зеркало из https://github.com/golang/vulndb.git
internal/report, data/reports: require summary field in YAML
Adds a lint check to require a non-empty summary field in YAML reports, and backfills summary field for all old reports with a TODO. (This TODO is OK because the summary field is not yet published to OSV.) For golang/go#56443 Change-Id: I368d48ceca35ed74a0461550d5386ae7ff85be1a Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/493595 Reviewed-by: Tim King <taking@google.com> Reviewed-by: Tatiana Bradley <tatianabradley@google.com> Run-TryBot: Tatiana Bradley <tatianabradley@google.com> TryBot-Result: Gopher Robot <gobot@golang.org>
This commit is contained in:
Родитель
2e4c4f6ae4
Коммит
7c92a880cc
|
@ -12,6 +12,7 @@ modules:
|
|||
- Logger
|
||||
- LoggerWithFormatter
|
||||
- LoggerWithWriter
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
The default Formatter for the Logger middleware (LoggerConfig.Formatter),
|
||||
which is included in the Default engine, allows attackers to inject arbitrary
|
||||
|
|
|
@ -5,6 +5,7 @@ modules:
|
|||
vulnerable_at: 0.21.0
|
||||
packages:
|
||||
- package: github.com/revel/revel
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
An attacker can cause an application that accepts slice parameters
|
||||
(https://revel.github.io/manual/parameters.html#slices) to allocate large
|
||||
|
|
|
@ -13,6 +13,7 @@ modules:
|
|||
derived_symbols:
|
||||
- ListenAndServe
|
||||
- ListenAndServeTLS
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
If any of the ListenAndServe functions are called with an empty token,
|
||||
token authentication is disabled globally for all listeners.
|
||||
|
|
|
@ -12,6 +12,7 @@ modules:
|
|||
- Create
|
||||
- Repair
|
||||
- Verify
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Malformed WALs can be constructed such that WAL.ReadAll can cause attempted
|
||||
out of bounds reads, or creation of arbitrarily sized slices, which may be used as
|
||||
|
|
|
@ -13,6 +13,7 @@ modules:
|
|||
- ListenAndServeTLS
|
||||
- Server.ActivateAndServe
|
||||
- Server.ListenAndServe
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
An attacker may prevent TCP connections to a Server by opening
|
||||
a connection and leaving it idle, until the connection is closed by
|
||||
|
|
|
@ -12,6 +12,7 @@ modules:
|
|||
- ScmpFilter.AddRuleConditional
|
||||
- ScmpFilter.AddRuleConditionalExact
|
||||
- ScmpFilter.AddRuleExact
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Filters containing rules with multiple syscall arguments are improperly
|
||||
constructed, such that all arguments are required to match rather than
|
||||
|
|
|
@ -13,6 +13,7 @@ modules:
|
|||
- Msg.SetNotify
|
||||
- Msg.SetQuestion
|
||||
- Msg.SetUpdate
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
DNS message transaction IDs are generated using math/rand which
|
||||
makes them relatively predictable. This reduces the complexity
|
||||
|
|
|
@ -42,6 +42,7 @@ modules:
|
|||
derived_symbols:
|
||||
- genericEncrypter.Encrypt
|
||||
- genericEncrypter.EncryptWithAuthData
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
On 32-bit platforms an attacker can manipulate a ciphertext encrypted with AES-CBC
|
||||
with HMAC such that they can control how large the input buffer is when computing
|
||||
|
|
|
@ -14,6 +14,7 @@ modules:
|
|||
- ecDecrypterSigner.decryptKey
|
||||
derived_symbols:
|
||||
- JsonWebKey.UnmarshalJSON
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
When using ECDH-ES an attacker can mount an invalid curve attack during
|
||||
decryption as the supplied public key is not checked to be on the same
|
||||
|
|
|
@ -28,6 +28,7 @@ modules:
|
|||
- ParsePublicKey
|
||||
- ParseRawPrivateKey
|
||||
- ParseRawPrivateKeyWithPassphrase
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
An attacker can craft an ssh-ed25519 or sk-ssh-ed25519@openssh.com public
|
||||
key, such that the library will panic when trying to verify a signature
|
||||
|
|
|
@ -9,6 +9,7 @@ modules:
|
|||
- NewClientConn
|
||||
derived_symbols:
|
||||
- Dial
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
By default host key verification is disabled which allows for
|
||||
man-in-the-middle attacks against SSH clients if
|
||||
|
|
|
@ -11,6 +11,7 @@ modules:
|
|||
derived_symbols:
|
||||
- Parse
|
||||
- ParseFragment
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
html.Parse does not properly handle "select" tags, which can lead
|
||||
to an infinite loop. If parsing user supplied input, this may be used
|
||||
|
|
|
@ -12,6 +12,7 @@ modules:
|
|||
- package: golang.org/x/text/transform
|
||||
symbols:
|
||||
- String
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
An attacker could provide a single byte to a UTF16 decoder instantiated with
|
||||
UseBOM or ExpectBOM to trigger an infinite loop if the String function on
|
||||
|
|
|
@ -11,6 +11,7 @@ modules:
|
|||
- Reader.Read
|
||||
- blockHeader.UnmarshalBinary
|
||||
- streamReader.Read
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
An attacker can construct a series of bytes such that calling
|
||||
Reader.Read on the bytes could cause an infinite loop. If
|
||||
|
|
|
@ -15,6 +15,7 @@ modules:
|
|||
- package: github.com/dgrijalva/jwt-go/v4
|
||||
symbols:
|
||||
- MapClaims.VerifyAudience
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
If a JWT contains an audience claim with an array of strings, rather
|
||||
than a single string, and MapClaims.VerifyAudience is called with
|
||||
|
|
|
@ -40,6 +40,7 @@ modules:
|
|||
- proxy_envOnce.Get
|
||||
- proxy_socks5.Dial
|
||||
- truncWriter.Write
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
An attacker can craft malicious WebSocket frames that cause an integer
|
||||
overflow in a variable which tracks the number of bytes remaining. This
|
||||
|
|
|
@ -7,6 +7,7 @@ modules:
|
|||
- package: github.com/gorilla/handlers
|
||||
symbols:
|
||||
- cors.ServeHTTP
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Usage of the CORS handler may apply improper CORS headers, allowing
|
||||
the requester to explicitly control the value of the Access-Control-Allow-Origin
|
||||
|
|
|
@ -10,6 +10,7 @@ modules:
|
|||
- SearchRepositoryByName
|
||||
- SearchUserByName
|
||||
skip_fix: 'TODO: Revisit this reason (Some dependencies no longer exist)'
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper santization of user input, a number of methods are
|
||||
vulnerable to SQL injection if used with user input that has not
|
||||
|
|
|
@ -7,6 +7,7 @@ modules:
|
|||
- package: github.com/cloudflare/golz4
|
||||
symbols:
|
||||
- Uncompress
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
LZ4 bindings use a deprecated C API that is vulnerable to
|
||||
memory corruption, which could lead to arbitrary code execution
|
||||
|
|
|
@ -9,6 +9,7 @@ modules:
|
|||
- Algorithm.validateSignature
|
||||
derived_symbols:
|
||||
- Algorithm.Validate
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Token validation methods are susceptible to a timing side-channel
|
||||
during HMAC comparison. With a large enough number of requests
|
||||
|
|
|
@ -17,6 +17,7 @@ modules:
|
|||
symbols:
|
||||
- proxiedConn.LocalAddr
|
||||
- proxiedConn.RemoteAddr
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
The RemoteAddr and LocalAddr methods on the returned net.Conn may
|
||||
call themselves, leading to an infinite loop which will crash the
|
||||
|
|
|
@ -13,6 +13,7 @@ modules:
|
|||
- tarExtractor.Extract
|
||||
- tgzExtractor.Extract
|
||||
- zipExtractor.Extract
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper path santization, archives containing relative file
|
||||
paths can cause files to be written (or overwritten) outside of the
|
||||
|
|
|
@ -12,6 +12,7 @@ modules:
|
|||
derived_symbols:
|
||||
- stiTar.ExtractTarStream
|
||||
- stiTar.ExtractTarStreamWithLogging
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper path santization, archives containing relative file
|
||||
paths can cause files to be written (or overwritten) outside of the
|
||||
|
|
|
@ -20,6 +20,7 @@ modules:
|
|||
- InsertKey
|
||||
- RemoveKey
|
||||
- UserKeyringID
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
After dropping and then elevating process privileges euid, guid, and groups
|
||||
are not properly restored to their original values, allowing an unprivileged
|
||||
|
|
|
@ -11,6 +11,7 @@ modules:
|
|||
- NewRR
|
||||
- ParseZone
|
||||
- ReadRR
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to a nil pointer dereference, parsing a malformed zone file
|
||||
containing TA records may cause a panic. If parsing user supplied
|
||||
|
|
|
@ -32,6 +32,7 @@ modules:
|
|||
- Controller.FileHandler
|
||||
skip_fix: 'TODO: revisit this reason (goa.design/goa/v3 appears to not be
|
||||
a package, but I could not locate the fix for this issue in v3)'
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper santization of user input, Controller.FileHandler allows
|
||||
for directory traversal, allowing an attacker to read files outside of
|
||||
|
|
|
@ -11,6 +11,7 @@ modules:
|
|||
- Application.Run
|
||||
- Application.ServeHTTP
|
||||
- Application.Start
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper santization of user input, HTTPEngine.Handle allows
|
||||
for directory traversal, allowing an attacker to read files outside of
|
||||
|
|
|
@ -7,6 +7,7 @@ modules:
|
|||
- package: github.com/artdarek/go-unzip
|
||||
symbols:
|
||||
- Unzip.Extract
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper path santization, archives containing relative file
|
||||
paths can cause files to be written (or overwritten) outside of the
|
||||
|
|
|
@ -7,6 +7,7 @@ modules:
|
|||
- package: github.com/yi-ge/unzip
|
||||
symbols:
|
||||
- Unzip.Extract
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper path santization, archives containing relative file
|
||||
paths can cause files to be written (or overwritten) outside of the
|
||||
|
|
|
@ -31,6 +31,7 @@ modules:
|
|||
- Decoder.Decode
|
||||
- Unmarshal
|
||||
- UnmarshalStrict
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to unbounded aliasing, a crafted YAML file can cause consumption
|
||||
of significant system resources. If parsing user supplied input, this
|
||||
|
|
|
@ -10,6 +10,7 @@ modules:
|
|||
derived_symbols:
|
||||
- NewJSONRPCClient
|
||||
- NewURIClient
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to support of Gzip compression in request bodies, as well
|
||||
as a lack of limiting response body sizes, a malicious server
|
||||
|
|
|
@ -13,6 +13,7 @@ modules:
|
|||
- Listener.Accept
|
||||
- Resume
|
||||
- Server
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper verification of packets, unencrypted packets containing
|
||||
application data are accepted after the initial handshake. This allows
|
||||
|
|
|
@ -13,6 +13,7 @@ modules:
|
|||
- Macaron.Run
|
||||
- Macaron.ServeHTTP
|
||||
- Router.ServeHTTP
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper request santization, a specifically crafted URL
|
||||
can cause the static file handler to redirect to an attacker chosen
|
||||
|
|
|
@ -3,6 +3,7 @@ modules:
|
|||
vulnerable_at: 0.0.0-20201219151056-5a20f3199263
|
||||
packages:
|
||||
- package: github.com/shiyanhui/dht
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to unchecked type assertions, maliciously crafted messages can
|
||||
cause panics, which may be used as a denial of service vector.
|
||||
|
|
|
@ -30,6 +30,7 @@ modules:
|
|||
- ZipArchive.Close
|
||||
- ZipArchive.ExtractTo
|
||||
- ZipArchive.Flush
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper path santization, archives containing relative file
|
||||
paths can cause files to be written (or overwritten) outside of the
|
||||
|
|
|
@ -7,6 +7,7 @@ modules:
|
|||
- package: github.com/sassoftware/go-rpmutils/cpio
|
||||
symbols:
|
||||
- Extract
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper path santization, RPMs containing relative file
|
||||
paths can cause files to be written (or overwritten) outside of the
|
||||
|
|
|
@ -11,6 +11,7 @@ modules:
|
|||
- assertConfigsCompatible
|
||||
skip_fix: 'TODO: revisit this reason. (cannot find module providing package
|
||||
github.com/lucas-clemente/quic-go/h2quic)'
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper TLS verification when serving traffic for multiple
|
||||
SNIs, an attacker may bypass TLS client authentication by indicating
|
||||
|
|
|
@ -10,6 +10,7 @@ modules:
|
|||
derived_symbols:
|
||||
- Context.Render
|
||||
- Context.RenderFromString
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
CSRF tokens are generated using math/rand, which is not a cryptographically
|
||||
secure random number generator, allowing an attacker to predict values and
|
||||
|
|
|
@ -22,6 +22,7 @@ modules:
|
|||
- SAMLServiceProvider.ValidateEncodedLogoutRequestPOST
|
||||
- SAMLServiceProvider.ValidateEncodedLogoutResponsePOST
|
||||
- SAMLServiceProvider.ValidateEncodedResponse
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to a nil pointer dereference, a malformed XML Digital Signature
|
||||
can cause a panic during validation. If user supplied signatures are
|
||||
|
|
|
@ -9,6 +9,7 @@ modules:
|
|||
- NewSignedResponse
|
||||
derived_symbols:
|
||||
- ServiceProviderSettings.GetAuthnRequest
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
XML Digital Signatures generated and validated using this package use
|
||||
SHA-1, which may allow an attacker to craft inputs which cause hash
|
||||
|
|
|
@ -7,6 +7,7 @@ modules:
|
|||
- package: github.com/antchfx/xmlquery
|
||||
symbols:
|
||||
- LoadURL
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
LoadURL does not check the Content-Type of loaded resources,
|
||||
which can cause a panic due to nil pointer deference if the loaded
|
||||
|
|
|
@ -10,6 +10,7 @@ modules:
|
|||
- verifyToken
|
||||
derived_symbols:
|
||||
- CSRFHandler.ServeHTTP
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper validation of caller input, validation is silently disabled
|
||||
if the provided expected token is malformed, causing any user supplied token
|
||||
|
|
|
@ -9,6 +9,7 @@ modules:
|
|||
- ValidationContext.findSignature
|
||||
derived_symbols:
|
||||
- ValidationContext.Validate
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to the behavior of encoding/xml, a crafted XML document may cause
|
||||
XML Digital Signature validation to be entirely bypassed, causing an
|
||||
|
|
|
@ -12,6 +12,7 @@ modules:
|
|||
derived_symbols:
|
||||
- Echo.Static
|
||||
- Group.Static
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper sanitization of user input on Windows, the static file handler
|
||||
allows for directory traversal, allowing an attacker to read files outside of
|
||||
|
|
|
@ -17,6 +17,7 @@ modules:
|
|||
- Engine.RunTLS
|
||||
- Engine.RunUnix
|
||||
- Engine.ServeHTTP
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper HTTP header santization, a malicious user can spoof their
|
||||
source IP address by setting the X-Forwarded-For header. This may allow
|
||||
|
|
|
@ -8,6 +8,7 @@ modules:
|
|||
symbols:
|
||||
- unmarshal.field
|
||||
- unmarshal.Generate
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper bounds checking, maliciously crafted input to generated
|
||||
Unmarshal methods can cause an out-of-bounds panic. If parsing messages
|
||||
|
|
|
@ -9,6 +9,7 @@ modules:
|
|||
- unwrap
|
||||
derived_symbols:
|
||||
- Result.ForEach
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper bounds checking, maliciously crafted JSON objects
|
||||
can cause an out-of-bounds panic. If parsing user input, this may
|
||||
|
|
|
@ -28,6 +28,7 @@ modules:
|
|||
- GetUnsafeString
|
||||
- ObjectEach
|
||||
- Set
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper bounds checking, maliciously crafted JSON objects
|
||||
can cause an out-of-bounds panic. If parsing user input, this may
|
||||
|
|
|
@ -26,6 +26,7 @@ modules:
|
|||
- FetchMetadata
|
||||
- Middleware.ServeHTTP
|
||||
- New
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to the behavior of encoding/xml, a crafted XML document may cause
|
||||
XML Digital Signature validation to be entirely bypassed, causing an
|
||||
|
|
|
@ -16,6 +16,7 @@ modules:
|
|||
- Result.Get
|
||||
- Result.Map
|
||||
- Result.Value
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper bounds checking, maliciously crafted JSON objects
|
||||
can cause an out-of-bounds panic. If parsing user input, this may
|
||||
|
|
|
@ -12,6 +12,7 @@ modules:
|
|||
- SAMLServiceProvider.ValidateEncodedLogoutRequestPOST
|
||||
- SAMLServiceProvider.ValidateEncodedLogoutResponsePOST
|
||||
- SAMLServiceProvider.ValidateEncodedResponse
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to the behavior of encoding/xml, a crafted XML document may cause
|
||||
XML Digital Signature validation to be entirely bypassed, causing an
|
||||
|
|
|
@ -21,6 +21,7 @@ modules:
|
|||
- Decoder.Decode
|
||||
- Unmarshal
|
||||
- UnmarshalStrict
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to unbounded alias chasing, a maliciously crafted YAML file
|
||||
can cause the system to consume significant system resources. If
|
||||
|
|
|
@ -9,6 +9,7 @@ modules:
|
|||
- serverHandler.handleMsg
|
||||
derived_symbols:
|
||||
- PrivateLightServerAPI.Benchmark
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to a nil pointer dereference, a malicously crafted RPC message
|
||||
can cause a panic. If handling RPC messages from untrusted clients,
|
||||
|
|
|
@ -22,6 +22,7 @@ modules:
|
|||
symbols:
|
||||
- requestInfo.toCurl
|
||||
skip_fix: 'TODO: revisit this reason (module does not contain package k8s.io/kubernetes/staging/src/k8s.io/client-go/transport)'
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Authorization tokens may be inappropriately logged if the verbosity
|
||||
level is set to a debug level.
|
||||
|
|
|
@ -21,6 +21,7 @@ modules:
|
|||
symbols:
|
||||
- debuggingRoundTripper.RoundTrip
|
||||
skip_fix: 'TODO: revisit this reason (module does not contain package k8s.io/kubernetes/staging/src/k8s.io/client-go/transport)'
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Authorization tokens may be inappropriately logged if the verbosity
|
||||
level is set to a debug level.
|
||||
|
|
|
@ -10,6 +10,7 @@ modules:
|
|||
- readDockerConfigJSONFileFromBytes
|
||||
skip_fix: 'TODO: revisit this reason (reading k8s.io/api/go.mod at revision
|
||||
v0.0.0: unknown revision v0.0.0)'
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Attempting to read a malformed .dockercfg may cause secrets to be
|
||||
inappropriately logged.
|
||||
|
|
|
@ -9,6 +9,7 @@ modules:
|
|||
symbols:
|
||||
- toValidName
|
||||
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Using Reader.Open on an archive containing a file with a path
|
||||
prefixed by "../" will cause a panic due to a stack overflow.
|
||||
|
|
|
@ -11,6 +11,7 @@ modules:
|
|||
goos:
|
||||
- windows
|
||||
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
The go command may execute arbitrary code at build time when using cgo on Windows.
|
||||
This can be triggered by running go get on a malicious module, or any other time
|
||||
|
|
|
@ -11,6 +11,7 @@ modules:
|
|||
symbols:
|
||||
- nat.divRecursiveStep
|
||||
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
A number of math/big.Int methods can panic when provided large inputs due
|
||||
to a flawed division method.
|
||||
|
|
|
@ -9,6 +9,7 @@ modules:
|
|||
- GetExecUser
|
||||
derived_symbols:
|
||||
- GetExecUserPath
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
GetExecUser in the github.com/opencontainers/runc/libcontainer/user package will
|
||||
improperly interpret numeric UIDs as usernames. If the method is used without
|
||||
|
|
|
@ -10,6 +10,7 @@ modules:
|
|||
skip_fix: 'TODO: Revisit this reason (Fix causes error containing cannot find
|
||||
module providing package github.com/chai2010/gettext-go/gettext - possibly
|
||||
an issue with lack of go.mod file in affected version)'
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
A race between chown and chmod operations during a container
|
||||
filesystem shift may allow a user who can modify the filesystem to
|
||||
|
|
|
@ -29,6 +29,7 @@ modules:
|
|||
- manifestStore.Get
|
||||
- registry.Enumerate
|
||||
- registry.Repositories
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Various storage methods do not impose limits on how much content is accepted
|
||||
from user requests, allowing a malicious user to force the caller to allocate
|
||||
|
|
|
@ -11,6 +11,7 @@ modules:
|
|||
- Client.NewRequest
|
||||
- sshAuthClient.Resolve
|
||||
- sshCache.Resolve
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Arbitrary command execution can be triggered by improperly
|
||||
sanitized SSH URLs in LFS configuration files. This can be
|
||||
|
|
|
@ -9,6 +9,7 @@ modules:
|
|||
- ProtocolManager.handleMsg
|
||||
skip_fix: 'TODO: revisit this reason (cannot find module providing package
|
||||
github.com/hashicorp/golang-lru)'
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper argument validation in RPC messages, a maliciously crafted
|
||||
message can cause a panic, leading to denial of service.
|
||||
|
|
|
@ -12,6 +12,7 @@ modules:
|
|||
derived_symbols:
|
||||
- Patch.Apply
|
||||
- Patch.ApplyIndent
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
A malicious JSON patch can cause a panic due to an out-of-bounds
|
||||
write attempt. This can be used as a denial of service vector if
|
||||
|
|
|
@ -7,6 +7,7 @@ modules:
|
|||
- package: go.etcd.io/etcd/auth
|
||||
symbols:
|
||||
- authStore.AuthInfoFromTLS
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
A user can use a valid client certificate that contains a CommonName that matches a
|
||||
valid RBAC username to authenticate themselves as that user, despite lacking the
|
||||
|
|
|
@ -11,6 +11,7 @@ modules:
|
|||
derived_symbols:
|
||||
- Parse
|
||||
- ParseFragment
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
The HTML parser does not properly handle "in frameset" insertion mode, and can be made
|
||||
to panic when operating on malformed HTML that contains <template> tags. If operating
|
||||
|
|
|
@ -9,6 +9,7 @@ modules:
|
|||
- Network.checkTopicRegister
|
||||
skip_fix: 'TODO: Revisit this reason. (Fix causes error containing cannot
|
||||
find module providing package github.com/bytom/common)'
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
A malformed query can cause an out-of-bounds panic due to improper
|
||||
validation of arguments. If processing queries from untrusted
|
||||
|
|
|
@ -28,6 +28,7 @@ modules:
|
|||
- dockerReference.NewImageSource
|
||||
- dockerReference.PolicyConfigurationIdentity
|
||||
- dockerTransport.ParseReference
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
The HTTP client used to connect to the container registry authorization
|
||||
service explicitly disables TLS verification, allowing an attacker that
|
||||
|
|
|
@ -5,6 +5,7 @@ modules:
|
|||
vulnerable_at: 0.31.1-0.20200311052902-c8800899625e
|
||||
packages:
|
||||
- package: github.com/facebook/fbthrift/thrift/lib/go/thrift
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Thirft Servers preallocate memory for the declared size of messages before
|
||||
checking the actual size of the message. This allows a malicious user to
|
||||
|
|
|
@ -9,6 +9,7 @@ modules:
|
|||
- Adaptor.newTLSConfig
|
||||
derived_symbols:
|
||||
- Adaptor.Connect
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
TLS certificate verification is skipped when connecting to a MQTT server.
|
||||
This allows an attacker who can MITM the connection to read, or forge,
|
||||
|
|
|
@ -8,6 +8,7 @@ modules:
|
|||
symbols:
|
||||
- FileProvider.SessionRead
|
||||
- FileProvider.SessionRegenerate
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Session data is stored using permissive permissions, allowing local users
|
||||
with filesystem access to read arbitrary data.
|
||||
|
|
|
@ -20,6 +20,7 @@ modules:
|
|||
- readCon
|
||||
- writeCon
|
||||
skip_fix: 'TODO: revisit this reason (readCon and writeCon: func not found)'
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
AppArmor restrictions may be bypassed due to improper validation of mount
|
||||
targets, allowing a malicious image to mount volumes over e.g. /proc.
|
||||
|
|
|
@ -7,6 +7,7 @@ modules:
|
|||
- package: github.com/documize/community/domain/section/markdown
|
||||
symbols:
|
||||
- Provider.Render
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
HTML content in markdown is not santized during rendering, possibly allowing
|
||||
XSS if used to render untrusted user input.
|
||||
|
|
|
@ -9,6 +9,7 @@ modules:
|
|||
- mountToRootfs
|
||||
skip_fix: 'TODO: Revisit this reason. (Fix causes multiple errors (dependent
|
||||
fields/methods undefined)'
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
A race while mounting volumes allows a possible symlink-exchange
|
||||
attack, allowing a user whom can start multiple containers with
|
||||
|
|
|
@ -21,6 +21,7 @@ modules:
|
|||
- SimpleServer.ServeContext
|
||||
- SkipDefaultDepth
|
||||
- applicationException.Read
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Skip ignores unknown fields, rather than failing. A malicious user can craft small
|
||||
messages with unknown fields which can take significant resources to parse. If a
|
||||
|
|
|
@ -9,6 +9,7 @@ modules:
|
|||
- findKeyStart
|
||||
derived_symbols:
|
||||
- Delete
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Parsing malformed JSON which contain opening brackets, but not closing brackets,
|
||||
leads to an infinite loop. If operating on untrusted user input this can be
|
||||
|
|
|
@ -10,6 +10,7 @@ modules:
|
|||
- VoteSet.MakeCommit
|
||||
derived_symbols:
|
||||
- MakeCommit
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Proposed commits may contain signatures for blocks not contained
|
||||
within the commit. Instead of skipping these signatures, they
|
||||
|
|
|
@ -7,6 +7,7 @@ modules:
|
|||
- package: github.com/hashicorp/go-slug
|
||||
symbols:
|
||||
- Unpack
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Protections against directory traversal during archive extraction can be
|
||||
bypassed by chaining multiple symbolic links within the archive. This allows
|
||||
|
|
|
@ -7,6 +7,7 @@ modules:
|
|||
- package: github.com/google/go-tpm/tpm
|
||||
symbols:
|
||||
- CreateWrapKey
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to repeated usage of a XOR key an attacker that can eavesdrop on the TPM 1.2 transport
|
||||
is able to calculate usageAuth for keys created using CreateWrapKey, despite it being encrypted,
|
||||
|
|
|
@ -5,6 +5,7 @@ modules:
|
|||
vulnerable_at: 0.1.1-0.20191030043844-e5586b79c357
|
||||
packages:
|
||||
- package: github.com/proglottis/gpgme
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper setting of finalizers, memory passed to C may be freed before it is used,
|
||||
leading to crashes due to memory corruption or possible code execution.
|
||||
|
|
|
@ -15,6 +15,7 @@ modules:
|
|||
- ReadDSFTags
|
||||
- ReadFrom
|
||||
- ReadID3v2Tags
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper bounds checking, a number of methods can trigger a panic due to attempted
|
||||
out-of-bounds reads. If the package is used to parse user supplied input, this may be
|
||||
|
|
|
@ -49,6 +49,7 @@ modules:
|
|||
- Client.NewRequest
|
||||
- Client.Transport
|
||||
- sshCache.Resolve
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to the standard library behavior of exec.LookPath on Windows a number of methods may
|
||||
result in arbitrary code execution when cloning or operating on untrusted Git repositories.
|
||||
|
|
|
@ -9,6 +9,7 @@ modules:
|
|||
- extractTarDirectory
|
||||
derived_symbols:
|
||||
- fileWriter.Commit
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper path validation, using the github.com/deislabs/oras/pkg/content.FileStore
|
||||
content store may result in directory traversal during archive extraction, allowing a
|
||||
|
|
|
@ -21,6 +21,7 @@ modules:
|
|||
- Untar
|
||||
- UntarPath
|
||||
- UntarUncompressed
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to a goroutine deadlock, using github.com/containers/storage/pkg/archive.DecompressStream
|
||||
on a xz archive returns a reader which will hang indefinitely when Close is called. An attacker
|
||||
|
|
|
@ -59,6 +59,7 @@ modules:
|
|||
- TStandardClient.Call
|
||||
- TStandardClient.Recv
|
||||
- tApplicationException.Read
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to an improper bounds check, parsing maliciously crafted messages can cause panics. If
|
||||
this package is used to parse untrusted input, this may be used as a vector for a denial of
|
||||
|
|
|
@ -15,6 +15,7 @@ modules:
|
|||
- package: github.com/cloudfoundry/gorouter/common/secure
|
||||
symbols:
|
||||
- AesGCM.Decrypt
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper input validation, a maliciously crafted input can cause a panic, due to incorrect
|
||||
nonce size. If this package is used to decrypt user supplied messages without checking the size of
|
||||
|
|
|
@ -15,6 +15,7 @@ modules:
|
|||
- Int.MulMod
|
||||
- Int.SDiv
|
||||
- Int.SMod
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper bounds checking, certain mathmatical operations can cause a panic via an
|
||||
out of bounds read. If this package is used to process untrusted user inputs, this may be used
|
||||
|
|
|
@ -17,6 +17,7 @@ modules:
|
|||
- PeerConnection.SetRemoteDescription
|
||||
- operations.Done
|
||||
- operations.Enqueue
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper error handling, DTLS connections were not killed when certificate verification
|
||||
failed, causing users who did not check the connection state to continue to use the connection.
|
||||
|
|
|
@ -18,6 +18,7 @@ modules:
|
|||
- StateDB.SetState
|
||||
- StateDB.SetStorage
|
||||
- StateDB.SubBalance
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to an incorrect state calculation, a specific set of
|
||||
transactions could cause a consensus disagreement,
|
||||
|
|
|
@ -9,6 +9,7 @@ modules:
|
|||
- Extractor.outputPath
|
||||
derived_symbols:
|
||||
- Extractor.Extract
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper path santization, archives containing relative file
|
||||
paths can cause files to be written (or overwritten) outside of the
|
||||
|
|
|
@ -10,6 +10,7 @@ modules:
|
|||
- Server.socketHandler
|
||||
derived_symbols:
|
||||
- Server.Socket
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Web Sockets do not execute any AuthenticateMethod methods which may be set,
|
||||
leading to a nil pointer dereference if the returned UserData pointer is
|
||||
|
|
|
@ -7,6 +7,7 @@ modules:
|
|||
- package: github.com/gofiber/fiber
|
||||
symbols:
|
||||
- Ctx.Attachment
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper input sanitization, a maliciously constructed filename
|
||||
could cause a file download to use an attacker controlled filename, as well
|
||||
|
|
|
@ -7,6 +7,7 @@ modules:
|
|||
- package: github.com/ory/fosite/handler/oauth2
|
||||
symbols:
|
||||
- TokenRevocationHandler.RevokeToken
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper error handling, an error with the underlying token storage may cause a user
|
||||
to believe a token has been successfully revoked when it is in fact still valid. An attackers
|
||||
|
|
|
@ -10,6 +10,7 @@ modules:
|
|||
derived_symbols:
|
||||
- Fosite.NewAccessRequest
|
||||
- Fosite.NewRevocationRequest
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Uniqueness of JWT IDs (jti) are not checked, allowing the JWT to be
|
||||
replayed.
|
||||
|
|
|
@ -123,6 +123,7 @@ modules:
|
|||
- valueWriter.WriteTimestamp
|
||||
- valueWriter.WriteUndefined
|
||||
- valueWriter.WriteValueBytes
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper input sanitization when marshalling Go objects into BSON, a maliciously constructed
|
||||
Go structure could allow an attacker to inject additional fields into a MongoDB document. Users are
|
||||
|
|
|
@ -11,6 +11,7 @@ modules:
|
|||
- MatchStrings
|
||||
- MustParse
|
||||
- ParseAcceptLanguage
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
Due to improper index calculation, an incorrectly formatted language tag can cause Parse
|
||||
to panic via an out of bounds read. If Parse is used to process untrusted user inputs,
|
||||
|
|
|
@ -10,6 +10,7 @@ modules:
|
|||
symbols:
|
||||
- ReadUvarint
|
||||
- ReadVarint
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
ReadUvarint and ReadVarint can read an unlimited number of bytes from
|
||||
invalid inputs.
|
||||
|
|
|
@ -10,6 +10,7 @@ modules:
|
|||
- checkForResumption
|
||||
- decryptTicket
|
||||
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
When SessionTicketsDisabled is enabled, crypto/tls allowed man-in-the-middle
|
||||
attackers to spoof clients via unspecified vectors.
|
||||
|
|
|
@ -16,6 +16,7 @@ modules:
|
|||
- transferWriter.shouldSendContentLength
|
||||
- validHeaderFieldByte
|
||||
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
|
||||
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
|
||||
description: |
|
||||
HTTP headers were not properly parsed, which allows remote attackers to
|
||||
conduct HTTP request smuggling attacks via a request that contains
|
||||
|
|
Некоторые файлы не были показаны из-за слишком большого количества измененных файлов Показать больше
Загрузка…
Ссылка в новой задаче