-63jw",
"https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3",
},
},
{
ID: "CVE-2021-41226",
Path: "2021/41xxx/CVE-2021-41226.json",
BlobHash: "3a08efb5369f6eeb43b311bfa8cb7d8163c84b9e",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-374m-jm66-3vj8",
"https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba",
},
},
{
ID: "CVE-2021-41227",
Path: "2021/41xxx/CVE-2021-41227.json",
BlobHash: "3566a9b05b4cbaa8555d8e813deac09c6fae74d2",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8c8-67vp-6mx7",
"https://github.com/tensorflow/tensorflow/commit/1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b",
"https://github.com/tensorflow/tensorflow/commit/3712a2d3455e6ccb924daa5724a3652a86f6b585",
},
},
{
ID: "CVE-2021-41228",
Path: "2021/41xxx/CVE-2021-41228.json",
BlobHash: "8a7dfd9a7d0c57f66ced89ffa083b4411129a933",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3rcw-9p9x-582v",
"https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7",
},
},
{
ID: "CVE-2013-2028",
Path: "2013/2xxx/CVE-2013-2028.json",
BlobHash: "5ff1542bf8bd7715b85de24c31e60451b6323f1d",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://mailman.nginx.org/pipermail/nginx-announce/2013/000112.html",
"http://www.osvdb.org/93037",
"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105176.html",
"http://www.vnsecurity.net/2013/05/analysis-of-nginx-cve-2013-2028/",
"http://secunia.com/advisories/55181",
"http://www.securityfocus.com/bid/59699",
"http://security.gentoo.org/glsa/glsa-201310-04.xml",
"https://github.com/rapid7/metasploit-framework/pull/1834",
"http://nginx.org/download/patch.2013.chunked.txt",
"http://packetstormsecurity.com/files/121675/Nginx-1.3.9-1.4.0-Denial-Of-Service.html",
},
},
{
ID: "CVE-2013-4450",
Path: "2013/4xxx/CVE-2013-4450.json",
BlobHash: "b4f345385e30a6f8208913094489a231793e964f",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://kb.juniper.net/JSA10783",
"http://rhn.redhat.com/errata/RHSA-2013-1842.html",
"http://lists.opensuse.org/opensuse-updates/2013-12/msg00051.html",
"http://www.openwall.com/lists/oss-security/2013/10/20/1",
"http://www.securityfocus.com/bid/63229",
"http://blog.nodejs.org/2013/10/18/node-v0-10-21-stable/",
"http://blog.nodejs.org/2013/10/18/node-v0-8-26-maintenance/",
"https://github.com/rapid7/metasploit-framework/pull/2548",
"https://groups.google.com/forum/#!topic/nodejs/NEbweYB0ei0",
"https://github.com/joyent/node/issues/6214",
},
},
{
ID: "CVE-2014-4877",
Path: "2014/4xxx/CVE-2014-4877.json",
BlobHash: "aa0091f82ae50cb0fcb83afcec3e218da04e32ad",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=b4440d96cf8173d68ecaa07c36b8f4316ee794d0",
"http://security.gentoo.org/glsa/glsa-201411-05.xml",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917",
"http://lists.gnu.org/archive/html/bug-wget/2014-10/msg00150.html",
"http://www.ubuntu.com/usn/USN-2393-1",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:121",
"http://rhn.redhat.com/errata/RHSA-2014-1955.html",
"http://www.debian.org/security/2014/dsa-3062",
"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=18b0979357ed7dc4e11d4f2b1d7e0f5932d82aa7",
"http://www.kb.cert.org/vuls/id/685996",
"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00004.html",
"http://rhn.redhat.com/errata/RHSA-2014-1764.html",
"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00009.html",
"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"http://lists.opensuse.org/opensuse-updates/2014-11/msg00026.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=1139181",
"https://community.rapid7.com/community/metasploit/blog/2014/10/28/r7-2014-15-gnu-wget-ftp-symlink-arbitrary-filesystem-access",
"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
"http://www.securityfocus.com/bid/70751",
"https://kc.mcafee.com/corporate/index?page=content&id=SB10106",
"http://advisories.mageia.org/MGASA-2014-0431.html",
"https://github.com/rapid7/metasploit-framework/pull/4088",
},
},
{
ID: "CVE-2014-5445",
Path: "2014/5xxx/CVE-2014-5445.json",
BlobHash: "b83893dddc2a85b4f4a0ea96274f3e2a0fc2234e",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://support.zoho.com/portal/manageengine/helpcenter/articles/cve-2014-5445-cve-2014-5446-fix-for-arbitrary-file-download",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/99045",
"http://packetstormsecurity.com/files/129336/ManageEngine-Netflow-Analyzer-IT360-File-Download.html",
"http://www.securityfocus.com/archive/1/534141/100/0/threaded",
"http://www.securityfocus.com/bid/71404",
"https://github.com/rapid7/metasploit-framework/pull/4282",
"https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_netflow_it360_file_dl.txt",
"http://www.securityfocus.com/archive/1/534122/100/0/threaded",
"http://seclists.org/fulldisclosure/2014/Dec/9",
},
},
{
ID: "CVE-2014-6037",
Path: "2014/6xxx/CVE-2014-6037.json",
BlobHash: "48ba5b40c19fd59d2564f1541c00baa46b9141ed",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://packetstormsecurity.com/files/128102/ManageEngine-EventLog-Analyzer-9.9-Authorization-Code-Execution.html",
"http://www.exploit-db.com/exploits/34519",
"http://seclists.org/fulldisclosure/2014/Aug/86",
"http://seclists.org/fulldisclosure/2014/Sep/1",
"https://github.com/rapid7/metasploit-framework/pull/3732",
"http://seclists.org/fulldisclosure/2014/Sep/19",
"http://www.securityfocus.com/bid/69482",
"http://seclists.org/fulldisclosure/2014/Sep/20",
"https://www.mogwaisecurity.de/advisories/MSA-2014-01.txt",
"http://osvdb.org/show/osvdb/110642",
},
},
{
ID: "CVE-2014-6287",
Path: "2014/6xxx/CVE-2014-6287.json",
BlobHash: "705a769ab54698278e49378f386511ad93c4ce2c",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.kb.cert.org/vuls/id/251276",
"https://www.exploit-db.com/exploits/39161/",
"http://packetstormsecurity.com/files/128243/HttpFileServer-2.3.x-Remote-Command-Execution.html",
"https://github.com/rapid7/metasploit-framework/pull/3793",
"http://packetstormsecurity.com/files/135122/Rejetto-HTTP-File-Server-2.3.x-Remote-Code-Execution.html",
"http://packetstormsecurity.com/files/160264/Rejetto-HttpFileServer-2.3.x-Remote-Command-Execution.html",
"http://packetstormsecurity.com/files/161503/HFS-HTTP-File-Server-2.3.x-Remote-Code-Execution.html",
},
},
{
ID: "CVE-2014-7189",
Path: "2014/7xxx/CVE-2014-7189.json",
BlobHash: "3a843400fb76a8c7ed8ca42c8da5411f78801c60",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://exchange.xforce.ibmcloud.com/vulnerabilities/96693",
"http://www.securityfocus.com/bid/70156",
"http://www.openwall.com/lists/oss-security/2014/09/26/28",
"https://groups.google.com/forum/#!msg/golang-nuts/eeOHNw_shwU/OHALUmroA5kJ",
},
},
{
ID: "CVE-2014-9566",
Path: "2014/9xxx/CVE-2014-9566.json",
BlobHash: "011691878d857e0b1868d2adf84220dfa65b8eea",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/pull/4836",
"http://www.exploit-db.com/exploits/36262",
"http://osvdb.org/show/osvdb/118746",
"http://volatile-minds.blogspot.com/2015/02/authenticated-stacked-sql-injection-in.html",
"http://seclists.org/fulldisclosure/2015/Mar/18",
"http://packetstormsecurity.com/files/130637/Solarwinds-Orion-Service-SQL-Injection.html",
"http://www.solarwinds.com/documentation/orion/docs/releasenotes/releasenotes.htm",
},
},
{
ID: "CVE-2015-0779",
Path: "2015/0xxx/CVE-2015-0779.json",
BlobHash: "7592cb7df77bbe474330e1dfebc5a72af30142ee",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/pull/5096",
"https://www.exploit-db.com/exploits/36964/",
"https://www.novell.com/support/kb/doc.php?id=7016419",
"https://raw.githubusercontent.com/pedrib/PoC/master/generic/zenworks_zcm_rce.txt",
"http://seclists.org/fulldisclosure/2015/Apr/21",
},
},
{
ID: "CVE-2016-7552",
Path: "2016/7xxx/CVE-2016-7552.json",
BlobHash: "98b3cd371f4984f4c5682822ee6fcb1e771655ad",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/pull/8216/commits/0f07875a2ddb0bfbb4e985ab074e9fc56da1dcf6",
"http://www.securityfocus.com/bid/97599",
},
},
{
ID: "CVE-2017-14705",
Path: "2017/14xxx/CVE-2017-14705.json",
BlobHash: "9911609601a0d0bac79018c629d8e5dc869ead77",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/pull/8980",
"https://pentest.blog/advisory-denyall-web-application-firewall-unauthenticated-remote-code-execution/",
"https://www.denyall.com/blog/advisories/advisory-unauthenticated-remote-code-execution-denyall-web-application-firewall/",
},
},
{
ID: "CVE-2017-14706",
Path: "2017/14xxx/CVE-2017-14706.json",
BlobHash: "3849b390f5738a8a407bd97f3825c464a947bdb7",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/pull/8980",
"https://pentest.blog/advisory-denyall-web-application-firewall-unauthenticated-remote-code-execution/",
"https://www.denyall.com/blog/advisories/advisory-unauthenticated-remote-code-execution-denyall-web-application-firewall/",
},
},
{
ID: "CVE-2017-14730",
Path: "2017/14xxx/CVE-2017-14730.json",
BlobHash: "fe8aeea16c9536387346d46733d7efeefc437d7f",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://bugs.gentoo.org/628558",
"https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=bbd6cb398c1740c68e9b1b78340c887c58c1fbda",
"https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=18f97c851c209f291b31ae7a902719f1c17c79fa",
"https://github.com/gentoo/gentoo/pull/5665",
},
},
{
ID: "CVE-2017-15041",
Path: "2017/15xxx/CVE-2017-15041.json",
BlobHash: "07f68c1b5ea4cc7d560e0e211c12babc1a5f43ab",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://access.redhat.com/errata/RHSA-2017:3463",
"https://access.redhat.com/errata/RHSA-2018:0878",
"https://golang.org/cl/68190",
"http://www.securityfocus.com/bid/101196",
"https://golang.org/cl/68022",
"https://security.gentoo.org/glsa/201710-23",
"https://groups.google.com/d/msg/golang-dev/RinSE3EiJBI/kYL7zb07AgAJ",
"https://github.com/golang/go/issues/22125",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html",
"https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html",
},
},
{
ID: "CVE-2017-15042",
Path: "2017/15xxx/CVE-2017-15042.json",
BlobHash: "82b8824f1b6ac1d77e2fab153c1eb694572cda7d",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://access.redhat.com/errata/RHSA-2017:3463",
"https://access.redhat.com/errata/RHSA-2018:0878",
"http://www.securityfocus.com/bid/101197",
"https://golang.org/cl/68210",
"https://golang.org/cl/68023",
"https://github.com/golang/go/issues/22134",
"https://security.gentoo.org/glsa/201710-23",
"https://groups.google.com/d/msg/golang-dev/RinSE3EiJBI/kYL7zb07AgAJ",
},
},
{
ID: "CVE-2017-15701",
Path: "2017/15xxx/CVE-2017-15701.json",
BlobHash: "48c02bacd4c6a4518fc0b0c04543e98f5b4b5c4c",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://issues.apache.org/jira/browse/QPID-7947",
"https://lists.apache.org/thread.html/4054e1c90993f337eeea24a312841c0661653e673c0ff8e2cd9520fe@%3Cdev.qpid.apache.org%3E",
"https://qpid.apache.org/cves/CVE-2017-15701.html",
"http://www.securityfocus.com/bid/102041",
},
},
{
ID: "CVE-2017-15702",
Path: "2017/15xxx/CVE-2017-15702.json",
BlobHash: "bfdca2d9fd21d63b2d7f41d7b945e7e442861873",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://issues.apache.org/jira/browse/QPID-8039",
"http://www.securityfocus.com/bid/102040",
"https://lists.apache.org/thread.html/59d241e30db23b8b0af26bb273f789aa1f08515d3dc1a3868d3ba090@%3Cdev.qpid.apache.org%3E",
"https://qpid.apache.org/cves/CVE-2017-15702.html",
},
},
{
ID: "CVE-2017-16762",
Path: "2017/16xxx/CVE-2017-16762.json",
BlobHash: "443f2bc2686367441b7bb26ca168984d02ff8f27",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/channelcat/sanic/releases/tag/0.5.1",
"https://github.com/channelcat/sanic/issues/633",
},
},
{
ID: "CVE-2017-17411",
Path: "2017/17xxx/CVE-2017-17411.json",
BlobHash: "ac56ec23de2cd4b44e511d292b385d6b3e77db87",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://www.securityfocus.com/bid/102212",
"https://github.com/rapid7/metasploit-framework/pull/9336",
"https://www.exploit-db.com/exploits/43363/",
"https://zerodayinitiative.com/advisories/ZDI-17-973",
"https://www.exploit-db.com/exploits/43429/",
},
},
{
ID: "CVE-2017-17560",
Path: "2017/17xxx/CVE-2017-17560.json",
BlobHash: "7f83f052dfb83730416b4fa323fcff915918a47e",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://download.exploitee.rs/file/generic/Exploiteers-DEFCON25.pdf",
"https://www.exploit-db.com/exploits/43356/",
"https://github.com/rapid7/metasploit-framework/pull/9248",
},
},
{
ID: "CVE-2017-18044",
Path: "2017/18xxx/CVE-2017-18044.json",
BlobHash: "fc72b49fa7b14d527bf6573d3520ca7929177282",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://github.com/rapid7/metasploit-framework/pull/9389",
"https://github.com/rapid7/metasploit-framework/pull/9340",
"https://www.securifera.com/advisories/sec-2017-0001/",
},
},
{
ID: "CVE-2017-5677",
Path: "2017/5xxx/CVE-2017-5677.json",
BlobHash: "a3e5463147aaba2dee3cd34d1ccf275ffba07a1a",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"http://karmainsecurity.com/KIS-2017-01",
"http://blog.pear.php.net/2017/02/02/security-html_ajax-058/",
"http://seclists.org/fulldisclosure/2017/Feb/12",
"http://www.securityfocus.com/bid/96044",
"https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f5acb5adcd195f9a06b732794cb0de7620def646",
"https://pear.php.net/bugs/bug.php?id=21165",
},
},
{
ID: "CVE-2017-7269",
Path: "2017/7xxx/CVE-2017-7269.json",
BlobHash: "f008f84a1e5e93464acd3c60deaa97afce4c1594",
CommitHash: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
CommitTime: time.Date(2021, time.November, 7, 1, 1, 1, 0, time.UTC),
CVEState: "PUBLIC",
TriageState: "FalsePositive",
ReferenceURLs: []string{
"https://www.exploit-db.com/exploits/41992/",
"http://www.securityfocus.com/bid/97127",
"https://medium.com/@iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812",
"https://github.com/rapid7/metasploit-framework/pull/8162",
"https://github.com/danigargu/explodingcan",
"http://www.securitytracker.com/id/1038168",
"https://www.exploit-db.com/exploits/41738/",
"https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server",
"https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html",
"https://github.com/edwardz246003/IIS_exploit",
},
},
}
|
worker
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/worker/false_positives_test.go
|
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
//go:build go1.17
// +build go1.17
package worker
import (
"context"
"testing"
"time"
"github.com/google/go-cmp/cmp"
"golang.org/x/vulndb/internal/cve4"
"golang.org/x/vulndb/internal/worker/store"
)
func TestUpdateFalsePositives(t *testing.T) {
const commitHash = "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a"
commitTime := time.Date(2021, time.April, 12, 23, 0, 56, 0, time.UTC)
mstore := store.NewMemStore()
createCVE4Records(t, mstore, []*store.CVE4Record{
// This DB record is older than the matching false positive record
// embedded in the program, so it will be updated.
{
ID: "CVE-2020-15112",
Path: "2020/15xxx/CVE-2020-15112.json",
CommitHash: "xyz",
CommitTime: time.Date(2021, time.March, 1, 0, 0, 0, 0, time.UTC),
BlobHash: "3d87891317ff107037bc0145194ab72df1890411",
CVEState: cve4.StatePublic,
TriageState: store.TriageStateNeedsIssue,
TriageStateReason: "will be replaced",
},
// This DB record is newer, so it won't be changed.
{
ID: "CVE-2020-15113",
Path: "2020/15xxx/CVE-2020-15113.json",
BlobHash: "9133c3be68ef84771bad74ec8770e1efff7bf0de",
CommitHash: commitHash,
CommitTime: commitTime,
CVEState: cve4.StatePublic,
TriageState: store.TriageStateNoActionNeeded,
ReferenceURLs: []string{
"https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92",
},
},
})
if err := updateFalsePositives(context.Background(), mstore); err != nil {
t.Fatal(err)
}
got := mstore.CVE4Records()
for _, want := range []*store.CVE4Record{
{
// Doesn't exist in DB.
ID: "CVE-2016-0216",
Path: "2016/0xxx/CVE-2016-0216.json",
CommitHash: commitHash,
CommitTime: commitTime,
BlobHash: "ac9f59c6700576b5936dc014ce265ee0c9a41097",
CVEState: cve4.StatePublic,
TriageState: store.TriageStateFalsePositive,
ReferenceURLs: []string{
"http://www.ibm.com/support/docview.wss?uid=swg21975358",
"http://www.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple_security_vulnerabilities_in_ibm_tivoli_storage_manager_fastback_cve_2016_0212_cve_2016_0213_cve_2016_0216",
},
},
{
// Newer than DB.
ID: "CVE-2020-15112",
Path: "2020/15xxx/CVE-2020-15112.json",
CommitHash: commitHash,
CommitTime: commitTime,
BlobHash: "3d87891317ff107037bc0145194ab72df1890411",
CVEState: cve4.StatePublic,
TriageState: store.TriageStateHasVuln,
TriageStateReason: "GO-2020-0005",
},
{
ID: "CVE-2020-15113",
Path: "2020/15xxx/CVE-2020-15113.json",
BlobHash: "9133c3be68ef84771bad74ec8770e1efff7bf0de",
CommitHash: commitHash,
CommitTime: commitTime,
CVEState: cve4.StatePublic,
TriageState: store.TriageStateNoActionNeeded,
ReferenceURLs: []string{
"https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92",
},
},
} {
if diff := cmp.Diff(want, got[want.ID]); diff != "" {
t.Errorf("mismatch (-want, +got):\n%s", diff)
}
}
}
|
worker
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/worker/worker.go
|
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package worker
// This file has the public API of the worker, used by cmd/worker as well
// as the server in this package.
import (
"context"
"fmt"
"reflect"
"strconv"
"strings"
"text/template"
"time"
"github.com/go-git/go-git/v5/plumbing"
"github.com/go-git/go-git/v5/plumbing/object"
"golang.org/x/time/rate"
"golang.org/x/vulndb/internal/cve4"
"golang.org/x/vulndb/internal/cveutils"
"golang.org/x/vulndb/internal/derrors"
"golang.org/x/vulndb/internal/ghsa"
"golang.org/x/vulndb/internal/gitrepo"
"golang.org/x/vulndb/internal/idstr"
"golang.org/x/vulndb/internal/issues"
"golang.org/x/vulndb/internal/observe"
"golang.org/x/vulndb/internal/pkgsite"
"golang.org/x/vulndb/internal/proxy"
"golang.org/x/vulndb/internal/report"
"golang.org/x/vulndb/internal/worker/log"
"golang.org/x/vulndb/internal/worker/store"
)
// UpdateCVEsAtCommit performs an update on the store using the given commit.
// Unless force is true, it checks that the update makes sense before doing it.
func UpdateCVEsAtCommit(ctx context.Context, repoPath, commitHashString string, st store.Store, pc *pkgsite.Client, rc *report.Client, force bool) (err error) {
defer derrors.Wrap(&err, "RunCommitUpdate(%q, %q, force=%t)", repoPath, commitHashString, force)
log.Infof(ctx, "updating false positives")
if err := updateFalsePositives(ctx, st); err != nil {
return err
}
repo, err := gitrepo.CloneOrOpen(ctx, repoPath)
if err != nil {
return err
}
var commitHash plumbing.Hash
if commitHashString == "HEAD" {
ref, err := repo.Reference(plumbing.HEAD, true)
if err != nil {
return err
}
commitHash = ref.Hash()
} else {
commitHash = plumbing.NewHash(commitHashString)
}
commit, err := repo.CommitObject(commitHash)
if err != nil {
return err
}
if !force {
if err := checkCVEUpdate(ctx, commit, st); err != nil {
return err
}
}
u := newCVEUpdater(repo, commit, st, rc, func(cve *cve4.CVE) (*cveutils.TriageResult, error) {
return cveutils.TriageCVE(ctx, cve, pc)
})
return u.update(ctx)
}
// checkCVEUpdate performs sanity checks on a potential update.
// It verifies that there is not an update currently in progress,
// and it makes sure that the update is to a more recent commit.
func checkCVEUpdate(ctx context.Context, commit *object.Commit, st store.Store) error {
ctx, span := observe.Start(ctx, "checkUpdate")
defer span.End()
urs, err := st.ListCommitUpdateRecords(ctx, 1)
if err != nil {
return err
}
if len(urs) == 0 {
// No updates, we're good.
return nil
}
// If the most recent update started recently but didn't finish, don't proceed to avoid
// concurrent updates.
lu := urs[0]
if lu.EndedAt.IsZero() && time.Since(lu.StartedAt) < 2*time.Hour {
return &CheckUpdateError{
msg: fmt.Sprintf("latest update started %s ago and has not finished", time.Since(lu.StartedAt)),
}
}
if commit.Committer.When.Before(lu.CommitTime) {
return &CheckUpdateError{
msg: fmt.Sprintf("commit %s time %s is before latest update commit %s time %s",
commit.Hash, commit.Committer.When.Format(time.RFC3339),
lu.CommitHash, lu.CommitTime.Format(time.RFC3339)),
}
}
return nil
}
// CheckUpdateError is an error returned from UpdateCommit that can be avoided
// calling UpdateCommit with force set to true.
type CheckUpdateError struct {
msg string
}
func (c *CheckUpdateError) Error() string {
return c.msg
}
const (
vulnDBBucket = "go-vulndb"
vulnDBURL = "https://storage.googleapis.com/" + vulnDBBucket
)
// GHSAListFunc is the type of a function that lists GitHub security advisories.
type GHSAListFunc func(_ context.Context, since time.Time) ([]*ghsa.SecurityAdvisory, error)
// UpdateGHSAs updates the store with the current state of GitHub's security advisories.
func UpdateGHSAs(ctx context.Context, list GHSAListFunc, st store.Store) (_ UpdateGHSAStats, err error) {
defer derrors.Wrap(&err, "UpdateGHSAs")
// Find the most recent update time of the records we have in the store.
grs, err := getGHSARecords(ctx, st)
var since time.Time
for _, gr := range grs {
if gr.GHSA.UpdatedAt.After(since) {
since = gr.GHSA.UpdatedAt
}
}
// We want to start just after that time.
since = since.Add(time.Nanosecond)
// Do the update.
return updateGHSAs(ctx, list, since, st)
}
func getGHSARecords(ctx context.Context, st store.Store) ([]*store.LegacyGHSARecord, error) {
var rs []*store.LegacyGHSARecord
err := st.RunTransaction(ctx, func(ctx context.Context, tx store.Transaction) error {
var err error
rs, err = tx.GetLegacyGHSARecords()
return err
})
if err != nil {
return nil, err
}
return rs, nil
}
// Limit GitHub issue creation requests to this many per second.
const issueQPS = 1
// The limiter used to throttle pkgsite requests.
// The second argument to rate.NewLimiter is the burst, which
// basically lets you exceed the rate briefly.
var issueRateLimiter = rate.NewLimiter(rate.Every(time.Duration(1000/float64(issueQPS))*time.Millisecond), 1)
// CreateIssues creates issues on the x/vulndb issue tracker for allReports.
func CreateIssues(ctx context.Context, st store.Store, client *issues.Client, pc *proxy.Client, rc *report.Client, limit int) (err error) {
defer derrors.Wrap(&err, "CreateIssues(destination: %s)", client.Destination())
ctx, span := observe.Start(ctx, "CreateIssues")
defer span.End()
if err := createCVEIssues(ctx, st, client, pc, rc, limit); err != nil {
return err
}
return createGHSAIssues(ctx, st, client, pc, rc, limit)
}
// xref returns cross-references for a report: Information about other reports
// for the same CVE, GHSA, or module.
func xref(r *report.Report, rc *report.Client) string {
aliasTitle, moduleTitle, noneMessage := "!! Possible duplicate report !!",
"Cross references:", "No existing reports found with this module or alias."
return rc.XRef(r).ToString(aliasTitle, moduleTitle, noneMessage)
}
func createCVEIssues(ctx context.Context, st store.Store, client *issues.Client, pc *proxy.Client, rc *report.Client, limit int) (err error) {
defer derrors.Wrap(&err, "createCVEIssues(destination: %s)", client.Destination())
needsIssue, err := st.ListCVE4RecordsWithTriageState(ctx, store.TriageStateNeedsIssue)
if err != nil {
return err
}
log.Infof(ctx, "createCVEIssues starting; destination: %s, total needing issue: %d",
client.Destination(), len(needsIssue))
numCreated := 0
for _, cr := range needsIssue {
if limit > 0 && numCreated >= limit {
break
}
ref, err := createIssue(ctx, cr, client, pc, rc)
if err != nil {
return err
}
// Update the CVE4Record in the DB with issue information.
err = st.RunTransaction(ctx, func(ctx context.Context, tx store.Transaction) error {
r, err := tx.GetRecord(cr.ID)
if err != nil {
return err
}
cr := r.(*store.CVE4Record)
cr.TriageState = store.TriageStateIssueCreated
cr.IssueReference = ref
cr.IssueCreatedAt = time.Now()
return tx.SetRecord(cr)
})
if err != nil {
return err
}
numCreated++
}
log.With("limit", limit).Infof(ctx, "createCVEIssues done: %d created", numCreated)
return nil
}
func createGHSAIssues(ctx context.Context, st store.Store, client *issues.Client, pc *proxy.Client, rc *report.Client, limit int) (err error) {
defer derrors.Wrap(&err, "createGHSAIssues(destination: %s)", client.Destination())
sas, err := getGHSARecords(ctx, st)
if err != nil {
return err
}
var needsIssue []*store.LegacyGHSARecord
for _, sa := range sas {
if sa.TriageState == store.TriageStateNeedsIssue {
needsIssue = append(needsIssue, sa)
}
}
log.Infof(ctx, "createGHSAIssues starting; destination: %s, total needing issue: %d",
client.Destination(), len(needsIssue))
numCreated := 0
for _, gr := range needsIssue {
if limit > 0 && numCreated >= limit {
break
}
// TODO(https://github.com/golang/go/issues/54049): Move this
// check to the triage step of the worker.
if isDuplicate(gr.GHSA, pc, rc) {
// Update the LegacyGHSARecord in the DB to reflect that the GHSA
// already has an advisory.
if err = st.RunTransaction(ctx, func(ctx context.Context, tx store.Transaction) error {
r, err := tx.GetRecord(gr.GetID())
if err != nil {
return err
}
g := r.(*store.LegacyGHSARecord)
g.TriageState = store.TriageStateHasVuln
return tx.SetRecord(g)
}); err != nil {
return err
}
// Do not create an issue.
continue
}
ref, err := createIssue(ctx, gr, client, pc, rc)
if err != nil {
return err
}
// Update the LegacyGHSARecord in the DB with issue information.
err = st.RunTransaction(ctx, func(ctx context.Context, tx store.Transaction) error {
r, err := tx.GetRecord(gr.GetID())
if err != nil {
return err
}
g := r.(*store.LegacyGHSARecord)
g.TriageState = store.TriageStateIssueCreated
g.IssueReference = ref
g.IssueCreatedAt = time.Now()
return tx.SetRecord(g)
})
if err != nil {
return err
}
numCreated++
}
log.With("limit", limit).Infof(ctx, "createGHSAIssues done: %d created", numCreated)
return nil
}
func isDuplicate(sa *ghsa.SecurityAdvisory, pc *proxy.Client, rc *report.Client) bool {
r := report.New(sa, pc)
for alias := range rc.XRef(r).Aliases {
if sa.ID == alias {
return true
}
}
return false
}
func NewIssueBody(r *report.Report, desc string, rc *report.Client) (body string, err error) {
// Truncate the description if it is too long.
if len(desc) > 600 {
desc = desc[:600] + "..."
}
rs, err := r.ToString()
if err != nil {
return "", err
}
var b strings.Builder
if err := issueTemplate.Execute(&b, issueTemplateData{
SourceID: r.SourceMeta.ID,
AdvisoryLink: idstr.AdvisoryLink(r.SourceMeta.ID),
Description: desc,
Xrefs: xref(r, rc),
Report: r,
ReportStr: rs,
Pre: "```",
}); err != nil {
return "", err
}
return b.String(), nil
}
func createIssue(ctx context.Context, r store.Record, client *issues.Client, pc *proxy.Client, rc *report.Client) (ref string, err error) {
id := r.GetID()
defer derrors.Wrap(&err, "createIssue(%s)", id)
if r.GetIssueReference() != "" || !r.GetIssueCreatedAt().IsZero() {
log.With(
"ID", id,
"IssueReference", r.GetIssueReference(),
"IssueCreatedAt", r.GetIssueCreatedAt(),
).Errorf(ctx, "%s: triage state is NeedsIssue but issue field(s) non-zero; skipping", id)
return "", nil
}
src := r.GetSource()
if src == nil || reflect.ValueOf(src).IsNil() {
log.With("ID", id).Errorf(ctx, "%s: triage state is NeedsIssue but source record is nil; skipping: %v", id, err)
return "", nil
}
rep := report.New(src, pc,
report.WithModulePath(r.GetUnit()))
body, err := NewIssueBody(rep, r.GetDescription(), rc)
if err != nil {
log.With("ID", id).Errorf(ctx, "%s: triage state is NeedsIssue but could not generate body; skipping: %v", id, err)
return "", nil
}
labels := []string{"NeedsTriage"}
yrLabel := yearLabel(r.GetID())
if yrLabel != "" {
labels = append(labels, yrLabel)
}
// Create the issue.
iss := &issues.Issue{
Title: fmt.Sprintf("x/vulndb: potential Go vuln in %s: %s", r.GetUnit(), r.GetID()),
Body: body,
Labels: labels,
}
if err := issueRateLimiter.Wait(ctx); err != nil {
return "", err
}
num, err := client.CreateIssue(ctx, iss)
if err != nil {
return "", fmt.Errorf("creating issue for %s: %w", id, err)
}
// If we crashed here, we would have filed an issue without recording
// that fact in the DB. That can lead to duplicate issues, but nothing
// worse (we won't miss a CVE).
// TODO(https://go.dev/issue/49733): look for the issue title to avoid duplications.
ref = client.Reference(num)
log.With("ID", id).Infof(ctx, "created issue %s for %s", ref, id)
return ref, nil
}
func yearLabel(cve string) string {
if !strings.HasPrefix(cve, "CVE-") {
return ""
}
parts := strings.Split(cve, "-")
if len(parts) != 3 {
return ""
}
year, err := strconv.Atoi(parts[1])
if err != nil {
return ""
}
if year > 2019 {
return fmt.Sprintf("cve-year-%s", parts[1])
}
return "cve-year-2019-and-earlier"
}
type issueTemplateData struct {
*report.Report
SourceID string
AdvisoryLink string
Description string
Xrefs string
ReportStr string
Pre string // markdown string for a <pre> block
}
var issueTemplate = template.Must(template.New("issue").Parse(`Advisory [{{.SourceID}}]({{.AdvisoryLink}}) references a vulnerability in the following Go modules:
| Module |
| - |{{range .Modules}}
| [{{.Module}}](https://pkg.go.dev/{{.Module}}) |{{end}}
Description:
{{.Description}}
References:{{range .References}}
- {{.Type}}: {{.URL}}{{end}}
{{.Xrefs}}
See [doc/quickstart.md](https://github.com/golang/vulndb/blob/master/doc/quickstart.md) for instructions on how to triage this report.
{{if (and .Pre .ReportStr) -}}
{{.Pre}}
{{.ReportStr}}
{{.Pre}}
{{- end}}`))
|
worker
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/worker/util.go
|
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package worker
import (
"encoding/json"
"github.com/go-git/go-git/v5/plumbing/object"
"golang.org/x/vulndb/internal/cve4"
"golang.org/x/vulndb/internal/derrors"
)
// ReadCVEAtPath reads file at path in commit, and JSON-decodes it into a CVE.
func ReadCVEAtPath(commit *object.Commit, path string) (_ *cve4.CVE, blobHash string, err error) {
defer derrors.Wrap(&err, "readCVEAtPath(%q)", path)
file, err := commit.File(path)
if err != nil {
return nil, "", err
}
var cve cve4.CVE
r, err := file.Reader()
if err != nil {
return nil, "", err
}
if err := json.NewDecoder(r).Decode(&cve); err != nil {
return nil, "", err
}
return &cve, file.Hash.String(), nil
}
|
worker
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/worker/README.md
|
# Go Vulnerability Worker
The vuln worker triages incoming security advisories and scans selected modules
for vulnerabilities.
The Go security team runs the worker on Google Cloud Platform's Cloud Run
product. See the repo's `terraform` directory for more on the deployment setup.
The main program for the worker, in the repo's `cmd/worker` directory, can also
be used as a command-line tool for one-off executions of some of the server's
actions.
## Browsing the worker
Accessing the worker server's home page from a browser requires authentication.
We recommend
[cloud-run-proxy](https://github.com/GoogleCloudPlatform/cloud-run-proxy) for
painless browsing. Install it with
```
go install github.com/GoogleCloudPlatform/cloud-run-proxy@latest
```
Run it from the repo root with
```
./devtools/proxy_worker.sh prod
```
|
worker
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/worker/server_test.go
|
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// The android builder doesn't copy the static directory (or anything but testdata).
//go:build !android && go1.17
// +build !android,go1.17
package worker
import (
"testing"
"github.com/google/safehtml/template"
"github.com/jba/templatecheck"
)
func TestTemplates(t *testing.T) {
// Check parsed templates.
staticPath := template.TrustedSourceFromConstant("static")
index, err := parseTemplate(staticPath, template.TrustedSourceFromConstant("index.tmpl"))
if err != nil {
t.Fatal(err)
}
if err := templatecheck.CheckSafe(index, indexPage{}); err != nil {
t.Error(err)
}
}
|
worker
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/worker/server.go
|
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package worker
import (
"bytes"
"context"
"errors"
"fmt"
"io"
"net/http"
"os"
"path/filepath"
"runtime/debug"
"strconv"
"strings"
"sync/atomic"
"time"
"cloud.google.com/go/errorreporting"
"github.com/google/safehtml/template"
"github.com/jba/metrics"
"golang.org/x/sync/errgroup"
"golang.org/x/vulndb/internal/cvelistrepo"
"golang.org/x/vulndb/internal/derrors"
"golang.org/x/vulndb/internal/ghsa"
"golang.org/x/vulndb/internal/gitrepo"
"golang.org/x/vulndb/internal/issues"
"golang.org/x/vulndb/internal/observe"
"golang.org/x/vulndb/internal/pkgsite"
"golang.org/x/vulndb/internal/proxy"
"golang.org/x/vulndb/internal/report"
"golang.org/x/vulndb/internal/worker/log"
"golang.org/x/vulndb/internal/worker/store"
)
const (
pkgsiteURL = "https://pkg.go.dev"
serverName = "vulndb-worker"
)
var staticPath = template.TrustedSourceFromConstant("internal/worker/static")
type Server struct {
cfg Config
indexTemplate *template.Template
issueClient *issues.Client
ghsaClient *ghsa.Client
proxyClient *proxy.Client
reportClient *report.Client
observer *observe.Observer
}
func NewServer(ctx context.Context, cfg Config) (_ *Server, err error) {
defer derrors.Wrap(&err, "NewServer(%q)", cfg.Namespace)
s := &Server{cfg: cfg}
s.observer, err = observe.NewObserver(ctx, cfg.Project, serverName)
if err != nil {
return nil, err
}
if cfg.UseErrorReporting {
reportingClient, err := errorreporting.NewClient(ctx, cfg.Project, errorreporting.Config{
ServiceName: serviceID,
OnError: func(err error) {
log.Errorf(ctx, "Error reporting failed: %v", err)
},
})
if err != nil {
return nil, err
}
derrors.SetReportingClient(reportingClient)
}
s.ghsaClient = ghsa.NewClient(ctx, cfg.GitHubAccessToken)
if cfg.IssueRepo != "" {
owner, repoName, err := gitrepo.ParseGitHubRepo(cfg.IssueRepo)
if err != nil {
return nil, err
}
s.issueClient = issues.NewClient(ctx, &issues.Config{
Owner: owner,
Repo: repoName,
Token: cfg.GitHubAccessToken,
})
log.Infof(ctx, "issue creation enabled for repo %s", cfg.IssueRepo)
} else {
log.Infof(ctx, "issue creation disabled")
}
s.proxyClient = proxy.NewDefaultClient()
rc, err := report.NewDefaultClient(ctx)
if err != nil {
return nil, err
}
s.reportClient = rc
s.indexTemplate, err = parseTemplate(staticPath, template.TrustedSourceFromConstant("index.tmpl"))
if err != nil {
return nil, err
}
s.handle(ctx, "/", s.indexPage)
http.Handle("/static/", http.StripPrefix("/static/", http.FileServer(http.Dir(staticPath.String()))))
s.handle(ctx, "/favicon.ico", func(w http.ResponseWriter, r *http.Request) error {
http.ServeFile(w, r, filepath.Join(staticPath.String(), "favicon.ico"))
return nil
})
// update: Update the DB from the cvelist repo head and the Github Security
// Advisories API and decide which CVEs and GHSAs need issues.
s.handle(ctx, "/update", s.handleUpdate)
// issues: File issues on GitHub for CVEs and GHSAs that need them.
s.handle(ctx, "/issues", s.handleIssues)
// update-and-issues: do update followed by issues.
s.handle(ctx, "/update-and-issues", s.handleUpdateAndIssues)
return s, nil
}
func (s *Server) handle(_ context.Context, pattern string, hfunc func(w http.ResponseWriter, r *http.Request) error) {
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
start := time.Now()
ctx := r.Context()
log.With("httpRequest", r).Infof(ctx, "starting %s", r.URL.Path)
w2 := &responseWriter{ResponseWriter: w}
if err := hfunc(w2, r); err != nil {
s.serveError(ctx, w2, r, err)
}
log.With(
"latency", time.Since(start),
"status", translateStatus(w2.status)).
Infof(ctx, "finished %s", r.URL.Path)
})
http.Handle(pattern, s.observer.Observe(handler))
}
type serverError struct {
status int // HTTP status code
err error // wrapped error
}
func (s *serverError) Error() string {
return fmt.Sprintf("%d (%s): %v", s.status, http.StatusText(s.status), s.err)
}
func (s *Server) serveError(ctx context.Context, w http.ResponseWriter, _ *http.Request, err error) {
serr, ok := err.(*serverError)
if !ok {
serr = &serverError{status: http.StatusInternalServerError, err: err}
}
if serr.status == http.StatusInternalServerError {
log.Errorf(ctx, serr.err.Error())
} else {
log.Errorf(ctx, "returning %d (%s) for error %v", serr.status, http.StatusText(serr.status), err)
}
http.Error(w, serr.err.Error(), serr.status)
}
type responseWriter struct {
http.ResponseWriter
status int
}
func (rw *responseWriter) WriteHeader(code int) {
rw.status = code
rw.ResponseWriter.WriteHeader(code)
}
func translateStatus(code int) int64 {
if code == 0 {
return http.StatusOK
}
return int64(code)
}
// Parse a template.
func parseTemplate(staticPath, filename template.TrustedSource) (*template.Template, error) {
if staticPath.String() == "" {
return nil, nil
}
templatePath := template.TrustedSourceJoin(staticPath, filename)
return template.New(filename.String()).Funcs(template.FuncMap{
"timefmt": FormatTime,
"commasep": func(s []string) string { return strings.Join(s, ", ") },
}).ParseFilesFromTrustedSources(templatePath)
}
var locNewYork *time.Location
func init() {
var err error
locNewYork, err = time.LoadLocation("America/New_York")
if err != nil {
log.Errorf(context.Background(), "time.LoadLocation: %v", err)
os.Exit(1)
}
}
func FormatTime(t time.Time) string {
if t.IsZero() {
return "-"
}
return t.In(locNewYork).Format("2006-01-02 15:04:05")
}
func renderPage(ctx context.Context, w http.ResponseWriter, page interface{}, tmpl *template.Template) (err error) {
defer derrors.Wrap(&err, "renderPage")
var buf bytes.Buffer
if err := tmpl.Execute(&buf, page); err != nil {
return err
}
if _, err := io.Copy(w, &buf); err != nil {
log.Errorf(ctx, "copying buffer to ResponseWriter: %v", err)
return err
}
return nil
}
type indexPage struct {
BuildInfo string
CVEListRepoURL string
Namespace string
Updates []*store.CommitUpdateRecord
CVEsNeedingIssue []*store.CVE4Record
CVEsUpdatedSince []*store.CVE4Record
}
func (s *Server) indexPage(w http.ResponseWriter, r *http.Request) error {
var page = indexPage{
CVEListRepoURL: cvelistrepo.URLv4,
Namespace: s.cfg.Namespace,
}
buildInfo, ok := debug.ReadBuildInfo()
if !ok {
page.BuildInfo = "(no build information)"
} else {
commit := "unknown"
modified := false
for _, bs := range buildInfo.Settings {
switch bs.Key {
case "vcs.revision":
commit = bs.Value
case "vcs.modified":
modified = (bs.Value == "true")
}
}
page.BuildInfo = fmt.Sprintf("Commit %s", commit)
if modified {
page.BuildInfo += " (dirty)"
}
}
g, ctx := errgroup.WithContext(r.Context())
g.Go(func() error {
var err error
page.Updates, err = s.cfg.Store.ListCommitUpdateRecords(ctx, 10)
return err
})
g.Go(func() error {
var err error
page.CVEsNeedingIssue, err = s.cfg.Store.ListCVE4RecordsWithTriageState(ctx, store.TriageStateNeedsIssue)
return err
})
g.Go(func() error {
var err error
page.CVEsUpdatedSince, err = s.cfg.Store.ListCVE4RecordsWithTriageState(ctx, store.TriageStateUpdatedSinceIssueCreation)
return err
})
if err := g.Wait(); err != nil {
return err
}
return renderPage(r.Context(), w, page, s.indexTemplate)
}
type UpdateOutcome struct {
Success bool
}
var updateCounters = metrics.NewCounterGroup[int64, UpdateOutcome]("updates", "calls to handleUpdate")
func (s *Server) handleUpdate(w http.ResponseWriter, r *http.Request) error {
err := s.doUpdate(r)
if err == nil {
fmt.Fprintf(w, "Update succeeded.\n")
}
return err
}
func (s *Server) doUpdate(r *http.Request) (err error) {
defer func() {
success := err == nil
updateCounters.At(UpdateOutcome{success}).Add(1)
log.Debugf(r.Context(), "recorded one /update operation in counter (success=%t)", success)
}()
if r.Method != http.MethodPost {
return &serverError{
status: http.StatusMethodNotAllowed,
err: fmt.Errorf("%s required", http.MethodPost),
}
}
force := (r.FormValue("force") == "true")
rc, err := report.NewDefaultClient(r.Context())
if err != nil {
return err
}
err = UpdateCVEsAtCommit(r.Context(), cvelistrepo.URLv4, "HEAD", s.cfg.Store, pkgsite.Default(), rc, force)
if cerr := new(CheckUpdateError); errors.As(err, &cerr) {
return &serverError{
status: http.StatusPreconditionFailed,
err: fmt.Errorf("%w; use /update?force=true to override", cerr),
}
}
if err != nil {
return err
}
listSAs := func(ctx context.Context, since time.Time) ([]*ghsa.SecurityAdvisory, error) {
return s.ghsaClient.List(ctx, since)
}
_, err = UpdateGHSAs(r.Context(), listSAs, s.cfg.Store)
return err
}
func (s *Server) handleIssues(w http.ResponseWriter, r *http.Request) error {
if r.Method != http.MethodPost {
return &serverError{
status: http.StatusMethodNotAllowed,
err: fmt.Errorf("%s required", http.MethodPost),
}
}
if s.issueClient == nil {
return &serverError{
status: http.StatusPreconditionFailed,
err: errors.New("issue creation disabled"),
}
}
// Unless explicitly asked to, don't create more than a few issues.
limit := 10
if sl := r.FormValue("limit"); sl != "" {
var err error
limit, err = strconv.Atoi(sl)
if err != nil {
return &serverError{
status: http.StatusBadRequest,
err: fmt.Errorf("parsing limit query param: %w", err),
}
}
}
log.With("limit", limit).Infof(r.Context(), "creating issues")
return CreateIssues(r.Context(), s.cfg.Store, s.issueClient, s.proxyClient, s.reportClient, limit)
}
var updateAndIssuesInProgress atomic.Value
func init() {
updateAndIssuesInProgress.Store(false)
}
func (s *Server) handleUpdateAndIssues(w http.ResponseWriter, r *http.Request) error {
if updateAndIssuesInProgress.Load().(bool) {
return &serverError{
status: http.StatusPreconditionFailed,
err: errors.New("update-and-issues already in progress"),
}
}
updateAndIssuesInProgress.Store(true)
defer func() { updateAndIssuesInProgress.Store(false) }()
if err := s.doUpdate(r); err != nil {
return err
}
return s.handleIssues(w, r)
}
|
worker
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/worker/gen_false_positives.go
|
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Program to generate false-positive CVE records.
// This requires a local copy of the cvelist repo:
// git clone https://github.com/CVEProject/cvelist
//
// You may also have to "go get github.com/jba/printsrc",
// because go mod tidy removes it.
//
// Then run this program with the path to the repo as argument.
//go:build ignore
// +build ignore
package main
import (
"bytes"
"context"
"fmt"
"go/format"
"log"
"os"
"strings"
"text/template"
"github.com/go-git/go-git/v5"
"github.com/go-git/go-git/v5/plumbing"
"github.com/jba/printsrc"
"golang.org/x/vulndb/internal/gitrepo"
"golang.org/x/vulndb/internal/worker"
"golang.org/x/vulndb/internal/worker/store"
)
// The CVEs marked "false-positive" in triaged-cve-list and elswhere, including
// both true false positives and CVEs that are covered by a Go vulndb report.
var falsePositiveIDs = []struct {
source string
commit string
ids []string
}{
{
source: "triaged-cve-list file in this repo",
// Last commit to github.com/CVEProject/cvelist on April 12, 2021.
// The triaged-cve-list file was last edited the next day.
commit: "17294f1a2af61a2a2df52ac89cbd7c516f0c4e6a",
ids: []string{
"CVE-2013-2124", "CVE-2013-2233", "CVE-2014-0177", "CVE-2014-3498", "CVE-2014-3971",
"CVE-2014-4657", "CVE-2014-4658", "CVE-2014-4659", "CVE-2014-4660", "CVE-2014-4678",
"CVE-2014-4966", "CVE-2014-4967", "CVE-2014-8178", "CVE-2014-8179", "CVE-2014-8682",
"CVE-2014-9938", "CVE-2015-5237", "CVE-2015-5250", "CVE-2015-6240", "CVE-2015-7082",
"CVE-2015-7528", "CVE-2015-7545", "CVE-2015-7561", "CVE-2015-8222", "CVE-2015-8945",
"CVE-2015-9258", "CVE-2015-9259", "CVE-2015-9282", "CVE-2016-0216", "CVE-2016-1133",
"CVE-2016-1544", "CVE-2016-1587", "CVE-2016-1905", "CVE-2016-1906", "CVE-2016-2160",
"CVE-2016-2183", "CVE-2016-2315", "CVE-2016-2324", "CVE-2016-3096", "CVE-2016-3711",
"CVE-2016-4817", "CVE-2016-4864", "CVE-2016-6349", "CVE-2016-6494", "CVE-2016-7063",
"CVE-2016-7064", "CVE-2016-7075", "CVE-2016-7569", "CVE-2016-7835", "CVE-2016-8579",
"CVE-2016-9274", "CVE-2016-9962", "CVE-2017-1000056", "CVE-2017-1000069", "CVE-2017-1000070",
"CVE-2017-1000420", "CVE-2017-1000459", "CVE-2017-1000492", "CVE-2017-1002100", "CVE-2017-1002101",
"CVE-2017-1002102", "CVE-2017-10868", "CVE-2017-10869", "CVE-2017-10872", "CVE-2017-10908",
"CVE-2017-14178", "CVE-2017-14623", "CVE-2017-14992", "CVE-2017-15104", "CVE-2017-16539",
"CVE-2017-17697", "CVE-2017-2428", "CVE-2017-7297", "CVE-2017-7481", "CVE-2017-7550",
"CVE-2017-7860", "CVE-2017-7861", "CVE-2017-8359", "CVE-2017-9431", "CVE-2018-0608",
"CVE-2018-1000400", "CVE-2018-1000538", "CVE-2018-1000803", "CVE-2018-1000816", "CVE-2018-1002100",
"CVE-2018-1002101", "CVE-2018-1002102", "CVE-2018-1002103", "CVE-2018-1002104", "CVE-2018-1002105",
"CVE-2018-1002207", "CVE-2018-10055", "CVE-2018-10856", "CVE-2018-10892", "CVE-2018-10937",
"CVE-2018-1098", "CVE-2018-1099", "CVE-2018-12099", "CVE-2018-12608", "CVE-2018-12678",
"CVE-2018-12976", "CVE-2018-14474", "CVE-2018-15178", "CVE-2018-15192", "CVE-2018-15193",
"CVE-2018-15598", "CVE-2018-15664", "CVE-2018-15747", "CVE-2018-15869", "CVE-2018-16316",
"CVE-2018-16359", "CVE-2018-16398", "CVE-2018-16409", "CVE-2018-16733", "CVE-2018-16859",
"CVE-2018-16876", "CVE-2018-17031", "CVE-2018-17456", "CVE-2018-17572", "CVE-2018-18264",
"CVE-2018-18553", "CVE-2018-18623", "CVE-2018-18624", "CVE-2018-18625", "CVE-2018-18925",
"CVE-2018-18926", "CVE-2018-19114", "CVE-2018-19148", "CVE-2018-19184", "CVE-2018-19295",
"CVE-2018-19333", "CVE-2018-19367", "CVE-2018-19466", "CVE-2018-19653", "CVE-2018-19786",
"CVE-2018-19793", "CVE-2018-20303", "CVE-2018-20421", "CVE-2018-20699", "CVE-2018-20744",
"CVE-2018-21034", "CVE-2018-21233", "CVE-2018-7575", "CVE-2018-7576", "CVE-2018-7577",
"CVE-2018-8825", "CVE-2018-9057", "CVE-2019-1000002", "CVE-2019-1002100", "CVE-2019-1002101",
"CVE-2019-1010003", "CVE-2019-1010261", "CVE-2019-1010275", "CVE-2019-1010314", "CVE-2019-10152",
"CVE-2019-10156", "CVE-2019-10165", "CVE-2019-10200", "CVE-2019-1020009", "CVE-2019-1020014",
"CVE-2019-1020015", "CVE-2019-10217", "CVE-2019-10223", "CVE-2019-10743", "CVE-2019-11043",
"CVE-2019-11228", "CVE-2019-11229", "CVE-2019-11243", "CVE-2019-11244", "CVE-2019-11245",
"CVE-2019-11246", "CVE-2019-11247", "CVE-2019-11248", "CVE-2019-11249", "CVE-2019-11251",
"CVE-2019-11252", "CVE-2019-11255", "CVE-2019-11328", "CVE-2019-11405", "CVE-2019-11471",
"CVE-2019-11502", "CVE-2019-11503", "CVE-2019-11576", "CVE-2019-11641", "CVE-2019-11881",
"CVE-2019-11938", "CVE-2019-12291", "CVE-2019-12452", "CVE-2019-12494", "CVE-2019-12618",
"CVE-2019-12995", "CVE-2019-12999", "CVE-2019-13068", "CVE-2019-13126", "CVE-2019-13139",
"CVE-2019-13915", "CVE-2019-14243", "CVE-2019-14255", "CVE-2019-14271", "CVE-2019-14544",
"CVE-2019-14846", "CVE-2019-14864", "CVE-2019-14904", "CVE-2019-14940", "CVE-2019-14993",
"CVE-2019-15043", "CVE-2019-15119", "CVE-2019-15225", "CVE-2019-15226", "CVE-2019-15562",
"CVE-2019-15716", "CVE-2019-16060", "CVE-2019-16097", "CVE-2019-16146", "CVE-2019-16214",
"CVE-2019-16355", "CVE-2019-16778", "CVE-2019-16919", "CVE-2019-18466", "CVE-2019-18657",
"CVE-2019-18801", "CVE-2019-18802", "CVE-2019-18817", "CVE-2019-18836", "CVE-2019-18838",
"CVE-2019-18923", "CVE-2019-19023", "CVE-2019-19025", "CVE-2019-19026", "CVE-2019-19029",
"CVE-2019-19316", "CVE-2019-19335", "CVE-2019-19349", "CVE-2019-19350", "CVE-2019-19724",
"CVE-2019-19922", "CVE-2019-20329", "CVE-2019-20372", "CVE-2019-20377", "CVE-2019-20894",
"CVE-2019-20933", "CVE-2019-25014", "CVE-2019-3552", "CVE-2019-3553", "CVE-2019-3558",
"CVE-2019-3559", "CVE-2019-3565", "CVE-2019-3826", "CVE-2019-3828", "CVE-2019-3841",
"CVE-2019-3990", "CVE-2019-5736", "CVE-2019-6035", "CVE-2019-8336", "CVE-2019-8400",
"CVE-2019-9547", "CVE-2019-9635", "CVE-2019-9764", "CVE-2019-9900", "CVE-2019-9901",
"CVE-2019-9946", "CVE-2020-10660", "CVE-2020-10661", "CVE-2020-10685", "CVE-2020-10691",
"CVE-2020-10696", "CVE-2020-10706", "CVE-2020-10712", "CVE-2020-10715", "CVE-2020-10749",
"CVE-2020-10750", "CVE-2020-10752", "CVE-2020-10763", "CVE-2020-10944", "CVE-2020-11008",
"CVE-2020-11012", "CVE-2020-11013", "CVE-2020-11053", "CVE-2020-11080", "CVE-2020-11091",
"CVE-2020-11110", "CVE-2020-11498", "CVE-2020-11576", "CVE-2020-11710", "CVE-2020-11767",
"CVE-2020-12118", "CVE-2020-12245", "CVE-2020-12278", "CVE-2020-12279", "CVE-2020-12283",
"CVE-2020-12458", "CVE-2020-12459", "CVE-2020-12603", "CVE-2020-12604", "CVE-2020-12605",
"CVE-2020-12757", "CVE-2020-12758", "CVE-2020-12797", "CVE-2020-13170", "CVE-2020-13223",
"CVE-2020-13246", "CVE-2020-13250", "CVE-2020-13401", "CVE-2020-13430", "CVE-2020-13449",
"CVE-2020-13450", "CVE-2020-13451", "CVE-2020-13452", "CVE-2020-13597", "CVE-2020-13788",
"CVE-2020-13794", "CVE-2020-14144", "CVE-2020-14306", "CVE-2020-14330", "CVE-2020-14332",
"CVE-2020-14958", "CVE-2020-15104", "CVE-2020-15112", "CVE-2020-15113", "CVE-2020-15114",
"CVE-2020-15115", "CVE-2020-15127", "CVE-2020-15129", "CVE-2020-15136", "CVE-2020-15157",
"CVE-2020-15184", "CVE-2020-15185", "CVE-2020-15186", "CVE-2020-15187", "CVE-2020-15190",
"CVE-2020-15191", "CVE-2020-15192", "CVE-2020-15193", "CVE-2020-15194", "CVE-2020-15195",
"CVE-2020-15196", "CVE-2020-15197", "CVE-2020-15198", "CVE-2020-15199", "CVE-2020-15200",
"CVE-2020-15201", "CVE-2020-15202", "CVE-2020-15203", "CVE-2020-15204", "CVE-2020-15205",
"CVE-2020-15206", "CVE-2020-15207", "CVE-2020-15208", "CVE-2020-15209", "CVE-2020-15210",
"CVE-2020-15211", "CVE-2020-15212", "CVE-2020-15213", "CVE-2020-15214", "CVE-2020-15223",
"CVE-2020-15233", "CVE-2020-15234", "CVE-2020-15254", "CVE-2020-15257", "CVE-2020-15265",
"CVE-2020-15266", "CVE-2020-15391", "CVE-2020-16248", "CVE-2020-16250", "CVE-2020-16251",
"CVE-2020-16844", "CVE-2020-1733", "CVE-2020-1734", "CVE-2020-1735", "CVE-2020-1736",
"CVE-2020-1737", "CVE-2020-1738", "CVE-2020-1739", "CVE-2020-1740", "CVE-2020-1746",
"CVE-2020-2023", "CVE-2020-2024", "CVE-2020-2025", "CVE-2020-2026", "CVE-2020-24263",
"CVE-2020-24264", "CVE-2020-24303", "CVE-2020-24356", "CVE-2020-24359", "CVE-2020-24707",
"CVE-2020-24708", "CVE-2020-24710", "CVE-2020-24711", "CVE-2020-24712", "CVE-2020-25017",
"CVE-2020-25018", "CVE-2020-25201", "CVE-2020-25816", "CVE-2020-25989", "CVE-2020-26222",
"CVE-2020-26240", "CVE-2020-26241", "CVE-2020-26242", "CVE-2020-26265", "CVE-2020-26266",
"CVE-2020-26267", "CVE-2020-26268", "CVE-2020-26269", "CVE-2020-26270", "CVE-2020-26271",
"CVE-2020-26276", "CVE-2020-26277", "CVE-2020-26278", "CVE-2020-26279", "CVE-2020-26283",
"CVE-2020-26284", "CVE-2020-26290", "CVE-2020-26294", "CVE-2020-26521", "CVE-2020-26892",
"CVE-2020-27151", "CVE-2020-27195", "CVE-2020-27534", "CVE-2020-27955", "CVE-2020-28053",
"CVE-2020-28348", "CVE-2020-28349", "CVE-2020-28466", "CVE-2020-28914", "CVE-2020-28924",
"CVE-2020-28991", "CVE-2020-29243", "CVE-2020-29244", "CVE-2020-29245", "CVE-2020-29510",
"CVE-2020-29511", "CVE-2020-29662", "CVE-2020-35137", "CVE-2020-35138", "CVE-2020-35177",
"CVE-2020-35453", "CVE-2020-35470", "CVE-2020-35471", "CVE-2020-36066", "CVE-2020-3996",
"CVE-2020-4037", "CVE-2020-4053", "CVE-2020-5215", "CVE-2020-5233", "CVE-2020-5260",
"CVE-2020-5300", "CVE-2020-5303", "CVE-2020-5415", "CVE-2020-6016", "CVE-2020-6017",
"CVE-2020-6018", "CVE-2020-6019", "CVE-2020-7218", "CVE-2020-7219", "CVE-2020-7220",
"CVE-2020-7665", "CVE-2020-7666", "CVE-2020-7669", "CVE-2020-7955", "CVE-2020-7956",
"CVE-2020-8551", "CVE-2020-8552", "CVE-2020-8553", "CVE-2020-8554", "CVE-2020-8555",
"CVE-2020-8557", "CVE-2020-8558", "CVE-2020-8559", "CVE-2020-8563", "CVE-2020-8566",
"CVE-2020-8569", "CVE-2020-8595", "CVE-2020-8659", "CVE-2020-8660", "CVE-2020-8661",
"CVE-2020-8663", "CVE-2020-8664", "CVE-2020-8826", "CVE-2020-8827", "CVE-2020-8828",
"CVE-2020-8843", "CVE-2020-8927", "CVE-2020-8929", "CVE-2020-9321", "CVE-2020-9329",
"CVE-2021-20198", "CVE-2021-20199", "CVE-2021-20218", "CVE-2021-20291", "CVE-2021-21271",
"CVE-2021-21284", "CVE-2021-21285", "CVE-2021-21287", "CVE-2021-21291", "CVE-2021-21296",
"CVE-2021-21300", "CVE-2021-21303", "CVE-2021-21334", "CVE-2021-21362", "CVE-2021-21363",
"CVE-2021-21364", "CVE-2021-21378", "CVE-2021-21390", "CVE-2021-21404", "CVE-2021-21411",
"CVE-2021-21432", "CVE-2021-22538", "CVE-2021-23345", "CVE-2021-23347", "CVE-2021-23351",
"CVE-2021-23357", "CVE-2021-23827", "CVE-2021-25313", "CVE-2021-25834", "CVE-2021-25835",
"CVE-2021-25836", "CVE-2021-25837", "CVE-2021-26921", "CVE-2021-26923", "CVE-2021-26924",
"CVE-2021-27098", "CVE-2021-27099", "CVE-2021-27358", "CVE-2021-27375", "CVE-2021-27935",
"CVE-2021-27940", "CVE-2021-28361", "CVE-2021-28378", "CVE-2021-28681", "CVE-2021-28954",
"CVE-2021-28955", "CVE-2021-29136", "CVE-2021-29271", "CVE-2021-29272", "CVE-2021-29417",
"CVE-2021-29651", "CVE-2021-29652", "CVE-2021-3344", "CVE-2021-3382", "CVE-2021-3391",
},
},
{
source: "internal doc of Nov 7, 2021",
commit: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
ids: []string{
"CVE-2020-27847", "CVE-2020-7731", "CVE-2020-28851", "CVE-2020-28852", "CVE-2020-10729",
"CVE-2020-10808", "CVE-2020-18032", "CVE-2020-19498", "CVE-2020-19499", "CVE-2020-23109",
"CVE-2020-27386", "CVE-2020-27387", "CVE-2020-28347", "CVE-2020-36404", "CVE-2020-36405",
"CVE-2020-7350", "CVE-2020-7351", "CVE-2020-7352", "CVE-2020-7356", "CVE-2020-7357",
"CVE-2020-7361", "CVE-2020-7373", "CVE-2020-7374", "CVE-2020-7376", "CVE-2020-7377",
"CVE-2020-7384", "CVE-2020-7385", "CVE-2021-20178", "CVE-2021-20228", "CVE-2021-20286",
"CVE-2021-21414", "CVE-2021-21428", "CVE-2021-21429", "CVE-2021-21430", "CVE-2021-24028",
"CVE-2021-28682", "CVE-2021-28683", "CVE-2021-29133", "CVE-2021-29258", "CVE-2021-29492",
"CVE-2021-32777", "CVE-2021-32778", "CVE-2021-32779", "CVE-2021-32780", "CVE-2021-32781",
"CVE-2021-32810", "CVE-2021-36753", "CVE-2021-36979", "CVE-2021-39204", "CVE-2021-39206",
"CVE-2021-40330", "CVE-2021-42840", "CVE-2021-29923", "CVE-2020-13310", "CVE-2020-13327",
"CVE-2020-13347", "CVE-2020-13353", "CVE-2020-13845", "CVE-2020-13846", "CVE-2020-13847",
"CVE-2020-14160", "CVE-2020-14161", "CVE-2020-15167", "CVE-2020-15229", "CVE-2020-24130",
"CVE-2020-25039", "CVE-2020-25040", "CVE-2020-26213", "CVE-2020-27519", "CVE-2020-28366",
"CVE-2020-28367", "CVE-2020-8561", "CVE-2021-21405", "CVE-2021-22171", "CVE-2021-23135",
"CVE-2021-23365", "CVE-2021-25735", "CVE-2021-25737", "CVE-2021-25740", "CVE-2021-25741",
"CVE-2021-25742", "CVE-2021-25938", "CVE-2021-28484", "CVE-2021-29453", "CVE-2021-29456",
"CVE-2021-29499", "CVE-2021-29622", "CVE-2021-30465", "CVE-2021-30476", "CVE-2021-31232",
"CVE-2021-31856", "CVE-2021-32574", "CVE-2021-32635", "CVE-2021-32637", "CVE-2021-32690",
"CVE-2021-32699", "CVE-2021-32701", "CVE-2021-32753", "CVE-2021-32760", "CVE-2021-32783",
"CVE-2021-32787", "CVE-2021-32813", "CVE-2021-32825", "CVE-2021-33359", "CVE-2021-33496",
"CVE-2021-33497", "CVE-2021-33708", "CVE-2021-34824", "CVE-2021-35206", "CVE-2021-36156",
"CVE-2021-36157", "CVE-2021-3619", "CVE-2021-36213", "CVE-2021-36371", "CVE-2021-37794",
"CVE-2021-37914", "CVE-2021-38197", "CVE-2021-38599", "CVE-2021-39155", "CVE-2021-39156",
"CVE-2021-39162", "CVE-2021-39226", "CVE-2021-39391", "CVE-2021-41087", "CVE-2021-41088",
"CVE-2021-41089", "CVE-2021-41091", "CVE-2021-41092", "CVE-2021-41103", "CVE-2021-41137",
"CVE-2021-41174", "CVE-2021-41232", "CVE-2021-41323", "CVE-2021-41324", "CVE-2021-41325",
"CVE-2021-41393", "CVE-2021-41394", "CVE-2021-41395", "CVE-2021-41593", "CVE-2021-42650",
"CVE-2020-22741", "CVE-2020-26772", "CVE-2021-36605", "CVE-2021-29512", "CVE-2021-29513",
"CVE-2021-29514", "CVE-2021-29515", "CVE-2021-29516", "CVE-2021-29517", "CVE-2021-29518",
"CVE-2021-29519", "CVE-2021-29520", "CVE-2021-29521", "CVE-2021-29522", "CVE-2021-29523",
"CVE-2021-29524", "CVE-2021-29525", "CVE-2021-29526", "CVE-2021-29527", "CVE-2021-29528",
"CVE-2021-29529", "CVE-2021-29530", "CVE-2021-29531", "CVE-2021-29532", "CVE-2021-29533",
"CVE-2021-29534", "CVE-2021-29535", "CVE-2021-29536", "CVE-2021-29537", "CVE-2021-29538",
"CVE-2021-29539", "CVE-2021-29540", "CVE-2021-29541", "CVE-2021-29542", "CVE-2021-29543",
"CVE-2021-29544", "CVE-2021-29545", "CVE-2021-29546", "CVE-2021-29547", "CVE-2021-29548",
"CVE-2021-29549", "CVE-2021-29550", "CVE-2021-29551", "CVE-2021-29552", "CVE-2021-29553",
"CVE-2021-29554", "CVE-2021-29555", "CVE-2021-29556", "CVE-2021-29557", "CVE-2021-29558",
"CVE-2021-29559", "CVE-2021-29560", "CVE-2021-29561", "CVE-2021-29562", "CVE-2021-29563",
"CVE-2021-29564", "CVE-2021-29565", "CVE-2021-29566", "CVE-2021-29567", "CVE-2021-29568",
"CVE-2021-29569", "CVE-2021-29570", "CVE-2021-29571", "CVE-2021-29572", "CVE-2021-29573",
"CVE-2021-29574", "CVE-2021-29575", "CVE-2021-29576", "CVE-2021-29577", "CVE-2021-29578",
"CVE-2021-29579", "CVE-2021-29580", "CVE-2021-29581", "CVE-2021-29582", "CVE-2021-29583",
"CVE-2021-29584", "CVE-2021-29585", "CVE-2021-29586", "CVE-2021-29587", "CVE-2021-29588",
"CVE-2021-29589", "CVE-2021-29590", "CVE-2021-29591", "CVE-2021-29592", "CVE-2021-29593",
"CVE-2021-29594", "CVE-2021-29595", "CVE-2021-29596", "CVE-2021-29597", "CVE-2021-29598",
"CVE-2021-29599", "CVE-2021-29600", "CVE-2021-29601", "CVE-2021-29602", "CVE-2021-29603",
"CVE-2021-29604", "CVE-2021-29605", "CVE-2021-29606", "CVE-2021-29607", "CVE-2021-29608",
"CVE-2021-29609", "CVE-2021-29610", "CVE-2021-29611", "CVE-2021-29612", "CVE-2021-29613",
"CVE-2021-29614", "CVE-2021-29615", "CVE-2021-29616", "CVE-2021-29617", "CVE-2021-29618",
"CVE-2021-29619", "CVE-2021-35958", "CVE-2021-37635", "CVE-2021-37636", "CVE-2021-37637",
"CVE-2021-37638", "CVE-2021-37639", "CVE-2021-37640", "CVE-2021-37641", "CVE-2021-37642",
"CVE-2021-37643", "CVE-2021-37644", "CVE-2021-37645", "CVE-2021-37646", "CVE-2021-37647",
"CVE-2021-37648", "CVE-2021-37649", "CVE-2021-37650", "CVE-2021-37651", "CVE-2021-37652",
"CVE-2021-37653", "CVE-2021-37654", "CVE-2021-37655", "CVE-2021-37656", "CVE-2021-37657",
"CVE-2021-37658", "CVE-2021-37659", "CVE-2021-37660", "CVE-2021-37661", "CVE-2021-37662",
"CVE-2021-37663", "CVE-2021-37664", "CVE-2021-37665", "CVE-2021-37666", "CVE-2021-37667",
"CVE-2021-37668", "CVE-2021-37669", "CVE-2021-37670", "CVE-2021-37671", "CVE-2021-37672",
"CVE-2021-37673", "CVE-2021-37674", "CVE-2021-37675", "CVE-2021-37676", "CVE-2021-37677",
"CVE-2021-37678", "CVE-2021-37679", "CVE-2021-37680", "CVE-2021-37681", "CVE-2021-37682",
"CVE-2021-37683", "CVE-2021-37684", "CVE-2021-37685", "CVE-2021-37686", "CVE-2021-37687",
"CVE-2021-37688", "CVE-2021-37689", "CVE-2021-37690", "CVE-2021-37691", "CVE-2021-37692",
"CVE-2021-41195", "CVE-2021-41196", "CVE-2021-41197", "CVE-2021-41198", "CVE-2021-41199",
"CVE-2021-41200", "CVE-2021-41201", "CVE-2021-41202", "CVE-2021-41203", "CVE-2021-41204",
"CVE-2021-41205", "CVE-2021-41206", "CVE-2021-41207", "CVE-2021-41208", "CVE-2021-41209",
"CVE-2021-41210", "CVE-2021-41211", "CVE-2021-41212", "CVE-2021-41213", "CVE-2021-41214",
"CVE-2021-41215", "CVE-2021-41216", "CVE-2021-41217", "CVE-2021-41218", "CVE-2021-41219",
"CVE-2021-41220", "CVE-2021-41221", "CVE-2021-41222", "CVE-2021-41223", "CVE-2021-41224",
"CVE-2021-41225", "CVE-2021-41226", "CVE-2021-41227", "CVE-2021-41228",
},
},
{
source: "additional metasploit-framework issues",
commit: "f2e420732374f84baa2c4a5b7a84be9ff7e46f88",
ids: []string{
"CVE-2013-2028", "CVE-2013-4450", "CVE-2014-4877", "CVE-2014-5445", "CVE-2014-6037",
"CVE-2014-6287", "CVE-2014-7189", "CVE-2014-9566", "CVE-2015-0779", "CVE-2016-7552",
"CVE-2017-14705", "CVE-2017-14706", "CVE-2017-14730", "CVE-2017-15041", "CVE-2017-15042",
"CVE-2017-15701", "CVE-2017-15702", "CVE-2017-16762", "CVE-2017-17411", "CVE-2017-17560",
"CVE-2017-18044", "CVE-2017-5677", "CVE-2017-7269",
},
},
}
// IDs that are covered by a Go vuln report, and the report ID.
var coveredIDs = map[string]string{
"CVE-2020-15112": "GO-2020-0005",
"CVE-2020-29243": "GO-2021-0097",
"CVE-2020-29244": "GO-2021-0097",
"CVE-2020-29245": "GO-2021-0097",
}
func main() {
if len(os.Args) < 2 {
log.Fatal("usage: gen_false_positives PATH_TO_LOCAL_REPO")
}
if err := run(os.Args[1]); err != nil {
log.Fatal(err)
}
}
func run(repoPath string) error {
printer := printsrc.NewPrinter("golang.org/x/vulndb/internal/worker")
tmpl, err := template.New("").
Funcs(template.FuncMap{"src": printer.Sprint}).
Parse(fileTemplate)
if err != nil {
return err
}
repo, err := gitrepo.Open(context.Background(), repoPath)
if err != nil {
return err
}
crs, err := buildCVE4Records(repo)
if err != nil {
return err
}
var buf bytes.Buffer
if err := tmpl.Execute(&buf, crs); err != nil {
return err
}
src, err := format.Source(buf.Bytes())
if err != nil {
return err
}
return os.WriteFile("false_positive_records.gen.go", src, 0644)
}
func buildCVE4Records(repo *git.Repository) ([]*store.CVE4Record, error) {
var crs []*store.CVE4Record
for _, spec := range falsePositiveIDs {
commit, err := repo.CommitObject(plumbing.NewHash(spec.commit))
if err != nil {
return nil, fmt.Errorf("commit %s: %w", spec.commit, err)
}
for _, id := range spec.ids {
path := idToPath(id)
cve, blobHash, err := worker.ReadCVEAtPath(commit, path)
if err != nil {
return nil, fmt.Errorf("%s at %s: %w", path, spec.commit, err)
}
if cve.ID != id {
return nil, fmt.Errorf("ID at path %s is %s", path, cve.ID)
}
cr := store.NewCVE4Record(cve, path, blobHash, commit)
cr.CommitHash = spec.commit
if reportID := coveredIDs[id]; reportID != "" {
cr.TriageState = store.TriageStateHasVuln
cr.TriageStateReason = reportID
} else {
cr.TriageState = store.TriageStateFalsePositive
for _, r := range cve.References.Data {
if r.URL != "" {
cr.ReferenceURLs = append(cr.ReferenceURLs, r.URL)
}
}
}
crs = append(crs, cr)
}
}
return crs, nil
}
func idToPath(id string) string {
words := strings.Split(id, "-")
year := words[1]
num := []byte(words[2])
// Last three digits of number replaced by 'x'.
for i := 1; i <= 3; i++ {
num[len(num)-i] = 'x'
}
for len(num) < 4 {
num = append([]byte{'0'}, num...)
}
return fmt.Sprintf("%s/%s/%s.json", year, num, id)
}
var fileTemplate = `
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Code generated by gen_false_positives.go; DO NOT EDIT.
package worker
import (
"time"
"golang.org/x/vulndb/internal/worker/store"
)
var falsePositives = {{. | src}}
`
|
worker
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/worker/worker_test.go
|
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
//go:build go1.17
// +build go1.17
package worker
import (
"context"
"flag"
"fmt"
"math"
"net/http"
"sort"
"strings"
"testing"
"time"
"github.com/google/go-cmp/cmp"
"github.com/google/go-cmp/cmp/cmpopts"
"golang.org/x/vulndb/internal/cve4"
"golang.org/x/vulndb/internal/ghsa"
"golang.org/x/vulndb/internal/gitrepo"
"golang.org/x/vulndb/internal/issues"
"golang.org/x/vulndb/internal/issues/githubtest"
"golang.org/x/vulndb/internal/proxy"
"golang.org/x/vulndb/internal/report"
"golang.org/x/vulndb/internal/worker/store"
)
const testRepoPath = "testdata/basic.txtar"
var (
realProxy = flag.Bool("proxy", false, "if true, contact the real module proxy and update expected responses")
testTime = time.Date(1999, 1, 1, 0, 0, 0, 0, time.UTC)
)
func TestCheckUpdate(t *testing.T) {
ctx := context.Background()
tm := time.Date(2021, 1, 26, 0, 0, 0, 0, time.Local)
repo, err := gitrepo.ReadTxtarRepo(testRepoPath, tm)
if err != nil {
t.Fatal(err)
}
for _, test := range []struct {
latestUpdate *store.CommitUpdateRecord
want string // non-empty => substring of error message
}{
// no latest update, no problem
{nil, ""},
// latest update finished and commit is earlier; no problem
{
&store.CommitUpdateRecord{
EndedAt: time.Now(),
CommitHash: "abc",
CommitTime: tm.Add(-time.Hour),
},
"",
},
// latest update was recent and didn't finish
{
&store.CommitUpdateRecord{
StartedAt: time.Now().Add(-90 * time.Minute),
CommitHash: "abc",
CommitTime: tm.Add(-time.Hour),
},
"not finish",
},
// latest update finished on a later commit
{
&store.CommitUpdateRecord{
EndedAt: time.Now(),
CommitHash: "abc",
CommitTime: tm.Add(time.Hour),
},
"before",
},
} {
mstore := store.NewMemStore()
if err := updateFalsePositives(ctx, mstore); err != nil {
t.Fatal(err)
}
if test.latestUpdate != nil {
if err := mstore.CreateCommitUpdateRecord(ctx, test.latestUpdate); err != nil {
t.Fatal(err)
}
}
got := checkCVEUpdate(ctx, headCommit(t, repo), mstore)
if got == nil && test.want != "" {
t.Errorf("%+v:\ngot no error, wanted %q", test.latestUpdate, test.want)
} else if got != nil && !strings.Contains(got.Error(), test.want) {
t.Errorf("%+v:\ngot '%s', does not contain %q", test.latestUpdate, got, test.want)
}
}
}
var (
ghsa1, ghsa2, ghsa3, ghsa4, ghsa5, ghsa6 = "GHSA-xxxx-yyyy-1111", "GHSA-xxxx-yyyy-2222", "GHSA-xxxx-yyyy-3333", "GHSA-xxxx-yyyy-4444", "GHSA-xxxx-yyyy-5555", "GHSA-xxxx-yyyy-6666"
)
func TestCreateIssues(t *testing.T) {
ctx := context.Background()
mstore := store.NewMemStore()
ic, mux := githubtest.Setup(ctx, t, &issues.Config{
Owner: githubtest.TestOwner,
Repo: githubtest.TestRepo,
Token: githubtest.TestToken,
})
mux.HandleFunc(fmt.Sprintf("/repos/%s/%s/issues", githubtest.TestOwner, githubtest.TestRepo), func(w http.ResponseWriter, r *http.Request) {
switch r.Method {
case http.MethodGet:
fmt.Fprintf(w, `[{"number":%d},{"number":%d}]`, 1, 2)
case http.MethodPost:
fmt.Fprintf(w, `{"number":%d}`, 1)
}
})
ctime := time.Date(2020, 1, 2, 0, 0, 0, 0, time.UTC)
pc, err := proxy.NewTestClient(t, *realProxy)
if err != nil {
t.Fatal(err)
}
crs := []*store.CVE4Record{
{
ID: "CVE-2000-0001",
BlobHash: "bh1",
CommitHash: "ch",
CommitTime: ctime,
Path: "path1",
CVE: &cve4.CVE{
Metadata: cve4.Metadata{
ID: "CVE-2000-0001",
},
},
TriageState: store.TriageStateNeedsIssue,
},
{
ID: "CVE-2000-0002",
BlobHash: "bh2",
CommitHash: "ch",
CommitTime: ctime,
Path: "path2",
TriageState: store.TriageStateNoActionNeeded,
},
{
ID: "CVE-2000-0003",
BlobHash: "bh3",
CommitHash: "ch",
CommitTime: ctime,
Path: "path3",
TriageState: store.TriageStateIssueCreated,
},
}
createCVE4Records(t, mstore, crs)
grs := []*store.LegacyGHSARecord{
{
GHSA: &ghsa.SecurityAdvisory{
ID: ghsa1,
Vulns: []*ghsa.Vuln{{Package: "p1"}},
},
TriageState: store.TriageStateNeedsIssue,
},
{
GHSA: &ghsa.SecurityAdvisory{
ID: ghsa2,
Vulns: []*ghsa.Vuln{{Package: "p2"}},
},
TriageState: store.TriageStateNoActionNeeded,
},
{
GHSA: &ghsa.SecurityAdvisory{
ID: ghsa3,
Vulns: []*ghsa.Vuln{{Package: "p3"}},
},
TriageState: store.TriageStateIssueCreated,
},
{
GHSA: &ghsa.SecurityAdvisory{
ID: ghsa4,
Vulns: []*ghsa.Vuln{{Package: "p4"}},
},
TriageState: store.TriageStateAlias,
},
{
GHSA: &ghsa.SecurityAdvisory{
ID: ghsa5,
Vulns: []*ghsa.Vuln{{Package: "p1"}},
Identifiers: []ghsa.Identifier{{Type: "GHSA", Value: ghsa5}},
},
TriageState: store.TriageStateNeedsIssue,
},
}
createLegacyGHSARecords(t, mstore, grs)
// Add an existing report with GHSA "g5".
rc, err := report.NewTestClient(map[string]*report.Report{
"data/reports/GO-1999-0001.yaml": {GHSAs: []string{ghsa5}},
})
if err != nil {
t.Fatal(err)
}
if err := CreateIssues(ctx, mstore, ic, pc, rc, 0); err != nil {
t.Fatal(err)
}
var wantCVE4Records []*store.CVE4Record
for _, r := range crs {
copy := *r
wantCVE4Records = append(wantCVE4Records, ©)
}
wantCVE4Records[0].TriageState = store.TriageStateIssueCreated
wantCVE4Records[0].IssueReference = "https://github.com/test-owner/test-repo/issues/1"
gotCVERecs := mstore.CVE4Records()
if len(gotCVERecs) != len(wantCVE4Records) {
t.Fatalf("wrong number of records: got %d, want %d", len(gotCVERecs), len(wantCVE4Records))
}
for _, want := range wantCVE4Records {
got := gotCVERecs[want.ID]
if !cmp.Equal(got, want, cmpopts.IgnoreFields(store.CVE4Record{}, "IssueCreatedAt")) {
t.Errorf("\ngot %+v\nwant %+v", got, want)
}
}
var wantGHSARecs []*store.LegacyGHSARecord
for _, r := range grs {
copy := *r
wantGHSARecs = append(wantGHSARecs, ©)
}
wantGHSARecs[0].TriageState = store.TriageStateIssueCreated
wantGHSARecs[0].IssueReference = "https://github.com/test-owner/test-repo/issues/1"
// A report already exists for GHSA "g5".
wantGHSARecs[4].TriageState = store.TriageStateHasVuln
gotGHSARecs := getGHSARecordsSorted(t, mstore)
fmt.Printf("%+v\n", gotGHSARecs[0])
if diff := cmp.Diff(wantGHSARecs, gotGHSARecs,
cmpopts.IgnoreFields(store.LegacyGHSARecord{}, "IssueCreatedAt")); diff != "" {
t.Errorf("mismatch (-want, +got):\n%s", diff)
}
}
func TestNewCVEBody(t *testing.T) {
cr := &store.CVE4Record{
ID: "CVE-2000-0001",
Module: "golang.org/x/vulndb",
CVE: &cve4.CVE{
Metadata: cve4.Metadata{
ID: "CVE-2000-0001",
},
Description: cve4.Description{
Data: []cve4.LangString{{
Lang: "eng",
Value: "a description",
}},
},
},
}
xrefReport := &report.Report{
Modules: []*report.Module{{Module: "golang.org/x/vulndb"}},
CVEs: []string{"CVE-2000-0001"},
GHSAs: []string{},
}
pc, err := proxy.NewTestClient(t, *realProxy)
if err != nil {
t.Fatal(err)
}
r := report.New(cr.CVE, pc, report.WithCreated(testTime), report.WithModulePath(cr.Module))
rc, err := report.NewTestClient(map[string]*report.Report{
"data/reports/GO-9999-0002.yaml": xrefReport,
})
if err != nil {
t.Fatal(err)
}
got, err := NewIssueBody(r, cr.GetDescription(), rc)
if err != nil {
t.Fatal(err)
}
want := `Advisory [CVE-2000-0001](https://nvd.nist.gov/vuln/detail/CVE-2000-0001) references a vulnerability in the following Go modules:
| Module |
| - |
| [golang.org/x/vulndb](https://pkg.go.dev/golang.org/x/vulndb) |
Description:
a description
References:
- ADVISORY: https://nvd.nist.gov/vuln/detail/CVE-2000-0001
!! Possible duplicate report !!
- CVE-2000-0001 appears in 1 other report(s):
- data/reports/GO-9999-0002.yaml (https://github.com/golang/vulndb#2)
Cross references:
- golang.org/x/vulndb appears in 1 other report(s):
- data/reports/GO-9999-0002.yaml (https://github.com/golang/vulndb#2)
See [doc/quickstart.md](https://github.com/golang/vulndb/blob/master/doc/quickstart.md) for instructions on how to triage this report.
` + "```" + `
id: GO-ID-PENDING
modules:
- module: golang.org/x/vulndb
vulnerable_at: 0.0.0-20240515211212-610562879ffa
summary: CVE-2000-0001 in golang.org/x/vulndb
cves:
- CVE-2000-0001
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2000-0001
source:
id: CVE-2000-0001
created: 1999-01-01T00:00:00Z
review_status: UNREVIEWED
` + "```"
if diff := cmp.Diff(unindent(want), got); diff != "" {
t.Errorf("mismatch (-want, +got):\n%s", diff)
t.Errorf("got: %s", got)
}
}
func TestCreateGHSABody(t *testing.T) {
gr := &store.LegacyGHSARecord{
GHSA: &ghsa.SecurityAdvisory{
ID: "GHSA-xxxx-yyyy-zzzz",
Identifiers: []ghsa.Identifier{{Type: "GHSA", Value: "GHSA-xxxx-yyyy-zzzz"}},
Description: "a description",
Vulns: []*ghsa.Vuln{{
Package: "golang.org/x/tools",
EarliestFixedVersion: "0.21.0",
VulnerableVersionRange: "< 0.21.0",
}},
References: []ghsa.Reference{
{URL: "https://example.com/commit/12345"},
},
},
}
rep := &report.Report{
Excluded: "EXCLUDED",
GHSAs: []string{"GHSA-xxxx-yyyy-zzzz"},
}
pc, err := proxy.NewTestClient(t, *realProxy)
if err != nil {
t.Fatal(err)
}
rc, err := report.NewTestClient(map[string]*report.Report{
"data/excluded/GO-9999-0001.yaml": rep,
})
if err != nil {
t.Fatal(err)
}
r := report.New(gr.GHSA, pc, report.WithCreated(testTime))
got, err := NewIssueBody(r, gr.GetDescription(), rc)
if err != nil {
t.Fatal(err)
}
want := `Advisory [GHSA-xxxx-yyyy-zzzz](https://github.com/advisories/GHSA-xxxx-yyyy-zzzz) references a vulnerability in the following Go modules:
| Module |
| - |
| [golang.org/x/tools](https://pkg.go.dev/golang.org/x/tools) |
Description:
a description
References:
- ADVISORY: https://github.com/advisories/GHSA-xxxx-yyyy-zzzz
- FIX: https://example.com/commit/12345
!! Possible duplicate report !!
- GHSA-xxxx-yyyy-zzzz appears in 1 other report(s):
- data/excluded/GO-9999-0001.yaml (https://github.com/golang/vulndb#1) EXCLUDED
See [doc/quickstart.md](https://github.com/golang/vulndb/blob/master/doc/quickstart.md) for instructions on how to triage this report.
` + "```" + `
id: GO-ID-PENDING
modules:
- module: golang.org/x/tools
versions:
- fixed: 0.21.0
vulnerable_at: 0.20.0
summary: GHSA-xxxx-yyyy-zzzz in golang.org/x/tools
ghsas:
- GHSA-xxxx-yyyy-zzzz
references:
- advisory: https://github.com/advisories/GHSA-xxxx-yyyy-zzzz
- fix: https://example.com/commit/12345
source:
id: GHSA-xxxx-yyyy-zzzz
created: 1999-01-01T00:00:00Z
review_status: UNREVIEWED
` + "```"
if diff := cmp.Diff(unindent(want), got); diff != "" {
t.Errorf("mismatch (-want, +got):\n%s", diff)
}
}
// unindent removes leading whitespace from s.
// It first finds the line beginning with the fewest space and tab characters.
// It then removes that many characters from every line.
func unindent(s string) string {
lines := strings.Split(s, "\n")
min := math.MaxInt
for _, l := range lines {
if len(l) == 0 {
continue
}
n := 0
for _, r := range l {
if r != ' ' && r != '\t' {
break
}
n++
}
if n < min {
min = n
}
}
for i, l := range lines {
if len(l) > 0 {
lines[i] = l[min:]
}
}
return strings.Join(lines, "\n")
}
func day(year, month, day int) time.Time {
return time.Date(year, time.Month(month), day, 0, 0, 0, 0, time.UTC)
}
func TestUpdateGHSAs(t *testing.T) {
ctx := context.Background()
sas := []*ghsa.SecurityAdvisory{
{
ID: ghsa1,
UpdatedAt: day(2021, 10, 1),
},
{
ID: ghsa2,
UpdatedAt: day(2021, 11, 1),
},
{
ID: ghsa3,
UpdatedAt: day(2021, 12, 1),
},
{
ID: ghsa4,
Identifiers: []ghsa.Identifier{{Type: "CVE", Value: "CVE-2000-1111"}},
UpdatedAt: day(2021, 12, 1),
},
{
ID: ghsa5,
Identifiers: []ghsa.Identifier{{Type: "CVE", Value: "CVE-2000-2222"}},
UpdatedAt: day(2021, 12, 1),
},
}
mstore := store.NewMemStore()
listSAs := fakeListFunc(sas)
updateAndCheck := func(wantStats UpdateGHSAStats, wantRecords []*store.LegacyGHSARecord) {
t.Helper()
gotStats, err := UpdateGHSAs(ctx, listSAs, mstore)
if err != nil {
t.Fatal(err)
}
if gotStats != wantStats {
t.Errorf("\ngot %+v\nwant %+v", gotStats, wantStats)
}
gotRecords := getGHSARecordsSorted(t, mstore)
if diff := cmp.Diff(wantRecords, gotRecords); diff != "" {
t.Errorf("mismatch (-want, +got):\n%s", diff)
}
}
// Add some existing CVE records.
ctime := time.Date(2020, 1, 2, 0, 0, 0, 0, time.UTC)
crs := []*store.CVE4Record{
{
ID: "CVE-2000-1111",
BlobHash: "bh1",
CommitHash: "ch",
CommitTime: ctime,
Path: "path1",
TriageState: store.TriageStateNoActionNeeded,
},
{
ID: "CVE-2000-2222",
BlobHash: "bh2",
CommitHash: "ch",
CommitTime: ctime,
Path: "path2",
TriageState: store.TriageStateIssueCreated,
},
}
createCVE4Records(t, mstore, crs)
// First four SAs entered with NeedsIssue.
var want []*store.LegacyGHSARecord
for _, sa := range sas[:4] {
want = append(want, &store.LegacyGHSARecord{
GHSA: sa,
TriageState: store.TriageStateNeedsIssue,
})
}
// SA "g5" entered with Alias state because it is an alias of
// "CVE-2000-2222" which already has an issue.
want = append(want, &store.LegacyGHSARecord{
GHSA: sas[4],
TriageState: store.TriageStateAlias,
})
updateAndCheck(UpdateGHSAStats{5, 5, 0}, want)
// New SA added, old one updated.
sas[0] = &ghsa.SecurityAdvisory{
ID: sas[0].ID,
UpdatedAt: day(2021, 12, 2),
}
want[0].GHSA = sas[0]
sas = append(sas, &ghsa.SecurityAdvisory{
ID: ghsa6,
UpdatedAt: day(2021, 12, 2),
})
listSAs = fakeListFunc(sas)
want = append(want, &store.LegacyGHSARecord{
GHSA: sas[len(sas)-1],
TriageState: store.TriageStateNeedsIssue,
})
// Next update processes two SAs, modifies one and adds one.
updateAndCheck(UpdateGHSAStats{2, 1, 1}, want)
}
func getGHSARecordsSorted(t *testing.T, st store.Store) []*store.LegacyGHSARecord {
t.Helper()
rs, err := getGHSARecords(context.Background(), st)
if err != nil {
t.Fatal(err)
}
sort.Slice(rs, func(i, j int) bool { return rs[i].GHSA.ID < rs[j].GHSA.ID })
return rs
}
func fakeListFunc(sas []*ghsa.SecurityAdvisory) GHSAListFunc {
return func(ctx context.Context, since time.Time) ([]*ghsa.SecurityAdvisory, error) {
var rs []*ghsa.SecurityAdvisory
for _, sa := range sas {
if !sa.UpdatedAt.Before(since) {
rs = append(rs, sa)
}
}
return rs, nil
}
}
func TestYearLabel(t *testing.T) {
for _, test := range []struct {
input, want string
}{
{"CVE-2022-24726", "cve-year-2022"},
{"CVE-2021-24726", "cve-year-2021"},
{"CVE-2020-24726", "cve-year-2020"},
{"CVE-2019-9741", "cve-year-2019-and-earlier"},
{"GHSA-p93v-m2r2-4387", ""},
} {
if got := yearLabel(test.input); got != test.want {
t.Errorf("yearLabel(%q): %q; want = %q", test.input, got, test.want)
}
}
}
|
worker
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/worker/false_positives.go
|
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package worker
import (
"context"
"golang.org/x/vulndb/internal/derrors"
"golang.org/x/vulndb/internal/observe"
"golang.org/x/vulndb/internal/worker/store"
)
// updateFalsePositives makes sure the store reflects the list of false positives.
func updateFalsePositives(ctx context.Context, st store.Store) (err error) {
defer derrors.Wrap(&err, "updateFalsePositives")
ctx, span := observe.Start(ctx, "updateFalsePositives")
defer span.End()
for i := 0; i < len(falsePositives); i += maxTransactionWrites {
j := i + maxTransactionWrites
if j >= len(falsePositives) {
j = len(falsePositives)
}
batch := falsePositives[i:j]
err := st.RunTransaction(ctx, func(ctx context.Context, tx store.Transaction) error {
oldRecords, err := readCVE4Records(tx, batch)
if err != nil {
return err
}
for i, cr := range batch {
old := oldRecords[i]
var err error
if old == nil {
err = tx.CreateRecord(cr)
} else if old.CommitHash != cr.CommitHash && !old.CommitTime.IsZero() && old.CommitTime.Before(cr.CommitTime) {
// If the false positive data is more recent than what is in
// the store, then update the DB. But ignore records whose
// commit time hasn't been populated.
err = tx.SetRecord(cr)
}
if err != nil {
return err
}
}
return nil
})
if err != nil {
return err
}
}
return nil
}
func readCVE4Records(tx store.Transaction, crs []*store.CVE4Record) ([]*store.CVE4Record, error) {
var olds []*store.CVE4Record
for _, cr := range crs {
dbcrs, err := tx.GetCVE4Records(cr.ID, cr.ID)
if err != nil {
return nil, err
}
var old *store.CVE4Record
if len(dbcrs) > 0 {
old = dbcrs[0]
}
olds = append(olds, old)
}
return olds, nil
}
|
worker
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/worker/update.go
|
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package worker
import (
"context"
"errors"
"fmt"
"path"
"strings"
"time"
"github.com/go-git/go-git/v5"
"github.com/go-git/go-git/v5/plumbing/object"
"golang.org/x/vulndb/internal/cve4"
"golang.org/x/vulndb/internal/cvelistrepo"
"golang.org/x/vulndb/internal/cveutils"
"golang.org/x/vulndb/internal/derrors"
"golang.org/x/vulndb/internal/ghsa"
"golang.org/x/vulndb/internal/observe"
"golang.org/x/vulndb/internal/report"
"golang.org/x/vulndb/internal/worker/log"
"golang.org/x/vulndb/internal/worker/store"
)
// A triageFunc triages a CVE: it decides whether an issue needs to be filed.
// If so, it returns a non-empty string indicating the possibly
// affected module.
type triageFunc func(*cve4.CVE) (*cveutils.TriageResult, error)
// A cveUpdater performs an update operation on the DB.
type cveUpdater struct {
repo *git.Repository
commit *object.Commit
st store.Store
rc *report.Client
affectedModule triageFunc
}
type updateStats struct {
skipped bool // directory skipped because hashes match
numProcessed, numAdded, numModified int
}
// newCVEUpdater creates an updater for updating the store with information from
// the repo commit.
// needsIssue determines whether a CVE needs an issue to be filed for it.
func newCVEUpdater(repo *git.Repository, commit *object.Commit, st store.Store, rc *report.Client, needsIssue triageFunc) *cveUpdater {
u := &cveUpdater{
repo: repo,
commit: commit,
st: st,
rc: rc,
affectedModule: needsIssue,
}
return u
}
// update updates the DB to match the repo at the given commit.
// It also triages new or changed issues.
func (u *cveUpdater) update(ctx context.Context) (err error) {
// We want the action of reading the old DB record, updating it and
// writing it back to be atomic. It would be too expensive to do that one
// record at a time. Ideally we'd process the whole repo commit in one
// transaction, but Firestore has a limit on how many writes one
// transaction can do, so the CVE files in the repo are processed in
// batches, one transaction per batch.
defer derrors.Wrap(&err, "cveUpdater.update(%s)", u.commit.Hash)
ctx, span := observe.Start(ctx, "cveUpdater.update")
defer span.End()
log.Infof(ctx, "CVE Firestore update starting on CVE list repo hash=%s", u.commit.Hash)
// Get all the CVE files.
// It is cheaper to read all the files from the repo and compare
// them to the DB in bulk, than to walk the repo and process
// each file individually.
files, err := cvelistrepo.Files(u.repo, u.commit)
if err != nil {
return err
}
// Process files in the same directory together, so we can easily skip
// the entire directory if it hasn't changed.
filesByDir, err := groupFilesByDirectory(files)
if err != nil {
return err
}
// Create a new CommitUpdateRecord to describe this run of doUpdate.
ur := &store.CommitUpdateRecord{
StartedAt: time.Now(),
CommitHash: u.commit.Hash.String(),
CommitTime: u.commit.Committer.When,
NumTotal: len(files),
}
if err := u.st.CreateCommitUpdateRecord(ctx, ur); err != nil {
return err
}
defer func() {
ur.EndedAt = time.Now()
if err != nil {
ur.Error = err.Error()
if err2 := u.st.SetCommitUpdateRecord(ctx, ur); err2 != nil {
err = fmt.Errorf("update failed with %w, could not set update record: %w", err, err2)
}
return
}
if err = u.st.SetCommitUpdateRecord(ctx, ur); err != nil {
err = fmt.Errorf("update succeeded, but could not set update record: %w", err)
}
log.Infof(ctx, "CVE Firestore update succeeded on CVE list repo hash=%s: added %d, modified %d",
u.commit.Hash, ur.NumAdded, ur.NumModified)
}()
var skippedDirs []string
// Log a message every this many skipped directories.
const logSkippedEvery = 40
for _, dirFiles := range filesByDir {
stats, err := u.updateDirectory(ctx, dirFiles)
if err != nil {
return err
}
if stats.skipped {
skippedDirs = append(skippedDirs, dirFiles[0].DirPath)
if len(skippedDirs) >= logSkippedEvery {
log.Debugf(ctx, "skipped %d directories because they have not changed since last update:\n%s",
len(skippedDirs), strings.Join(skippedDirs, ", "))
skippedDirs = nil
}
}
ur.NumProcessed += stats.numProcessed
ur.NumAdded += stats.numAdded
ur.NumModified += stats.numModified
}
return nil
}
// Firestore supports a maximum of 500 writes per transaction.
// See https://cloud.google.com/firestore/quotas.
const maxTransactionWrites = 500
func (u *cveUpdater) updateDirectory(ctx context.Context, dirFiles []cvelistrepo.File) (_ updateStats, err error) {
dirPath := dirFiles[0].DirPath
dirHash := dirFiles[0].TreeHash.String()
// A non-empty directory hash means that we have fully processed the directory
// with that hash. If the stored hash matches the current one, we can skip
// this directory.
dbHash, err := u.st.GetDirectoryHash(ctx, dirPath)
if err != nil {
return updateStats{}, err
}
if dirHash == dbHash {
return updateStats{skipped: true}, nil
}
// Set the hash to something that can't match, until we fully process this directory.
if err := u.st.SetDirectoryHash(ctx, dirPath, "in progress"); err != nil {
return updateStats{}, err
}
// It's okay if we crash now; the directory hashes are just an optimization.
// At worst we'll redo this directory next time.
// Update files in batches.
var stats updateStats
for i := 0; i < len(dirFiles); i += maxTransactionWrites {
j := i + maxTransactionWrites
if j > len(dirFiles) {
j = len(dirFiles)
}
numBatchAdds, numBatchMods, err := u.updateBatch(ctx, dirFiles[i:j])
if err != nil {
return updateStats{}, err
}
stats.numProcessed += j - i
// Add in these two numbers here, instead of in the function passed to
// RunTransaction, because that function may be executed multiple times.
stats.numAdded += numBatchAdds
stats.numModified += numBatchMods
} // end batch loop
// We're done with this directory, so we can remember its hash.
if err := u.st.SetDirectoryHash(ctx, dirPath, dirHash); err != nil {
return updateStats{}, err
}
return stats, nil
}
func (u *cveUpdater) updateBatch(ctx context.Context, batch []cvelistrepo.File) (numAdds, numMods int, err error) {
startID := idFromFilename(batch[0].Filename)
endID := idFromFilename(batch[len(batch)-1].Filename)
defer derrors.Wrap(&err, "updateBatch(%q-%q)", startID, endID)
err = u.st.RunTransaction(ctx, func(ctx context.Context, tx store.Transaction) error {
numAdds = 0
numMods = 0
// Read information about the existing state in the store that's
// relevant to this batch. Since the entries are sorted, we can read
// a range of IDS.
crs, err := tx.GetCVE4Records(startID, endID)
if err != nil {
return err
}
idToRecord := map[string]*store.CVE4Record{}
for _, cr := range crs {
idToRecord[cr.ID] = cr
}
// Determine what needs to be added and modified.
var toAdd, toModify []*store.CVE4Record
for _, f := range batch {
id := idFromFilename(f.Filename)
old := idToRecord[id]
if old != nil && old.BlobHash == f.BlobHash.String() {
// No change; do nothing.
continue
}
record, add, err := u.handleCVE(f, old, tx)
if err != nil {
return err
}
if add {
toAdd = append(toAdd, record)
} else {
toModify = append(toModify, record)
}
}
// Add/modify the records.
for _, r := range toAdd {
if err := tx.CreateRecord(r); err != nil {
return err
}
numAdds++
}
for _, r := range toModify {
if err := tx.SetRecord(r); err != nil {
return err
}
numMods++
}
return nil
})
if err != nil {
return 0, 0, err
}
log.Debugf(ctx, "batch updated Firestore records for %q-%q: added %d, modified %d", startID, endID, numAdds, numMods)
return numAdds, numMods, nil
}
// checkForAliases determines if this CVE has an alias GHSA that the
// worker has already handled, and returns the appropriate triage state
// based on this.
func checkForAliases(cve *cve4.CVE, tx store.Transaction) (store.TriageState, error) {
for _, ghsaID := range cveutils.GetAliasGHSAs(cve) {
ghsa, err := tx.GetRecord(ghsaID)
if err != nil {
return "", err
}
if ghsa != nil {
return getTriageStateFromAlias(ghsa.GetTriageState()), nil
}
}
return store.TriageStateNeedsIssue, nil
}
// handleCVE determines how to change the store for a single CVE.
// It returns the record, and a bool indicating whether to add or modify
// the record.
func (u *cveUpdater) handleCVE(f cvelistrepo.File, old *store.CVE4Record, tx store.Transaction) (record *store.CVE4Record, add bool, err error) {
defer derrors.Wrap(&err, "handleCVE(%s)", f.Filename)
cve, err := cvelistrepo.Parse[*cve4.CVE](u.repo, f)
if err != nil {
return nil, false, err
}
var result *cveutils.TriageResult
if cve.State == cve4.StatePublic && !u.rc.AliasHasReport(cve.ID) {
c := cve
// If a false positive has changed, we only care about
// whether new reference URLs refer to a Go module.
// We know some old ones do. So remove the old ones
// before checking.
if old != nil && old.TriageState == store.TriageStateFalsePositive {
c = copyRemoving(cve, old.ReferenceURLs)
}
result, err = u.affectedModule(c)
if err != nil {
return nil, false, err
}
}
pathname := path.Join(f.DirPath, f.Filename)
// If the CVE is not in the database, add it.
if old == nil {
cr := store.NewCVE4Record(cve, pathname, f.BlobHash.String(), u.commit)
switch {
case result != nil:
triageState, err := checkForAliases(cve, tx)
if err != nil {
return nil, false, err
}
cr.TriageState = triageState
cr.Module = result.ModulePath
cr.Package = result.PackagePath
cr.TriageStateReason = result.Reason
cr.CVE = cve
case u.rc.AliasHasReport(cve.ID):
cr.TriageState = store.TriageStateHasVuln
default:
cr.TriageState = store.TriageStateNoActionNeeded
}
return cr, true, nil
}
// Change to an existing record.
mod := *old // copy the old one
mod.Path = pathname
mod.BlobHash = f.BlobHash.String()
mod.CVEState = cve.State
mod.CommitHash = u.commit.Hash.String()
mod.CommitTime = u.commit.Committer.When.In(time.UTC)
switch old.TriageState {
case store.TriageStateNoActionNeeded, store.TriageStateFalsePositive:
if result != nil {
// Didn't need an issue before, does now.
mod.TriageState = store.TriageStateNeedsIssue
mod.Module = result.ModulePath
mod.Package = result.PackagePath
mod.TriageStateReason = result.Reason
mod.CVE = cve
}
// Else don't change the triage state, but we still want
// to update the other changed fields.
case store.TriageStateNeedsIssue:
if result == nil {
// Needed an issue, no longer does.
mod.TriageState = store.TriageStateNoActionNeeded
mod.Module = ""
mod.CVE = nil
}
// Else don't change the triage state, but we still want
// to update the other changed fields.
case store.TriageStateIssueCreated, store.TriageStateUpdatedSinceIssueCreation:
// An issue was filed, so a person should revisit this CVE.
mod.TriageState = store.TriageStateUpdatedSinceIssueCreation
var mp string
if result != nil {
mp = result.ModulePath
}
mod.TriageStateReason = fmt.Sprintf("CVE changed; affected module = %q", mp)
case store.TriageStateAlias:
// For now, do nothing.
case store.TriageStateHasVuln:
// There is already a Go vuln report for this CVE, so
// nothing to do.
default:
return nil, false, fmt.Errorf("unknown TriageState: %q", old.TriageState)
}
// If the triage state changed, add the old state to the history at the beginning.
if old.TriageState != mod.TriageState {
mod.History = append([]*store.CVE4RecordSnapshot{old.Snapshot()}, mod.History...)
}
if mod.TriageState == store.TriageStateNeedsIssue && mod.CVE == nil {
return nil, false, errors.New("needs issue but CVE is nil")
}
// If we're here, then mod is a valid modification to the DB.
return &mod, false, nil
}
// copyRemoving returns a copy of cve with any reference that has a given URL removed.
func copyRemoving(cve *cve4.CVE, refURLs []string) *cve4.CVE {
remove := map[string]bool{}
for _, u := range refURLs {
remove[u] = true
}
c := *cve
var rs []cve4.Reference
for _, r := range cve.References.Data {
if !remove[r.URL] {
rs = append(rs, r)
}
}
c.References.Data = rs
return &c
}
// Collect files by directory, verifying that directories are contiguous in
// the list of files. Our directory hash optimization depends on that.
func groupFilesByDirectory(files []cvelistrepo.File) ([][]cvelistrepo.File, error) {
if len(files) == 0 {
return nil, nil
}
var (
result [][]cvelistrepo.File
curDir []cvelistrepo.File
)
for _, f := range files {
if len(curDir) > 0 && f.DirPath != curDir[0].DirPath {
result = append(result, curDir)
curDir = nil
}
curDir = append(curDir, f)
}
if len(curDir) > 0 {
result = append(result, curDir)
}
seen := map[string]bool{}
for _, dir := range result {
if seen[dir[0].DirPath] {
return nil, fmt.Errorf("directory %s is not contiguous in the sorted list of files", dir[0].DirPath)
}
seen[dir[0].DirPath] = true
}
return result, nil
}
// idFromFilename extracts the CVE ID from a filename.
func idFromFilename(name string) string {
return strings.TrimSuffix(path.Base(name), path.Ext(name))
}
type UpdateGHSAStats struct {
// Number of GitHub security advisories seen.
NumProcessed int
// Number of GHSARecords added to the store.
NumAdded int
// Number of GHSARecords already in the store that were modified.
NumModified int
}
func getTriageStateFromAlias(aliasTriageState store.TriageState) store.TriageState {
switch aliasTriageState {
case store.TriageStateIssueCreated,
store.TriageStateHasVuln, store.TriageStateNeedsIssue, store.TriageStateUpdatedSinceIssueCreation:
// The vuln was already covered by the alias ID.
// TODO(https://go.dev/issues/55303): Add comment to
// existing issue with new alias.
return store.TriageStateAlias
case store.TriageStateFalsePositive, store.TriageStateNoActionNeeded, store.TriageStateAlias:
// Create an issue for the vuln since no issue
// was created for the alias ID.
return store.TriageStateNeedsIssue
}
return store.TriageStateNeedsIssue
}
// triageNewGHSA determines the initial triage state for the GHSA.
// It checks if we have already handled a CVE associated with this GHSA.
func triageNewGHSA(sa *ghsa.SecurityAdvisory, tx store.Transaction) (store.TriageState, error) {
for _, alias := range sa.Identifiers {
if alias.Type == "CVE" {
cveID := alias.Value
cves, err := tx.GetCVE4Records(cveID, cveID)
if err != nil {
return store.TriageStateNeedsIssue, err
}
if len(cves) == 0 {
continue
}
return getTriageStateFromAlias(cves[0].TriageState), nil
}
}
// The GHSA has no associated CVEs.
return store.TriageStateNeedsIssue, nil
}
func updateGHSAs(ctx context.Context, listSAs GHSAListFunc, since time.Time, st store.Store) (stats UpdateGHSAStats, err error) {
defer derrors.Wrap(&err, "updateGHSAs(%s)", since)
ctx, span := observe.Start(ctx, "updateGHSAs")
defer span.End()
defer func() {
if err == nil {
log.Infof(ctx, "GHSA Firestore update succeeded with since=%s: %+v", since, stats)
}
}()
log.Infof(ctx, "Starting GHSA Firestore update, looking at new/modified GHSAs since=%s", since)
// Get all of the GHSAs since the given time from GitHub.
sas, err := listSAs(ctx, since)
if err != nil {
return stats, err
}
stats.NumProcessed = len(sas)
if len(sas) > maxTransactionWrites {
return stats, errors.New("number of advisories exceeds maxTransactionWrites")
}
numAdded := 0
numModified := 0
err = st.RunTransaction(ctx, func(ctx context.Context, tx store.Transaction) error {
numAdded = 0
numModified = 0
// Read the existing GHSA records from the store.
sars, err := tx.GetLegacyGHSARecords()
if err != nil {
return err
}
ghsaIDToRecord := map[string]*store.LegacyGHSARecord{}
for _, r := range sars {
ghsaIDToRecord[r.GHSA.ID] = r
}
// Determine what needs to be added and modified.
var toAdd []*store.LegacyGHSARecord
var toUpdate []*store.LegacyGHSARecord
for _, sa := range sas {
old := ghsaIDToRecord[sa.ID]
if old == nil {
// ghsa.List already filters for vulns in the Go ecosystem,
// so add a record for all found GHSAs.
triageState, err := triageNewGHSA(sa, tx)
if err != nil {
return err
}
log.Debugf(ctx, "Triage state for new %s: %s", sa.ID, triageState)
toAdd = append(toAdd, &store.LegacyGHSARecord{
GHSA: sa,
TriageState: triageState,
})
} else if !old.GHSA.UpdatedAt.Equal(sa.UpdatedAt) {
// Modify record.
mod := *old
mod.GHSA = sa
switch old.TriageState {
case store.TriageStateNoActionNeeded:
mod.TriageState = store.TriageStateNeedsIssue
mod.TriageStateReason = "advisory was updated"
case store.TriageStateIssueCreated:
mod.TriageState = store.TriageStateUpdatedSinceIssueCreation
default:
// Don't change the TriageState.
}
log.Debugf(ctx, "Triage state for modified %s: %s", sa.ID, mod.TriageState)
toUpdate = append(toUpdate, &mod)
}
}
for _, r := range toAdd {
if err := tx.CreateRecord(r); err != nil {
return err
}
numAdded++
}
for _, r := range toUpdate {
if err := tx.SetRecord(r); err != nil {
return err
}
numModified++
}
return nil
})
stats.NumAdded = numAdded
stats.NumModified = numModified
return stats, nil
}
|
worker
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/worker/update_test.go
|
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
//go:build go1.17
// +build go1.17
package worker
import (
"context"
"errors"
"flag"
"testing"
"github.com/go-git/go-git/v5"
"github.com/go-git/go-git/v5/plumbing/object"
"github.com/google/go-cmp/cmp"
"github.com/google/go-cmp/cmp/cmpopts"
"golang.org/x/vulndb/internal/cve4"
"golang.org/x/vulndb/internal/cvelistrepo"
"golang.org/x/vulndb/internal/cveutils"
"golang.org/x/vulndb/internal/ghsa"
"golang.org/x/vulndb/internal/gitrepo"
"golang.org/x/vulndb/internal/pkgsite"
"golang.org/x/vulndb/internal/report"
"golang.org/x/vulndb/internal/worker/store"
)
var usePkgsite = flag.Bool("pkgsite", false, "use pkg.go.dev for tests")
const clearString = "**CLEAR**"
var clearCVE = &cve4.CVE{}
func modify(r, m *store.CVE4Record) *store.CVE4Record {
modString := func(p *string, s string) {
if s == clearString {
*p = ""
} else if s != "" {
*p = s
}
}
c := *r
modString(&c.BlobHash, m.BlobHash)
modString(&c.CommitHash, m.CommitHash)
modString(&c.CVEState, m.CVEState)
if m.TriageState != "" {
if m.TriageState == clearString {
c.TriageState = ""
} else {
c.TriageState = m.TriageState
}
}
modString(&c.TriageStateReason, m.TriageStateReason)
modString(&c.Module, m.Module)
if m.CVE == clearCVE {
c.CVE = nil
} else if m.CVE != nil {
c.CVE = m.CVE
}
modString(&c.IssueReference, m.IssueReference)
if !m.IssueCreatedAt.IsZero() {
panic("unsupported modification")
}
if m.ReferenceURLs != nil {
c.ReferenceURLs = m.ReferenceURLs
}
if m.History != nil {
c.History = m.History
}
return &c
}
func TestNewCVE4Record(t *testing.T) {
// Check that NewCVE4Record with a TriageState gives a valid CVE4Record.
_, commit, err := gitrepo.TxtarRepoAndHead(testRepoPath)
if err != nil {
t.Fatal(err)
}
pathname := "2021/0xxx/CVE-2021-0001.json"
cve, bh := readCVE4(t, commit, pathname)
cr := store.NewCVE4Record(cve, pathname, bh, commit)
cr.TriageState = store.TriageStateNeedsIssue
if err := cr.Validate(); err != nil {
t.Fatal(err)
}
}
func TestDoUpdate(t *testing.T) {
ctx := context.Background()
repo, commit, err := gitrepo.TxtarRepoAndHead(testRepoPath)
if err != nil {
t.Fatal(err)
}
pc, err := pkgsite.TestClient(t, *usePkgsite)
if err != nil {
t.Fatal(err)
}
rc, err := report.NewTestClient(map[string]*report.Report{
"data/reports/GO-1999-0001.yaml": {CVEs: []string{"CVE-2020-9283"}},
})
if err != nil {
t.Fatal(err)
}
needsIssue := func(cve *cve4.CVE) (*cveutils.TriageResult, error) {
return cveutils.TriageCVE(ctx, cve, pc)
}
commitHash := commit.Hash.String()
paths := []string{
"2021/0xxx/CVE-2021-0001.json",
"2021/0xxx/CVE-2021-0010.json",
"2021/1xxx/CVE-2021-1384.json",
"2020/9xxx/CVE-2020-9283.json",
"2022/39xxx/CVE-2022-39213.json",
}
var (
cves []*cve4.CVE
blobHashes []string
)
for _, p := range paths {
cve, bh := readCVE4(t, commit, p)
cves = append(cves, cve)
blobHashes = append(blobHashes, bh)
}
// Expected CVE4Records after the above CVEs are added to an empty DB.
var rs []*store.CVE4Record
for i := 0; i < len(cves); i++ {
r := store.NewCVE4Record(cves[i], paths[i], blobHashes[i], commit)
rs = append(rs, r)
}
rs[0].TriageState = store.TriageStateNeedsIssue // a public CVE, has a golang.org path
rs[0].Module = "golang.org/x/mod"
rs[0].CVE = cves[0]
rs[1].TriageState = store.TriageStateNoActionNeeded // state is reserved
rs[2].TriageState = store.TriageStateNoActionNeeded // state is rejected
rs[3].TriageState = store.TriageStateHasVuln
rs[4].TriageState = store.TriageStateNeedsIssue
rs[4].Module = "github.com/pandatix/go-cvss"
rs[4].CVE = cves[4]
for _, test := range []struct {
name string
curCVEs []*store.CVE4Record // current state of CVEs collection
curGHSAs []*store.LegacyGHSARecord // current state of GHSAs collection
want []*store.CVE4Record // expected state of CVEs collection after update
wantUpdate *store.CommitUpdateRecord // expected update record
}{
{
name: "empty",
curCVEs: nil,
want: rs,
wantUpdate: &store.CommitUpdateRecord{
NumTotal: 5,
NumProcessed: 5,
NumAdded: 5,
},
},
{
name: "no change",
curCVEs: rs,
want: rs,
wantUpdate: &store.CommitUpdateRecord{
NumTotal: 5,
NumProcessed: 5,
NumAdded: 0,
},
},
{
name: "pre-issue changes",
curCVEs: []*store.CVE4Record{
// NoActionNeeded -> NeedsIssue
modify(rs[0], &store.CVE4Record{
BlobHash: "x", // if we don't use a different blob hash, no update will happen
TriageState: store.TriageStateNoActionNeeded,
}),
// NeedsIssue -> NoActionNeeded
modify(rs[1], &store.CVE4Record{
BlobHash: "x",
TriageState: store.TriageStateNeedsIssue,
Module: "something",
CVE: cves[1],
}),
// NoActionNeeded, triage state stays the same but other fields change.
modify(rs[2], &store.CVE4Record{
TriageState: store.TriageStateNoActionNeeded,
}),
},
want: []*store.CVE4Record{
modify(rs[0], &store.CVE4Record{
History: []*store.CVE4RecordSnapshot{{
CommitHash: commitHash,
CVEState: cve4.StatePublic,
TriageState: store.TriageStateNoActionNeeded,
}},
}),
modify(rs[1], &store.CVE4Record{
Module: clearString,
CVE: clearCVE,
History: []*store.CVE4RecordSnapshot{{
CommitHash: commitHash,
CVEState: cve4.StateReserved,
TriageState: store.TriageStateNeedsIssue,
}},
}),
rs[2],
rs[3],
rs[4],
},
wantUpdate: &store.CommitUpdateRecord{
NumTotal: 5,
NumProcessed: 5,
NumAdded: 2,
NumModified: 2,
},
},
{
name: "post-issue changes",
curCVEs: []*store.CVE4Record{
// IssueCreated -> Updated
modify(rs[0], &store.CVE4Record{
BlobHash: "x",
TriageState: store.TriageStateIssueCreated,
}),
modify(rs[1], &store.CVE4Record{
BlobHash: "x",
TriageState: store.TriageStateUpdatedSinceIssueCreation,
}),
},
want: []*store.CVE4Record{
modify(rs[0], &store.CVE4Record{
TriageState: store.TriageStateUpdatedSinceIssueCreation,
TriageStateReason: `CVE changed; affected module = "golang.org/x/mod"`,
History: []*store.CVE4RecordSnapshot{{
CommitHash: commitHash,
CVEState: cve4.StatePublic,
TriageState: store.TriageStateIssueCreated,
}},
}),
modify(rs[1], &store.CVE4Record{
TriageState: store.TriageStateUpdatedSinceIssueCreation,
TriageStateReason: `CVE changed; affected module = ""`,
}),
rs[2],
rs[3],
rs[4],
},
wantUpdate: &store.CommitUpdateRecord{
NumTotal: 5,
NumProcessed: 5,
NumAdded: 3,
NumModified: 2,
},
},
{
name: "false positive no Go URLs",
curCVEs: []*store.CVE4Record{
// FalsePositive; no change
modify(rs[0], &store.CVE4Record{
BlobHash: "x",
TriageState: store.TriageStateFalsePositive,
ReferenceURLs: []string{
"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00477.html",
"https://golang.org/x/mod",
},
}),
},
want: []*store.CVE4Record{
modify(rs[0], &store.CVE4Record{
TriageState: store.TriageStateFalsePositive,
ReferenceURLs: []string{
"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00477.html",
"https://golang.org/x/mod",
},
}),
rs[1], rs[2], rs[3], rs[4],
},
wantUpdate: &store.CommitUpdateRecord{
NumTotal: 5,
NumProcessed: 5,
NumAdded: 4,
NumModified: 1,
},
},
{
name: "false positive new Go URLs",
curCVEs: []*store.CVE4Record{
// FalsePositive; no change
modify(rs[0], &store.CVE4Record{
BlobHash: "x",
TriageState: store.TriageStateFalsePositive,
ReferenceURLs: []string{
"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00477.html",
},
}),
},
want: []*store.CVE4Record{
modify(rs[0], &store.CVE4Record{
ReferenceURLs: []string{
"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00477.html",
},
History: []*store.CVE4RecordSnapshot{{
CommitHash: commitHash,
CVEState: "PUBLIC",
TriageState: "FalsePositive",
}},
}),
rs[1], rs[2], rs[3], rs[4],
},
wantUpdate: &store.CommitUpdateRecord{
NumTotal: 5,
NumProcessed: 5,
NumAdded: 4,
NumModified: 1,
},
},
{
name: "alias already created",
curCVEs: []*store.CVE4Record{rs[0],
rs[1], rs[2], rs[3]},
curGHSAs: []*store.LegacyGHSARecord{
{
GHSA: &ghsa.SecurityAdvisory{
ID: "GHSA-xhmf-mmv2-4hhx",
},
TriageState: store.TriageStateIssueCreated,
},
},
want: []*store.CVE4Record{
rs[0],
rs[1], rs[2], rs[3], modify(rs[4], &store.CVE4Record{
TriageState: store.TriageStateAlias,
}),
},
wantUpdate: &store.CommitUpdateRecord{
NumTotal: 5,
NumProcessed: 5,
NumAdded: 1,
},
},
} {
t.Run(test.name, func(t *testing.T) {
mstore := store.NewMemStore()
createCVE4Records(t, mstore, test.curCVEs)
createLegacyGHSARecords(t, mstore, test.curGHSAs)
newCVEUpdater(repo, commit, mstore, rc, needsIssue).update(ctx)
got := mstore.CVE4Records()
want := map[string]*store.CVE4Record{}
for _, cr := range test.want {
want[cr.ID] = cr
}
if diff := cmp.Diff(want, got,
cmpopts.IgnoreFields(store.CVE4Record{}, "TriageStateReason"),
cmpopts.IgnoreFields(store.CVE4RecordSnapshot{}, "TriageStateReason")); diff != "" {
t.Errorf("mismatch (-want, +got):\n%s", diff)
}
gotUpdates, err := mstore.ListCommitUpdateRecords(ctx, -1)
if err != nil {
t.Fatal(err)
}
wantUpdates := []*store.CommitUpdateRecord{test.wantUpdate}
if diff := cmp.Diff(wantUpdates, gotUpdates,
cmpopts.IgnoreFields(store.CommitUpdateRecord{}, "ID",
"StartedAt", "EndedAt", "CommitHash", "CommitTime",
"UpdatedAt")); diff != "" {
t.Errorf("updates mismatch (-want, +got):\n%s", diff)
}
if len(gotUpdates) > 0 {
got := gotUpdates[0]
if got.StartedAt.IsZero() {
t.Error("CommitUpdateRecord.StartedAt is zero, want non-zero")
}
if got.EndedAt.IsZero() {
t.Error("CommitUpdateRecord.EndedAt is zero, want non-zero")
}
if got.Error != "" {
t.Errorf("CommitUpdateRecord.Error = %s, want no error", got.Error)
}
}
})
}
}
func TestDoUpdateError(t *testing.T) {
ctx := context.Background()
repo, commit, err := gitrepo.TxtarRepoAndHead(testRepoPath)
if err != nil {
t.Fatal(err)
}
rc, err := report.NewTestClient(nil)
if err != nil {
t.Fatal(err)
}
needsIssue := func(cve *cve4.CVE) (*cveutils.TriageResult, error) { return nil, nil }
for _, test := range []struct {
name string
errOnRunTransaction, errOnSetCommitUpdate bool
wantErrs []error
// whether to expect a meaningful update record
wantValidUpdateRecord bool
}{
{
name: "transaction error",
errOnRunTransaction: true,
wantErrs: []error{transactionErr},
wantValidUpdateRecord: true,
},
{
name: "commit error",
errOnSetCommitUpdate: true,
wantErrs: []error{commitUpdateErr},
},
{
name: "transaction and commit error",
errOnRunTransaction: true,
errOnSetCommitUpdate: true,
wantErrs: []error{transactionErr, commitUpdateErr},
},
} {
t.Run(test.name, func(t *testing.T) {
mstore := newErrStore(test.errOnRunTransaction, test.errOnSetCommitUpdate)
err := newCVEUpdater(repo, commit, mstore, rc, needsIssue).update(ctx)
for _, wantErr := range test.wantErrs {
if !errors.Is(err, wantErr) {
t.Fatalf("newCVEUpdater: want err = %v, got %v", wantErr, err)
}
}
gotUpdates, err := mstore.ListCommitUpdateRecords(ctx, -1)
if err != nil {
t.Fatalf("ListCommitUpdateRecords = %s", err)
}
if len(gotUpdates) == 0 {
t.Fatalf("no update record created")
}
got := gotUpdates[0]
if got.StartedAt.IsZero() {
t.Error("CommitUpdateRecord.StartedAt is zero, want non-zero")
}
if test.wantValidUpdateRecord {
if got.EndedAt.IsZero() {
t.Error("CommitUpdateRecord.EndedAt is zero, want non-zero")
}
if got.Error == "" {
t.Error("CommitUpdateRecord.Error is empty, want an error")
}
}
})
}
}
type transactionErrStore struct {
*store.MemStore
errOnRunTransaction, errOnSetCommitUpdate bool
}
func newErrStore(errOnRunTransaction, errOnSetCommitUpdate bool) *transactionErrStore {
return &transactionErrStore{
MemStore: store.NewMemStore(),
errOnRunTransaction: errOnRunTransaction,
errOnSetCommitUpdate: errOnSetCommitUpdate,
}
}
var transactionErr = errors.New("transaction error occurred")
func (s *transactionErrStore) RunTransaction(ctx context.Context, f func(context.Context, store.Transaction) error) error {
if s.errOnRunTransaction {
return transactionErr
}
return s.MemStore.RunTransaction(ctx, f)
}
var commitUpdateErr = errors.New("commit update occurred")
func (s *transactionErrStore) SetCommitUpdateRecord(ctx context.Context, ur *store.CommitUpdateRecord) error {
if s.errOnSetCommitUpdate {
return commitUpdateErr
}
return s.MemStore.SetCommitUpdateRecord(ctx, ur)
}
func TestGroupFilesByDirectory(t *testing.T) {
for _, test := range []struct {
in []cvelistrepo.File
want [][]cvelistrepo.File
}{
{in: nil, want: nil},
{
in: []cvelistrepo.File{{DirPath: "a"}},
want: [][]cvelistrepo.File{{{DirPath: "a"}}},
},
{
in: []cvelistrepo.File{
{DirPath: "a", Filename: "f1"},
{DirPath: "a", Filename: "f2"},
},
want: [][]cvelistrepo.File{{
{DirPath: "a", Filename: "f1"},
{DirPath: "a", Filename: "f2"},
}},
},
{
in: []cvelistrepo.File{
{DirPath: "a", Filename: "f1"},
{DirPath: "a", Filename: "f2"},
{DirPath: "b", Filename: "f1"},
{DirPath: "c", Filename: "f1"},
{DirPath: "c", Filename: "f2"},
},
want: [][]cvelistrepo.File{
{
{DirPath: "a", Filename: "f1"},
{DirPath: "a", Filename: "f2"},
},
{
{DirPath: "b", Filename: "f1"},
},
{
{DirPath: "c", Filename: "f1"},
{DirPath: "c", Filename: "f2"},
},
},
},
} {
got, err := groupFilesByDirectory(test.in)
if err != nil {
t.Fatalf("%v: %v", test.in, err)
}
if diff := cmp.Diff(got, test.want, cmp.AllowUnexported(cvelistrepo.File{})); diff != "" {
t.Errorf("%v: (-want, +got)\n%s", test.in, diff)
}
}
_, err := groupFilesByDirectory([]cvelistrepo.File{{DirPath: "a"}, {DirPath: "b"}, {DirPath: "a"}})
if err == nil {
t.Error("got nil, want error")
}
}
func readCVE4(t *testing.T, commit *object.Commit, path string) (*cve4.CVE, string) {
cve, blobHash, err := ReadCVEAtPath(commit, path)
if err != nil {
t.Fatal(err)
}
return cve, blobHash
}
func createCVE4Records(t *testing.T, s store.Store, crs []*store.CVE4Record) {
err := s.RunTransaction(context.Background(), func(ctx context.Context, tx store.Transaction) error {
for _, cr := range crs {
copy := *cr
if err := tx.CreateRecord(©); err != nil {
return err
}
}
return nil
})
if err != nil {
t.Fatal(err)
}
}
func createLegacyGHSARecords(t *testing.T, s store.Store, grs []*store.LegacyGHSARecord) {
err := s.RunTransaction(context.Background(), func(ctx context.Context, tx store.Transaction) error {
for _, gr := range grs {
copy := *gr
if err := tx.CreateRecord(©); err != nil {
return err
}
}
return nil
})
if err != nil {
t.Fatal(err)
}
}
// headCommit returns the commit at the repo HEAD.
func headCommit(t *testing.T, repo *git.Repository) *object.Commit {
h, err := gitrepo.HeadHash(repo)
if err != nil {
t.Fatal(err)
}
commit, err := repo.CommitObject(h)
if err != nil {
t.Fatal(err)
}
return commit
}
|
log
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/worker/log/log.go
|
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Package log implements event handlers for logging.
package log
import (
"context"
"fmt"
"golang.org/x/exp/slog"
"io"
"os"
"time"
)
type Attrs []slog.Attr
func With(args ...any) Attrs {
var r slog.Record
r.Add(args...)
var as Attrs
r.Attrs(func(a slog.Attr) bool {
as = append(as, a)
return true
})
return as
}
func (as Attrs) Debugf(ctx context.Context, format string, args ...interface{}) {
as.logf(ctx, slog.LevelDebug, format, args...)
}
func (as Attrs) Infof(ctx context.Context, format string, args ...interface{}) {
as.logf(ctx, slog.LevelInfo, format, args...)
}
func (as Attrs) Warningf(ctx context.Context, format string, args ...interface{}) {
as.logf(ctx, slog.LevelWarn, format, args...)
}
func (as Attrs) Errorf(ctx context.Context, format string, args ...interface{}) {
as.logf(ctx, slog.LevelError, format, args...)
}
func Debugf(ctx context.Context, format string, args ...interface{}) {
Attrs{}.logf(ctx, slog.LevelDebug, format, args...)
}
func Infof(ctx context.Context, format string, args ...interface{}) {
Attrs{}.logf(ctx, slog.LevelInfo, format, args...)
}
func Warningf(ctx context.Context, format string, args ...interface{}) {
Attrs{}.logf(ctx, slog.LevelWarn, format, args...)
}
func Errorf(ctx context.Context, format string, args ...interface{}) {
Attrs{}.logf(ctx, slog.LevelError, format, args...)
}
func (as Attrs) logf(ctx context.Context, level slog.Level, format string, args ...interface{}) {
FromContext(ctx).LogAttrs(ctx, level, fmt.Sprintf(format, args...), as...)
}
type key struct{}
func FromContext(ctx context.Context) *slog.Logger {
if l, ok := ctx.Value(key{}).(*slog.Logger); ok {
return l
}
return slog.Default()
}
func NewContext(ctx context.Context, l *slog.Logger) context.Context {
return context.WithValue(ctx, key{}, l)
}
// NewGoogleCloudHandler returns a Handler that outputs JSON for the Google
// Cloud logging service.
// See https://cloud.google.com/logging/docs/agent/logging/configuration#special-fields
// for treatment of special fields.
func NewGoogleCloudHandler(level slog.Leveler) slog.Handler {
return newGoogleCloudHandler(level, os.Stderr)
}
func newGoogleCloudHandler(level slog.Leveler, w io.Writer) slog.Handler {
return slog.NewJSONHandler(w, &slog.HandlerOptions{
Level: level,
ReplaceAttr: gcpReplaceAttr,
})
}
func gcpReplaceAttr(groups []string, a slog.Attr) slog.Attr {
switch a.Key {
case "time":
if a.Value.Kind() == slog.KindTime {
a.Value = slog.StringValue(a.Value.Time().Format(time.RFC3339))
}
case "msg":
a.Key = "message"
case "level":
a.Key = "severity"
case "traceID":
a.Key = "logging.googleapis.com/trace"
}
return a
}
|
log
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/internal/worker/log/log_test.go
|
// Copyright 2023 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package log
import (
"bytes"
"context"
"fmt"
"golang.org/x/exp/slog"
"testing"
"time"
)
// TODO(jba): is it important to put additional attrs under "logging.googleapis.com/labels"?
func TestGoogleCloudHandler(t *testing.T) {
var buf bytes.Buffer
l := slog.New(newGoogleCloudHandler(slog.LevelInfo, &buf))
l = l.With("logging.googleapis.com/trace", "tid")
now := time.Now()
l.Info("hello", slog.String("foo", "bar"), slog.Int("count", 17))
got := buf.String()
want := fmt.Sprintf(`{"time":%q,"severity":"INFO","message":"hello","logging.googleapis.com/trace":"tid","foo":"bar","count":17}
`, now.Format(time.RFC3339))
if got != want {
t.Errorf("\ngot %s\nwant %s", got, want)
}
buf.Reset()
ctx := NewContext(context.Background(), l)
now = time.Now()
With("a", "b").Warningf(ctx, "hi")
got = buf.String()
want = fmt.Sprintf(`{"time":%q,"severity":"WARN","message":"hi","logging.googleapis.com/trace":"tid","a":"b"}
`, now.Format(time.RFC3339))
if got != want {
t.Errorf("\ngot %s\nwant %s", got, want)
}
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.