data/reports: add vulnerable_at and skip_fix to reports

Change-Id: I08411b334417ac17f27c3233df27742dd69906ab
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/465803
Run-TryBot: Tatiana Bradley <tatianabradley@google.com>
Reviewed-by: Tim King <taking@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
This commit is contained in:
Tatiana Bradley 2023-02-06 20:31:06 +00:00
Родитель aceb618704
Коммит 49d3317219
45 изменённых файлов: 101 добавлений и 50 удалений

Просмотреть файл

@ -20,15 +20,18 @@ modules:
- package: goa.design/goa
symbols:
- Controller.FileHandler
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (cannot find module providing package
github.com/goadesign/goa/uuid)'
- module: goa.design/goa/v3
versions:
- fixed: 3.0.9
vulnerable_at: 3.0.8
packages:
- package: goa.design/goa/v3
symbols:
- Controller.FileHandler
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (goa.design/goa/v3 appears to not be
a package, but I could not locate the fix for this issue in v3)'
description: |
Due to improper santization of user input, Controller.FileHandler allows
for directory traversal, allowing an attacker to read files outside of

Просмотреть файл

@ -2,13 +2,15 @@ modules:
- module: github.com/mholt/caddy
versions:
- fixed: 0.10.13
vulnerable_at: 0.10.13-0.20180330123946-2966db7b7800
packages:
- package: github.com/mholt/caddy/caddyhttp/httpserver
symbols:
- httpContext.MakeServers
- Server.serveHTTP
- assertConfigsCompatible
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason. (cannot find module providing package
github.com/lucas-clemente/quic-go/h2quic)'
description: |
Due to improper TLS verification when serving traffic for multiple
SNIs, an attacker may bypass TLS client authentication by indicating

Просмотреть файл

@ -16,11 +16,12 @@ modules:
- module: k8s.io/kubernetes
versions:
- fixed: 1.20.0-alpha.2
vulnerable_at: 1.20.0-alpha.1
packages:
- package: k8s.io/kubernetes/staging/src/k8s.io/client-go/transport
symbols:
- requestInfo.toCurl
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (module does not contain package k8s.io/kubernetes/staging/src/k8s.io/client-go/transport)'
description: |
Authorization tokens may be inappropriately logged if the verbosity
level is set to a debug level.

Просмотреть файл

@ -15,11 +15,12 @@ modules:
- module: k8s.io/kubernetes
versions:
- fixed: 1.16.0-beta.1
vulnerable_at: 1.16.0-beta.0
packages:
- package: k8s.io/kubernetes/staging/src/k8s.io/client-go/transport
symbols:
- debuggingRoundTripper.RoundTrip
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (module does not contain package k8s.io/kubernetes/staging/src/k8s.io/client-go/transport)'
description: |
Authorization tokens may be inappropriately logged if the verbosity
level is set to a debug level.

Просмотреть файл

@ -2,12 +2,14 @@ modules:
- module: k8s.io/kubernetes
versions:
- fixed: 1.20.0-alpha.1
vulnerable_at: 1.20.0-alpha.0
packages:
- package: k8s.io/kubernetes/pkg/credentialprovider
symbols:
- readDockerConfigFileFromBytes
- readDockerConfigJSONFileFromBytes
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (reading k8s.io/api/go.mod at revision
v0.0.0: unknown revision v0.0.0)'
description: |
Attempting to read a malformed .dockercfg may cause secrets to be
inappropriately logged.

Просмотреть файл

@ -3,11 +3,12 @@ modules:
versions:
- introduced: 1.16.0
fixed: 1.16.1
vulnerable_at: 1.16.0
packages:
- package: archive/zip
symbols:
- toValidName
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
Using Reader.Open on an archive containing a file with a path
prefixed by "../" will cause a panic due to a stack overflow.

Просмотреть файл

@ -5,11 +5,12 @@ modules:
- fixed: 1.14.14
- introduced: 1.15.0
fixed: 1.15.7
vulnerable_at: 1.15.6
packages:
- package: cmd/go
goos:
- windows
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
The go command may execute arbitrary code at build time when using cgo on Windows.
This can be triggered by running go get on a malicious module, or any other time

Просмотреть файл

@ -5,11 +5,12 @@ modules:
fixed: 1.14.12
- introduced: 1.15.0
fixed: 1.15.5
vulnerable_at: 1.15.4
packages:
- package: math/big
symbols:
- nat.divRecursiveStep
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
A number of math/big.Int methods can panic when provided large inputs due
to a flawed division method.

Просмотреть файл

@ -2,11 +2,13 @@ modules:
- module: github.com/ethereum/go-ethereum
versions:
- fixed: 1.8.11
vulnerable_at: 1.8.11-0.20180605071142-7a22e89080b2
packages:
- package: github.com/ethereum/go-ethereum/les
symbols:
- ProtocolManager.handleMsg
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (cannot find module providing package
github.com/hashicorp/golang-lru)'
description: |
Due to improper argument validation in RPC messages, a maliciously crafted
message can cause a panic, leading to denial of service.

Просмотреть файл

@ -7,7 +7,8 @@ modules:
- package: github.com/bytom/bytom/p2p/discover
symbols:
- Network.checkTopicRegister
skip_fix: "TODO: Revisit this reason. (Fix causes error containing cannot find module providing package github.com/bytom/common)"
skip_fix: 'TODO: Revisit this reason. (Fix causes error containing cannot
find module providing package github.com/bytom/common)'
description: |
A malformed query can cause an out-of-bounds panic due to improper
validation of arguments. If processing queries from untrusted

Просмотреть файл

@ -13,11 +13,13 @@ modules:
- module: github.com/opencontainers/selinux
versions:
- fixed: 1.3.1-0.20190929122143-5215b1806f52
vulnerable_at: 1.3.0
packages:
- package: github.com/opencontainers/selinux/go-selinux
symbols:
- readCon
- writeCon
skip_fix: 'TODO: revisit this reason (readCon and writeCon: func not found)'
description: |
AppArmor restrictions may be bypassed due to improper validation of mount
targets, allowing a malicious image to mount volumes over e.g. /proc.

Просмотреть файл

@ -7,7 +7,8 @@ modules:
- package: github.com/opencontainers/runc/libcontainer
symbols:
- mountToRootfs
skip_fix: "TODO: Revisit this reason. (Fix causes multiple errors (dependent fields/methods undefined)"
skip_fix: 'TODO: Revisit this reason. (Fix causes multiple errors (dependent
fields/methods undefined)'
description: |
A race while mounting volumes allows a possible symlink-exchange
attack, allowing a user whom can start multiple containers with

Просмотреть файл

@ -3,12 +3,13 @@ modules:
versions:
- introduced: 1.1.0
fixed: 1.3.2
vulnerable_at: 1.3.1
packages:
- package: crypto/tls
symbols:
- checkForResumption
- decryptTicket
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
When SessionTicketsDisabled is enabled, crypto/tls allowed man-in-the-middle
attackers to spoof clients via unspecified vectors.

Просмотреть файл

@ -2,6 +2,7 @@ modules:
- module: std
versions:
- fixed: 1.4.3
vulnerable_at: 1.4.2
packages:
- package: net/http
symbols:
@ -14,7 +15,7 @@ modules:
- readTransfer
- transferWriter.shouldSendContentLength
- validHeaderFieldByte
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
HTTP headers were not properly parsed, which allows remote attackers to
conduct HTTP request smuggling attacks via a request that contains

Просмотреть файл

@ -3,12 +3,13 @@ modules:
versions:
- introduced: 1.5.0
fixed: 1.5.3
vulnerable_at: 1.5.2
packages:
- package: math/big
symbols:
- nat.expNNMontgomery
- nat.montgomery
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
Int.Exp Montgomery mishandled carry propagation and produced an incorrect
output, which makes it easier for attackers to obtain private RSA keys via

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.5.4
- introduced: 1.6.0
fixed: 1.6.1
vulnerable_at: 1.6.0
packages:
- package: syscall
symbols:
- LoadLibrary
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
Untrusted search path vulnerability on Windows related to LoadLibrary allows
local users to gain privileges via a malicious DLL in the current working

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.6.4
- introduced: 1.7.0
fixed: 1.7.4
vulnerable_at: 1.7.3
packages:
- package: mime/multipart
symbols:
- Reader.readForm
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
When parsing large multipart/form-data, an attacker can
cause a HTTP server to open a large number of file

Просмотреть файл

@ -5,11 +5,12 @@ modules:
fixed: 1.8.4
- introduced: 1.9.0
fixed: 1.9.1
vulnerable_at: 1.9.0
packages:
- package: net/smtp
symbols:
- plainAuth.Start
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
SMTP clients using net/smtp can use the PLAIN authentication scheme on
network connections not secured with TLS, exposing passwords to

Просмотреть файл

@ -4,13 +4,14 @@ modules:
- fixed: 1.13.13
- introduced: 1.14.0
fixed: 1.14.5
vulnerable_at: 1.14.4
packages:
- package: crypto/x509
goos:
- windows
symbols:
- Certificate.systemVerify
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
On Windows, if VerifyOptions.Roots is nil, Certificate.Verify
does not check the EKU requirements specified in VerifyOptions.KeyUsages.

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.13.13
- introduced: 1.14.0
fixed: 1.14.5
vulnerable_at: 1.14.4
packages:
- package: net/http
symbols:
- expectContinueReader.Read
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
HTTP servers where the Handler concurrently reads the request
body and writes a response can encounter a data race and crash.

Просмотреть файл

@ -4,19 +4,20 @@ modules:
- fixed: 1.14.8
- introduced: 1.15.0
fixed: 1.15.1
vulnerable_at: 1.15.0
packages:
- package: net/http/cgi
symbols:
- response.Write
- response.WriteHeader
- response.writeCGIHeader
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
- package: net/http/fcgi
symbols:
- response.Write
- response.WriteHeader
- response.writeCGIHeader
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
When a Handler does not explicitly set the Content-Type header, the the
package would default to “text/html”, which could cause a Cross-Site Scripting

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.15.9
- introduced: 1.16.0
fixed: 1.16.1
vulnerable_at: 1.16.0
packages:
- package: encoding/xml
symbols:
- Decoder.Token
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
The Decode, DecodeElement, and Skip methods of an xml.Decoder
provided by xml.NewTokenDecoder may enter an infinite loop when

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.14.14
- introduced: 1.15.0
fixed: 1.15.7
vulnerable_at: 1.15.6
packages:
- package: crypto/elliptic
symbols:
- p224Contract
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
The P224() Curve implementation can in rare circumstances generate
incorrect outputs, including returning invalid points from

Просмотреть файл

@ -4,6 +4,7 @@ modules:
- fixed: 1.15.13
- introduced: 1.16.0
fixed: 1.16.5
vulnerable_at: 1.16.4
packages:
- package: net
symbols:
@ -12,7 +13,7 @@ modules:
- Resolver.LookupMX
- Resolver.LookupNS
- Resolver.LookupSRV
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr
functions and their respective methods on the Resolver type may

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.15.13
- introduced: 1.16.0
fixed: 1.16.5
vulnerable_at: 1.16.4
packages:
- package: archive/zip
symbols:
- Reader.init
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
NewReader and OpenReader can cause a panic or an unrecoverable
fatal error when reading an archive that claims to contain a large

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.15.13
- introduced: 1.16.0
fixed: 1.16.5
vulnerable_at: 1.16.4
packages:
- package: net/http/httputil
symbols:
- ReverseProxy.ServeHTTP
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
ReverseProxy can be made to forward certain hop-by-hop headers,
including Connection. If the target of the ReverseProxy is

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.15.13
- introduced: 1.16.0
fixed: 1.16.5
vulnerable_at: 1.16.4
packages:
- package: math/big
symbols:
- Rat.SetString
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
Rat.SetString and Rat.UnmarshalText may cause a panic or an
unrecoverable fatal error if passed inputs with very large

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.15.14
- introduced: 1.16.0
fixed: 1.16.6
vulnerable_at: 1.16.5
packages:
- package: crypto/tls
symbols:
- rsaKeyAgreement.generateClientKeyExchange
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
crypto/tls clients can panic when provided a certificate of the
wrong type for the negotiated parameters. net/http clients

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.15.15
- introduced: 1.16.0
fixed: 1.16.7
vulnerable_at: 1.16.6
packages:
- package: net/http/httputil
symbols:
- ReverseProxy.ServeHTTP
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
ReverseProxy can panic after encountering a problem copying
a proxied response body.

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.16.10
- introduced: 1.17.0
fixed: 1.17.3
vulnerable_at: 1.17.2
packages:
- package: debug/macho
symbols:
- NewFile
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
Calling File.ImportedSymbols on a loaded file which contains an invalid
dynamic symbol table command can cause a panic, in particular if the encoded

Просмотреть файл

@ -4,12 +4,13 @@ modules:
- fixed: 1.16.10
- introduced: 1.17.0
fixed: 1.17.3
vulnerable_at: 1.17.2
packages:
- package: archive/zip
symbols:
- split
- Reader.Open
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
Previously, opening a zip with (*Reader).Open could result in a panic if the
zip contained a file whose name was exclusively made up of slash characters or

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.16.14
- introduced: 1.17.0
fixed: 1.17.7
vulnerable_at: 1.17.6
packages:
- package: math/big
symbols:
- Rat.SetString
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
Rat.SetString had an overflow issue that can lead to uncontrolled memory consumption.
published: 2022-05-23T22:15:42Z

Просмотреть файл

@ -4,13 +4,14 @@ modules:
- fixed: 1.16.14
- introduced: 1.17.0
fixed: 1.17.7
vulnerable_at: 1.17.6
packages:
- package: crypto/elliptic
symbols:
- CurveParams.IsOnCurve
- p384PointFromAffine
- p521PointFromAffine
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
Some big.Int values that are not valid field elements (negative or overflowing)
might cause Curve.IsOnCurve to incorrectly return true. Operating on those values

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.16.15
- introduced: 1.17.0
fixed: 1.17.8
vulnerable_at: 1.17.7
packages:
- package: regexp
symbols:
- regexp.Compile
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
On 64-bit platforms, an extremely deeply nested expression can
cause regexp.Compile to cause goroutine stack exhaustion, forcing

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.5.4
- introduced: 1.6.0
fixed: 1.6.1
vulnerable_at: 1.6.0
packages:
- package: crypto/dsa
symbols:
- Verify
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
The Verify function in crypto/dsa passed certain parameters unchecked to
the underlying big integer library, possibly leading to extremely

Просмотреть файл

@ -4,6 +4,7 @@ modules:
- fixed: 1.6.4
- introduced: 1.7.0
fixed: 1.7.4
vulnerable_at: 1.7.3
packages:
- package: crypto/x509
goos:
@ -11,7 +12,7 @@ modules:
symbols:
- FetchPEMRoots
- execSecurityRoots
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
On Darwin, user's trust preferences for root certificates were not honored.
If the user had a root certificate loaded in their Keychain that was

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.12.10
- introduced: 1.13.0
fixed: 1.13.1
vulnerable_at: 1.13.0
packages:
- package: net/textproto
symbols:
- Reader.ReadMimeHeader
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
net/http (through net/textproto) used to accept and normalize invalid
HTTP/1.1 headers with a space before the colon, in violation of RFC 7230.

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.12.11
- introduced: 1.13.0
fixed: 1.13.2
vulnerable_at: 1.13.1
packages:
- package: crypto/dsa
symbols:
- Verify
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
Invalid DSA public keys can cause a panic in dsa.Verify. In particular,
using crypto/x509.Verify on a crafted X.509 certificate chain can lead to a

Просмотреть файл

@ -4,11 +4,12 @@ modules:
- fixed: 1.10.8
- introduced: 1.11.0
fixed: 1.11.5
vulnerable_at: 1.11.4
packages:
- package: crypto/elliptic
symbols:
- curve.doubleJacobian
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
A DoS vulnerability in the crypto/elliptic implementations of the P-521 and
P-384 elliptic curves may let an attacker craft inputs that consume

Просмотреть файл

@ -4,6 +4,7 @@ modules:
- fixed: 1.11.10
- introduced: 1.12.0
fixed: 1.12.2
vulnerable_at: 1.12.1
packages:
- package: runtime
goos:
@ -12,13 +13,13 @@ modules:
- loadOptionalSyscalls
- osinit
- syscall_loadsystemlibrary
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
- package: syscall
goos:
- windows
symbols:
- LoadDLL
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
Go on Windows misused certain LoadLibrary functionality, leading to DLL
injection.

Просмотреть файл

@ -4,6 +4,7 @@ modules:
- fixed: 1.16.9
- introduced: 1.17.0
fixed: 1.17.2
vulnerable_at: 1.17.1
packages:
- package: cmd/link
goos:
@ -12,7 +13,7 @@ modules:
- wasm
symbols:
- Link.address
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
- package: misc/wasm
goos:
- js
@ -20,7 +21,7 @@ modules:
- wasm
symbols:
- run
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
When invoking functions from WASM modules, built using GOARCH=wasm GOOS=js,
passing very large arguments can cause portions of the module to be

Просмотреть файл

@ -2,14 +2,15 @@ modules:
- module: std
versions:
- fixed: 1.16.8
- introduced: "1.17"
- introduced: 1.17.0
fixed: 1.17.1
vulnerable_at: 1.17.0
packages:
- package: archive/zip
symbols:
- NewReader
- OpenReader
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
The NewReader and OpenReader functions in archive/zip can cause a panic or
an unrecoverable fatal error when reading an archive that claims to contain

Просмотреть файл

@ -2,13 +2,14 @@ modules:
- module: std
versions:
- fixed: 1.16.12
- introduced: "1.17"
- introduced: 1.17.0
fixed: 1.17.5
vulnerable_at: 1.17.4
packages:
- package: syscall
symbols:
- ForkExec
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
description: |
When a Go program running on a Unix system is out of file descriptors and
calls syscall.ForkExec (including indirectly by using the os/exec package),

Просмотреть файл

@ -11,16 +11,17 @@ modules:
- http2serverConn.serve
- http2serverConn.writeFrame
- http2serverConn.scheduleFrameWrite
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
- module: golang.org/x/net
versions:
- fixed: 0.0.0-20190813141303-74dc4d7220e7
vulnerable_at: 0.0.0-20190813141303-74dc4d7220e7
packages:
- package: golang.org/x/net/http
symbols:
- serverConn.serve
- serverConn.writeFrame
- serverConn.scheduleFrameWrite
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
description: |
Some HTTP/2 implementations are vulnerable to a reset flood, potentially
leading to a denial of service.

Просмотреть файл

@ -9,7 +9,8 @@ modules:
- package: github.com/oam-dev/kubevela/pkg/utils/common
symbols:
- HTTPGetResponse
skip_fix: "TODO: Revisit this reason. (Running fix causes error containing unknown revision konnectivity-client/v0.0.0)"
skip_fix: 'TODO: Revisit this reason. (Running fix causes error containing
unknown revision konnectivity-client/v0.0.0)'
description: |-
When using Helm Chart as the component delivery method, the request address
of the warehouse is not restricted, and there is a blind SSRF vulnerability.