зеркало из https://github.com/golang/vulndb.git
data/reports: add 15 reports
- data/reports/GO-2024-3161.yaml - data/reports/GO-2024-3162.yaml - data/reports/GO-2024-3163.yaml - data/reports/GO-2024-3166.yaml - data/reports/GO-2024-3167.yaml - data/reports/GO-2024-3168.yaml - data/reports/GO-2024-3169.yaml - data/reports/GO-2024-3170.yaml - data/reports/GO-2024-3172.yaml - data/reports/GO-2024-3173.yaml - data/reports/GO-2024-3174.yaml - data/reports/GO-2024-3175.yaml - data/reports/GO-2024-3179.yaml - data/reports/GO-2024-3181.yaml - data/reports/GO-2024-3182.yaml Fixes golang/vulndb#3161 Fixes golang/vulndb#3162 Fixes golang/vulndb#3163 Fixes golang/vulndb#3166 Fixes golang/vulndb#3167 Fixes golang/vulndb#3168 Fixes golang/vulndb#3169 Fixes golang/vulndb#3170 Fixes golang/vulndb#3172 Fixes golang/vulndb#3173 Fixes golang/vulndb#3174 Fixes golang/vulndb#3175 Fixes golang/vulndb#3179 Fixes golang/vulndb#3181 Fixes golang/vulndb#3182 Change-Id: I6f47e813357034a674970920b6f0de6f4abac032 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/619135 LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Reviewed-by: Tatiana Bradley <tatianabradley@google.com> Auto-Submit: Maceo Thompson <maceothompson@google.com>
This commit is contained in:
Родитель
7a4bd20efd
Коммит
8c4ccf869d
|
@ -0,0 +1,75 @@
|
|||
{
|
||||
"schema_version": "1.3.1",
|
||||
"id": "GO-2024-3161",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2024-22030",
|
||||
"GHSA-h4h5-9833-v2p4"
|
||||
],
|
||||
"summary": "Rancher agents can be hijacked by taking over the Rancher Server URL in github.com/rancher/rancher",
|
||||
"details": "Rancher agents can be hijacked by taking over the Rancher Server URL in github.com/rancher/rancher.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/rancher/rancher from v2.7.0 before v2.7.15, from v2.8.0 before v2.8.8, from v2.9.0 before v2.9.2.",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/rancher/rancher",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {
|
||||
"custom_ranges": [
|
||||
{
|
||||
"type": "ECOSYSTEM",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "2.7.0"
|
||||
},
|
||||
{
|
||||
"fixed": "2.7.15"
|
||||
},
|
||||
{
|
||||
"introduced": "2.8.0"
|
||||
},
|
||||
{
|
||||
"fixed": "2.8.8"
|
||||
},
|
||||
{
|
||||
"introduced": "2.9.0"
|
||||
},
|
||||
{
|
||||
"fixed": "2.9.2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://github.com/rancher/rancher/security/advisories/GHSA-h4h5-9833-v2p4"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/rancherlabs/support-tools/tree/master/windows-agent-strict-verify"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://ranchermanager.docs.rancher.com/getting-started/installation-and-upgrade/installation-references/tls-settings"
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-3161",
|
||||
"review_status": "UNREVIEWED"
|
||||
}
|
||||
}
|
|
@ -0,0 +1,52 @@
|
|||
{
|
||||
"schema_version": "1.3.1",
|
||||
"id": "GO-2024-3162",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2024-7594",
|
||||
"GHSA-jg74-mwgw-v6x3"
|
||||
],
|
||||
"summary": "Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default in github.com/hashicorp/vault",
|
||||
"details": "Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default in github.com/hashicorp/vault",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/hashicorp/vault",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "1.7.7"
|
||||
},
|
||||
{
|
||||
"fixed": "1.17.6"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://github.com/advisories/GHSA-jg74-mwgw-v6x3"
|
||||
},
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7594"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://discuss.hashicorp.com/t/hcsec-2024-20-vault-ssh-secrets-engine-configuration-did-not-restrict-valid-principals-by-default/70251"
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-3162",
|
||||
"review_status": "UNREVIEWED"
|
||||
}
|
||||
}
|
|
@ -0,0 +1,62 @@
|
|||
{
|
||||
"schema_version": "1.3.1",
|
||||
"id": "GO-2024-3163",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2024-47182"
|
||||
],
|
||||
"summary": "Dozzle uses unsafe hash for passwords in github.com/amir20/dozzle",
|
||||
"details": "Dozzle uses unsafe hash for passwords in github.com/amir20/dozzle.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/amir20/dozzle before v8.5.3.",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/amir20/dozzle",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {
|
||||
"custom_ranges": [
|
||||
{
|
||||
"type": "ECOSYSTEM",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
},
|
||||
{
|
||||
"fixed": "8.5.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47182"
|
||||
},
|
||||
{
|
||||
"type": "FIX",
|
||||
"url": "https://github.com/amir20/dozzle/commit/de79f03aa3dbe5bb1e154a7e8d3dccbd229f3ea3"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/amir20/dozzle/security/advisories/GHSA-w7qr-q9fh-fj35"
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-3163",
|
||||
"review_status": "UNREVIEWED"
|
||||
}
|
||||
}
|
|
@ -0,0 +1,77 @@
|
|||
{
|
||||
"schema_version": "1.3.1",
|
||||
"id": "GO-2024-3166",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2024-47534",
|
||||
"GHSA-4f8r-qqr9-fq8j"
|
||||
],
|
||||
"summary": "Incorrect delegation lookups can make go-tuf download the wrong artifact in github.com/theupdateframework/go-tuf",
|
||||
"details": "Incorrect delegation lookups can make go-tuf download the wrong artifact in github.com/theupdateframework/go-tuf",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/theupdateframework/go-tuf",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
},
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/theupdateframework/go-tuf/v2",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
},
|
||||
{
|
||||
"fixed": "2.0.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://github.com/theupdateframework/go-tuf/security/advisories/GHSA-4f8r-qqr9-fq8j"
|
||||
},
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47534"
|
||||
},
|
||||
{
|
||||
"type": "FIX",
|
||||
"url": "https://github.com/theupdateframework/go-tuf/commit/f36420caba9edbfdfd64f95a9554c0836d9cf819"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/theupdateframework/go-tuf/blob/f95222bdd22d2ac4e5b8ed6fe912b645e213c3b5/metadata/metadata.go#L565-L580"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/theupdateframework/tuf-conformance/pull/115"
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-3166",
|
||||
"review_status": "UNREVIEWED"
|
||||
}
|
||||
}
|
|
@ -0,0 +1,78 @@
|
|||
{
|
||||
"schema_version": "1.3.1",
|
||||
"id": "GO-2024-3167",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2024-9355",
|
||||
"GHSA-3h3x-2hwv-hr52"
|
||||
],
|
||||
"summary": "Golang FIPS OpenSSL has a Use of Uninitialized Variable vulnerability in github.com/golang-fips/openssl",
|
||||
"details": "Golang FIPS OpenSSL has a Use of Uninitialized Variable vulnerability in github.com/golang-fips/openssl",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/golang-fips/openssl",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
},
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/golang-fips/openssl/v2",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://github.com/advisories/GHSA-3h3x-2hwv-hr52"
|
||||
},
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9355"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:7502"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:7550"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-9355"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2315719"
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-3167",
|
||||
"review_status": "UNREVIEWED"
|
||||
}
|
||||
}
|
|
@ -0,0 +1,82 @@
|
|||
{
|
||||
"schema_version": "1.3.1",
|
||||
"id": "GO-2024-3168",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2024-8975",
|
||||
"GHSA-chqx-36rm-rf8h"
|
||||
],
|
||||
"summary": "Grafana Alloy on Windows has Unquoted Search Path or Element vulnerability in github.com/grafana/alloy",
|
||||
"details": "Grafana Alloy on Windows has Unquoted Search Path or Element vulnerability in github.com/grafana/alloy",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/grafana/alloy",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
},
|
||||
{
|
||||
"fixed": "1.3.4"
|
||||
},
|
||||
{
|
||||
"introduced": "1.4.0-rc.0"
|
||||
},
|
||||
{
|
||||
"fixed": "1.4.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://github.com/advisories/GHSA-chqx-36rm-rf8h"
|
||||
},
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8975"
|
||||
},
|
||||
{
|
||||
"type": "FIX",
|
||||
"url": "https://github.com/grafana/alloy/commit/88e779887690954c009503598a3f4bf563cb6596"
|
||||
},
|
||||
{
|
||||
"type": "FIX",
|
||||
"url": "https://github.com/grafana/alloy/commit/f14249012fd970d3fd73604e6fff9b6c7990a9bb"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/grafana/alloy/releases/tag/v1.3.4"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/grafana/alloy/releases/tag/v1.4.0"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/grafana/alloy/releases/tag/v1.4.1"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://grafana.com/blog/2024/09/25/grafana-alloy-and-grafana-agent-flow-security-release-high-severity-fix-for-cve-2024-8975-and-cve-2024-8996"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://grafana.com/security/security-advisories/cve-2024-8975"
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-3168",
|
||||
"review_status": "UNREVIEWED"
|
||||
}
|
||||
}
|
|
@ -0,0 +1,138 @@
|
|||
{
|
||||
"schema_version": "1.3.1",
|
||||
"id": "GO-2024-3169",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2024-9407",
|
||||
"GHSA-fhqq-8f65-5xfc"
|
||||
],
|
||||
"summary": "Improper Input Validation in Buildah and Podman in github.com/containers/buildah",
|
||||
"details": "Improper Input Validation in Buildah and Podman in github.com/containers/buildah",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/containers/buildah",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
},
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/containers/podman",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
},
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/containers/podman/v2",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
},
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/containers/podman/v3",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
},
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/containers/podman/v4",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
},
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/containers/podman/v5",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://github.com/advisories/GHSA-fhqq-8f65-5xfc"
|
||||
},
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9407"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-9407"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2315887"
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-3169",
|
||||
"review_status": "UNREVIEWED"
|
||||
}
|
||||
}
|
|
@ -0,0 +1,68 @@
|
|||
{
|
||||
"schema_version": "1.3.1",
|
||||
"id": "GO-2024-3170",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2024-8996",
|
||||
"GHSA-m5gv-m5f9-wgv4"
|
||||
],
|
||||
"summary": "Grafana Agent (Flow mode) on Windows has Unquoted Search Path or Element vulnerability in github.com/grafana/agent",
|
||||
"details": "Grafana Agent (Flow mode) on Windows has Unquoted Search Path or Element vulnerability in github.com/grafana/agent",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/grafana/agent",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
},
|
||||
{
|
||||
"fixed": "0.43.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://github.com/advisories/GHSA-m5gv-m5f9-wgv4"
|
||||
},
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8996"
|
||||
},
|
||||
{
|
||||
"type": "FIX",
|
||||
"url": "https://github.com/grafana/agent/commit/91bab2c05906938d3f8e1e3c61a863f037985299"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/grafana/agent/releases/tag/v0.43.2"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/grafana/agent/releases/tag/v0.43.3"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://grafana.com/blog/2024/09/25/grafana-alloy-and-grafana-agent-flow-security-release-high-severity-fix-for-cve-2024-8975-and-cve-2024-8996"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://grafana.com/security/security-advisories/cve-2024-8996"
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-3170",
|
||||
"review_status": "UNREVIEWED"
|
||||
}
|
||||
}
|
|
@ -0,0 +1,75 @@
|
|||
{
|
||||
"schema_version": "1.3.1",
|
||||
"id": "GO-2024-3172",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2024-33662",
|
||||
"GHSA-9mjw-79r6-c9m8"
|
||||
],
|
||||
"summary": "Portainer improperly uses an encryption algorithm in the AesEncrypt function in github.com/portainer/portainer",
|
||||
"details": "Portainer improperly uses an encryption algorithm in the AesEncrypt function in github.com/portainer/portainer.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/portainer/portainer before v2.20.2.",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/portainer/portainer",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {
|
||||
"custom_ranges": [
|
||||
{
|
||||
"type": "ECOSYSTEM",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
},
|
||||
{
|
||||
"fixed": "2.20.2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://github.com/advisories/GHSA-9mjw-79r6-c9m8"
|
||||
},
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-33662"
|
||||
},
|
||||
{
|
||||
"type": "REPORT",
|
||||
"url": "https://github.com/portainer/portainer/issues/11737"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/portainer/portainer/compare/2.20.1...2.20.2"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/search?q=repo%3Aportainer%2Fportainer+EE-6764\u0026type=pullrequests"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://www.portainer.io"
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-3172",
|
||||
"review_status": "UNREVIEWED"
|
||||
}
|
||||
}
|
|
@ -0,0 +1,52 @@
|
|||
{
|
||||
"schema_version": "1.3.1",
|
||||
"id": "GO-2024-3173",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2024-7558",
|
||||
"GHSA-mh98-763h-m9v4"
|
||||
],
|
||||
"summary": "JUJU_CONTEXT_ID is a predictable authentication secret in github.com/juju/juju",
|
||||
"details": "JUJU_CONTEXT_ID is a predictable authentication secret in github.com/juju/juju",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/juju/juju",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
},
|
||||
{
|
||||
"fixed": "0.0.0-20240826044107-ecd7e2d0e986"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://github.com/juju/juju/security/advisories/GHSA-mh98-763h-m9v4"
|
||||
},
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7558"
|
||||
},
|
||||
{
|
||||
"type": "FIX",
|
||||
"url": "https://github.com/juju/juju/commit/ecd7e2d0e9867576b9da04871e22232f06fa0cc7"
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-3173",
|
||||
"review_status": "UNREVIEWED"
|
||||
}
|
||||
}
|
|
@ -0,0 +1,60 @@
|
|||
{
|
||||
"schema_version": "1.3.1",
|
||||
"id": "GO-2024-3174",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2024-8037",
|
||||
"GHSA-8v4w-f4r9-7h6x"
|
||||
],
|
||||
"summary": "Vulnerable juju hook tool abstract UNIX domain socket in github.com/juju/juju",
|
||||
"details": "Vulnerable juju hook tool abstract UNIX domain socket in github.com/juju/juju",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/juju/juju",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
},
|
||||
{
|
||||
"fixed": "0.0.0-20240820065804-2f2ec128ef5a"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://github.com/juju/juju/security/advisories/GHSA-8v4w-f4r9-7h6x"
|
||||
},
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8037"
|
||||
},
|
||||
{
|
||||
"type": "FIX",
|
||||
"url": "https://github.com/juju/juju/commit/2f2ec128ef5a8ca81fc86ae79cfcdbab0007c206"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/juju/juju/blob/725800953aaa29dbeda4f806097bf838e61644dd/worker/uniter/paths.go#L222"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/juju/juju/security/advisories/GHSA-mh98-763h-m9v4"
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-3174",
|
||||
"review_status": "UNREVIEWED"
|
||||
}
|
||||
}
|
|
@ -0,0 +1,67 @@
|
|||
{
|
||||
"schema_version": "1.3.1",
|
||||
"id": "GO-2024-3175",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2024-8038",
|
||||
"GHSA-xwgj-vpm9-q2rq"
|
||||
],
|
||||
"summary": "Vulnerable juju introspection abstract UNIX domain socket in github.com/juju/juju",
|
||||
"details": "Vulnerable juju introspection abstract UNIX domain socket in github.com/juju/juju.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/juju/juju before v0.0.0-20240829052008-43f0fc59790d.",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/juju/juju",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {
|
||||
"custom_ranges": [
|
||||
{
|
||||
"type": "ECOSYSTEM",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
},
|
||||
{
|
||||
"fixed": "0.0.0-20240829052008-43f0fc59790d"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://github.com/juju/juju/security/advisories/GHSA-xwgj-vpm9-q2rq"
|
||||
},
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8038"
|
||||
},
|
||||
{
|
||||
"type": "FIX",
|
||||
"url": "https://github.com/juju/juju/commit/43f0fc59790d220a457d4d305f484f62be556d3b"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/juju/juju/blob/725800953aaa29dbeda4f806097bf838e61644dd/worker/introspection/worker.go#L125"
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-3175",
|
||||
"review_status": "UNREVIEWED"
|
||||
}
|
||||
}
|
|
@ -0,0 +1,56 @@
|
|||
{
|
||||
"schema_version": "1.3.1",
|
||||
"id": "GO-2024-3179",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2024-47616",
|
||||
"GHSA-r7rh-jww5-5fjr"
|
||||
],
|
||||
"summary": "Pomerium service account access token may grant unintended access to databroker API in github.com/pomerium/pomerium",
|
||||
"details": "Pomerium service account access token may grant unintended access to databroker API in github.com/pomerium/pomerium",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/pomerium/pomerium",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
},
|
||||
{
|
||||
"fixed": "0.27.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://github.com/pomerium/pomerium/security/advisories/GHSA-r7rh-jww5-5fjr"
|
||||
},
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47616"
|
||||
},
|
||||
{
|
||||
"type": "FIX",
|
||||
"url": "https://github.com/pomerium/pomerium/commit/e018cf0fc0979d2abe25ff705db019feb7523444"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/pomerium/pomerium/releases/tag/v0.27.1"
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-3179",
|
||||
"review_status": "UNREVIEWED"
|
||||
}
|
||||
}
|
|
@ -0,0 +1,67 @@
|
|||
{
|
||||
"schema_version": "1.3.1",
|
||||
"id": "GO-2024-3181",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2024-9313",
|
||||
"GHSA-x5q3-c8rm-w787"
|
||||
],
|
||||
"summary": "PAM module may allow accessing with the credentials of another user in github.com/ubuntu/authd",
|
||||
"details": "PAM module may allow accessing with the credentials of another user in github.com/ubuntu/authd.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/ubuntu/authd before v0.0.0-20240930103526-63e527496b01.",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/ubuntu/authd",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {
|
||||
"custom_ranges": [
|
||||
{
|
||||
"type": "ECOSYSTEM",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
},
|
||||
{
|
||||
"fixed": "0.0.0-20240930103526-63e527496b01"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://github.com/ubuntu/authd/security/advisories/GHSA-x5q3-c8rm-w787"
|
||||
},
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9313"
|
||||
},
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9313"
|
||||
},
|
||||
{
|
||||
"type": "FIX",
|
||||
"url": "https://github.com/ubuntu/authd/commit/63e527496b013bed46904c1c58be593c13ebdce5"
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-3181",
|
||||
"review_status": "UNREVIEWED"
|
||||
}
|
||||
}
|
|
@ -0,0 +1,43 @@
|
|||
{
|
||||
"schema_version": "1.3.1",
|
||||
"id": "GO-2024-3182",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"GHSA-wpr2-j6gr-pjw9"
|
||||
],
|
||||
"summary": "OpenTofu potential leaking of secret variable values when using static evaluation in v1.8 in github.com/opentofu/opentofu",
|
||||
"details": "OpenTofu potential leaking of secret variable values when using static evaluation in v1.8 in github.com/opentofu/opentofu",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/opentofu/opentofu",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "1.8.0"
|
||||
},
|
||||
{
|
||||
"fixed": "1.8.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"ecosystem_specific": {}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://github.com/opentofu/opentofu/security/advisories/GHSA-wpr2-j6gr-pjw9"
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-3182",
|
||||
"review_status": "UNREVIEWED"
|
||||
}
|
||||
}
|
|
@ -0,0 +1,24 @@
|
|||
id: GO-2024-3161
|
||||
modules:
|
||||
- module: github.com/rancher/rancher
|
||||
non_go_versions:
|
||||
- introduced: 2.7.0
|
||||
- fixed: 2.7.15
|
||||
- introduced: 2.8.0
|
||||
- fixed: 2.8.8
|
||||
- introduced: 2.9.0
|
||||
- fixed: 2.9.2
|
||||
vulnerable_at: 1.6.30
|
||||
summary: Rancher agents can be hijacked by taking over the Rancher Server URL in github.com/rancher/rancher
|
||||
cves:
|
||||
- CVE-2024-22030
|
||||
ghsas:
|
||||
- GHSA-h4h5-9833-v2p4
|
||||
references:
|
||||
- advisory: https://github.com/rancher/rancher/security/advisories/GHSA-h4h5-9833-v2p4
|
||||
- web: https://github.com/rancherlabs/support-tools/tree/master/windows-agent-strict-verify
|
||||
- web: https://ranchermanager.docs.rancher.com/getting-started/installation-and-upgrade/installation-references/tls-settings
|
||||
source:
|
||||
id: GHSA-h4h5-9833-v2p4
|
||||
created: 2024-10-08T11:00:07.819692-04:00
|
||||
review_status: UNREVIEWED
|
|
@ -0,0 +1,22 @@
|
|||
id: GO-2024-3162
|
||||
modules:
|
||||
- module: github.com/hashicorp/vault
|
||||
versions:
|
||||
- introduced: 1.7.7
|
||||
- fixed: 1.17.6
|
||||
vulnerable_at: 1.17.5
|
||||
summary: |-
|
||||
Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By
|
||||
Default in github.com/hashicorp/vault
|
||||
cves:
|
||||
- CVE-2024-7594
|
||||
ghsas:
|
||||
- GHSA-jg74-mwgw-v6x3
|
||||
references:
|
||||
- advisory: https://github.com/advisories/GHSA-jg74-mwgw-v6x3
|
||||
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-7594
|
||||
- web: https://discuss.hashicorp.com/t/hcsec-2024-20-vault-ssh-secrets-engine-configuration-did-not-restrict-valid-principals-by-default/70251
|
||||
source:
|
||||
id: GHSA-jg74-mwgw-v6x3
|
||||
created: 2024-10-08T11:00:03.066641-04:00
|
||||
review_status: UNREVIEWED
|
|
@ -0,0 +1,17 @@
|
|||
id: GO-2024-3163
|
||||
modules:
|
||||
- module: github.com/amir20/dozzle
|
||||
non_go_versions:
|
||||
- fixed: 8.5.3
|
||||
vulnerable_at: 1.29.0
|
||||
summary: Dozzle uses unsafe hash for passwords in github.com/amir20/dozzle
|
||||
cves:
|
||||
- CVE-2024-47182
|
||||
references:
|
||||
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-47182
|
||||
- fix: https://github.com/amir20/dozzle/commit/de79f03aa3dbe5bb1e154a7e8d3dccbd229f3ea3
|
||||
- web: https://github.com/amir20/dozzle/security/advisories/GHSA-w7qr-q9fh-fj35
|
||||
source:
|
||||
id: CVE-2024-47182
|
||||
created: 2024-10-08T10:59:53.97116-04:00
|
||||
review_status: UNREVIEWED
|
|
@ -0,0 +1,23 @@
|
|||
id: GO-2024-3166
|
||||
modules:
|
||||
- module: github.com/theupdateframework/go-tuf
|
||||
vulnerable_at: 0.7.0
|
||||
- module: github.com/theupdateframework/go-tuf/v2
|
||||
versions:
|
||||
- fixed: 2.0.1
|
||||
vulnerable_at: 2.0.0
|
||||
summary: Incorrect delegation lookups can make go-tuf download the wrong artifact in github.com/theupdateframework/go-tuf
|
||||
cves:
|
||||
- CVE-2024-47534
|
||||
ghsas:
|
||||
- GHSA-4f8r-qqr9-fq8j
|
||||
references:
|
||||
- advisory: https://github.com/theupdateframework/go-tuf/security/advisories/GHSA-4f8r-qqr9-fq8j
|
||||
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-47534
|
||||
- fix: https://github.com/theupdateframework/go-tuf/commit/f36420caba9edbfdfd64f95a9554c0836d9cf819
|
||||
- web: https://github.com/theupdateframework/go-tuf/blob/f95222bdd22d2ac4e5b8ed6fe912b645e213c3b5/metadata/metadata.go#L565-L580
|
||||
- web: https://github.com/theupdateframework/tuf-conformance/pull/115
|
||||
source:
|
||||
id: GHSA-4f8r-qqr9-fq8j
|
||||
created: 2024-10-08T10:58:11.67149-04:00
|
||||
review_status: UNREVIEWED
|
|
@ -0,0 +1,24 @@
|
|||
id: GO-2024-3167
|
||||
modules:
|
||||
- module: github.com/golang-fips/openssl
|
||||
vulnerable_at: 0.0.0-20230605154532-724e32b0f4b8
|
||||
- module: github.com/golang-fips/openssl/v2
|
||||
unsupported_versions:
|
||||
- last_affected: 2.0.3
|
||||
vulnerable_at: 2.0.3
|
||||
summary: Golang FIPS OpenSSL has a Use of Uninitialized Variable vulnerability in github.com/golang-fips/openssl
|
||||
cves:
|
||||
- CVE-2024-9355
|
||||
ghsas:
|
||||
- GHSA-3h3x-2hwv-hr52
|
||||
references:
|
||||
- advisory: https://github.com/advisories/GHSA-3h3x-2hwv-hr52
|
||||
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-9355
|
||||
- web: https://access.redhat.com/errata/RHSA-2024:7502
|
||||
- web: https://access.redhat.com/errata/RHSA-2024:7550
|
||||
- web: https://access.redhat.com/security/cve/CVE-2024-9355
|
||||
- web: https://bugzilla.redhat.com/show_bug.cgi?id=2315719
|
||||
source:
|
||||
id: GHSA-3h3x-2hwv-hr52
|
||||
created: 2024-10-08T10:58:05.90723-04:00
|
||||
review_status: UNREVIEWED
|
|
@ -0,0 +1,27 @@
|
|||
id: GO-2024-3168
|
||||
modules:
|
||||
- module: github.com/grafana/alloy
|
||||
versions:
|
||||
- fixed: 1.3.4
|
||||
- introduced: 1.4.0-rc.0
|
||||
- fixed: 1.4.1
|
||||
vulnerable_at: 1.4.0
|
||||
summary: Grafana Alloy on Windows has Unquoted Search Path or Element vulnerability in github.com/grafana/alloy
|
||||
cves:
|
||||
- CVE-2024-8975
|
||||
ghsas:
|
||||
- GHSA-chqx-36rm-rf8h
|
||||
references:
|
||||
- advisory: https://github.com/advisories/GHSA-chqx-36rm-rf8h
|
||||
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-8975
|
||||
- fix: https://github.com/grafana/alloy/commit/88e779887690954c009503598a3f4bf563cb6596
|
||||
- fix: https://github.com/grafana/alloy/commit/f14249012fd970d3fd73604e6fff9b6c7990a9bb
|
||||
- web: https://github.com/grafana/alloy/releases/tag/v1.3.4
|
||||
- web: https://github.com/grafana/alloy/releases/tag/v1.4.0
|
||||
- web: https://github.com/grafana/alloy/releases/tag/v1.4.1
|
||||
- web: https://grafana.com/blog/2024/09/25/grafana-alloy-and-grafana-agent-flow-security-release-high-severity-fix-for-cve-2024-8975-and-cve-2024-8996
|
||||
- web: https://grafana.com/security/security-advisories/cve-2024-8975
|
||||
source:
|
||||
id: GHSA-chqx-36rm-rf8h
|
||||
created: 2024-10-08T10:57:59.230434-04:00
|
||||
review_status: UNREVIEWED
|
|
@ -0,0 +1,32 @@
|
|||
id: GO-2024-3169
|
||||
modules:
|
||||
- module: github.com/containers/buildah
|
||||
unsupported_versions:
|
||||
- last_affected: 1.37.3
|
||||
vulnerable_at: 1.37.4
|
||||
- module: github.com/containers/podman
|
||||
vulnerable_at: 1.9.3
|
||||
- module: github.com/containers/podman/v2
|
||||
vulnerable_at: 2.2.1
|
||||
- module: github.com/containers/podman/v3
|
||||
vulnerable_at: 3.4.7
|
||||
- module: github.com/containers/podman/v4
|
||||
vulnerable_at: 4.9.5
|
||||
- module: github.com/containers/podman/v5
|
||||
unsupported_versions:
|
||||
- last_affected: 5.2.3
|
||||
vulnerable_at: 5.2.4
|
||||
summary: Improper Input Validation in Buildah and Podman in github.com/containers/buildah
|
||||
cves:
|
||||
- CVE-2024-9407
|
||||
ghsas:
|
||||
- GHSA-fhqq-8f65-5xfc
|
||||
references:
|
||||
- advisory: https://github.com/advisories/GHSA-fhqq-8f65-5xfc
|
||||
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-9407
|
||||
- web: https://access.redhat.com/security/cve/CVE-2024-9407
|
||||
- web: https://bugzilla.redhat.com/show_bug.cgi?id=2315887
|
||||
source:
|
||||
id: GHSA-fhqq-8f65-5xfc
|
||||
created: 2024-10-08T10:57:52.867555-04:00
|
||||
review_status: UNREVIEWED
|
|
@ -0,0 +1,25 @@
|
|||
id: GO-2024-3170
|
||||
modules:
|
||||
- module: github.com/grafana/agent
|
||||
versions:
|
||||
- fixed: 0.43.3
|
||||
vulnerable_at: 0.43.2
|
||||
summary: |-
|
||||
Grafana Agent (Flow mode) on Windows has Unquoted Search Path or Element
|
||||
vulnerability in github.com/grafana/agent
|
||||
cves:
|
||||
- CVE-2024-8996
|
||||
ghsas:
|
||||
- GHSA-m5gv-m5f9-wgv4
|
||||
references:
|
||||
- advisory: https://github.com/advisories/GHSA-m5gv-m5f9-wgv4
|
||||
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-8996
|
||||
- fix: https://github.com/grafana/agent/commit/91bab2c05906938d3f8e1e3c61a863f037985299
|
||||
- web: https://github.com/grafana/agent/releases/tag/v0.43.2
|
||||
- web: https://github.com/grafana/agent/releases/tag/v0.43.3
|
||||
- web: https://grafana.com/blog/2024/09/25/grafana-alloy-and-grafana-agent-flow-security-release-high-severity-fix-for-cve-2024-8975-and-cve-2024-8996
|
||||
- web: https://grafana.com/security/security-advisories/cve-2024-8996
|
||||
source:
|
||||
id: GHSA-m5gv-m5f9-wgv4
|
||||
created: 2024-10-08T10:57:47.066929-04:00
|
||||
review_status: UNREVIEWED
|
|
@ -0,0 +1,22 @@
|
|||
id: GO-2024-3172
|
||||
modules:
|
||||
- module: github.com/portainer/portainer
|
||||
non_go_versions:
|
||||
- fixed: 2.20.2
|
||||
vulnerable_at: 0.10.1
|
||||
summary: Portainer improperly uses an encryption algorithm in the AesEncrypt function in github.com/portainer/portainer
|
||||
cves:
|
||||
- CVE-2024-33662
|
||||
ghsas:
|
||||
- GHSA-9mjw-79r6-c9m8
|
||||
references:
|
||||
- advisory: https://github.com/advisories/GHSA-9mjw-79r6-c9m8
|
||||
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-33662
|
||||
- report: https://github.com/portainer/portainer/issues/11737
|
||||
- web: https://github.com/portainer/portainer/compare/2.20.1...2.20.2
|
||||
- web: https://github.com/search?q=repo%3Aportainer%2Fportainer+EE-6764&type=pullrequests
|
||||
- web: https://www.portainer.io
|
||||
source:
|
||||
id: GHSA-9mjw-79r6-c9m8
|
||||
created: 2024-10-08T10:56:56.076983-04:00
|
||||
review_status: UNREVIEWED
|
|
@ -0,0 +1,20 @@
|
|||
id: GO-2024-3173
|
||||
modules:
|
||||
- module: github.com/juju/juju
|
||||
versions:
|
||||
- fixed: 0.0.0-20240826044107-ecd7e2d0e986
|
||||
summary: JUJU_CONTEXT_ID is a predictable authentication secret in github.com/juju/juju
|
||||
cves:
|
||||
- CVE-2024-7558
|
||||
ghsas:
|
||||
- GHSA-mh98-763h-m9v4
|
||||
references:
|
||||
- advisory: https://github.com/juju/juju/security/advisories/GHSA-mh98-763h-m9v4
|
||||
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-7558
|
||||
- fix: https://github.com/juju/juju/commit/ecd7e2d0e9867576b9da04871e22232f06fa0cc7
|
||||
notes:
|
||||
- fix: 'github.com/juju/juju: could not add vulnerable_at: cannot auto-guess when fixed version is 0.0.0 pseudo-version'
|
||||
source:
|
||||
id: GHSA-mh98-763h-m9v4
|
||||
created: 2024-10-08T10:56:11.849364-04:00
|
||||
review_status: UNREVIEWED
|
|
@ -0,0 +1,22 @@
|
|||
id: GO-2024-3174
|
||||
modules:
|
||||
- module: github.com/juju/juju
|
||||
versions:
|
||||
- fixed: 0.0.0-20240820065804-2f2ec128ef5a
|
||||
summary: Vulnerable juju hook tool abstract UNIX domain socket in github.com/juju/juju
|
||||
cves:
|
||||
- CVE-2024-8037
|
||||
ghsas:
|
||||
- GHSA-8v4w-f4r9-7h6x
|
||||
references:
|
||||
- advisory: https://github.com/juju/juju/security/advisories/GHSA-8v4w-f4r9-7h6x
|
||||
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-8037
|
||||
- fix: https://github.com/juju/juju/commit/2f2ec128ef5a8ca81fc86ae79cfcdbab0007c206
|
||||
- web: https://github.com/juju/juju/blob/725800953aaa29dbeda4f806097bf838e61644dd/worker/uniter/paths.go#L222
|
||||
- web: https://github.com/juju/juju/security/advisories/GHSA-mh98-763h-m9v4
|
||||
notes:
|
||||
- fix: 'github.com/juju/juju: could not add vulnerable_at: cannot auto-guess when fixed version is 0.0.0 pseudo-version'
|
||||
source:
|
||||
id: GHSA-8v4w-f4r9-7h6x
|
||||
created: 2024-10-08T10:55:15.039767-04:00
|
||||
review_status: UNREVIEWED
|
|
@ -0,0 +1,20 @@
|
|||
id: GO-2024-3175
|
||||
modules:
|
||||
- module: github.com/juju/juju
|
||||
non_go_versions:
|
||||
- fixed: 0.0.0-20240829052008-43f0fc59790d
|
||||
vulnerable_at: 0.0.0-20241008120523-919931217918
|
||||
summary: Vulnerable juju introspection abstract UNIX domain socket in github.com/juju/juju
|
||||
cves:
|
||||
- CVE-2024-8038
|
||||
ghsas:
|
||||
- GHSA-xwgj-vpm9-q2rq
|
||||
references:
|
||||
- advisory: https://github.com/juju/juju/security/advisories/GHSA-xwgj-vpm9-q2rq
|
||||
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-8038
|
||||
- fix: https://github.com/juju/juju/commit/43f0fc59790d220a457d4d305f484f62be556d3b
|
||||
- web: https://github.com/juju/juju/blob/725800953aaa29dbeda4f806097bf838e61644dd/worker/introspection/worker.go#L125
|
||||
source:
|
||||
id: GHSA-xwgj-vpm9-q2rq
|
||||
created: 2024-10-08T10:54:30.860927-04:00
|
||||
review_status: UNREVIEWED
|
|
@ -0,0 +1,22 @@
|
|||
id: GO-2024-3179
|
||||
modules:
|
||||
- module: github.com/pomerium/pomerium
|
||||
versions:
|
||||
- fixed: 0.27.1
|
||||
vulnerable_at: 0.27.0
|
||||
summary: |-
|
||||
Pomerium service account access token may grant unintended access to databroker
|
||||
API in github.com/pomerium/pomerium
|
||||
cves:
|
||||
- CVE-2024-47616
|
||||
ghsas:
|
||||
- GHSA-r7rh-jww5-5fjr
|
||||
references:
|
||||
- advisory: https://github.com/pomerium/pomerium/security/advisories/GHSA-r7rh-jww5-5fjr
|
||||
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-47616
|
||||
- fix: https://github.com/pomerium/pomerium/commit/e018cf0fc0979d2abe25ff705db019feb7523444
|
||||
- web: https://github.com/pomerium/pomerium/releases/tag/v0.27.1
|
||||
source:
|
||||
id: GHSA-r7rh-jww5-5fjr
|
||||
created: 2024-10-08T10:54:22.040469-04:00
|
||||
review_status: UNREVIEWED
|
|
@ -0,0 +1,20 @@
|
|||
id: GO-2024-3181
|
||||
modules:
|
||||
- module: github.com/ubuntu/authd
|
||||
non_go_versions:
|
||||
- fixed: 0.0.0-20240930103526-63e527496b01
|
||||
vulnerable_at: 0.0.0-20230706090440-d8cb2d561419
|
||||
summary: PAM module may allow accessing with the credentials of another user in github.com/ubuntu/authd
|
||||
cves:
|
||||
- CVE-2024-9313
|
||||
ghsas:
|
||||
- GHSA-x5q3-c8rm-w787
|
||||
references:
|
||||
- advisory: https://github.com/ubuntu/authd/security/advisories/GHSA-x5q3-c8rm-w787
|
||||
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-9313
|
||||
- advisory: https://www.cve.org/CVERecord?id=CVE-2024-9313
|
||||
- fix: https://github.com/ubuntu/authd/commit/63e527496b013bed46904c1c58be593c13ebdce5
|
||||
source:
|
||||
id: GHSA-x5q3-c8rm-w787
|
||||
created: 2024-10-08T10:54:15.521922-04:00
|
||||
review_status: UNREVIEWED
|
|
@ -0,0 +1,18 @@
|
|||
id: GO-2024-3182
|
||||
modules:
|
||||
- module: github.com/opentofu/opentofu
|
||||
versions:
|
||||
- introduced: 1.8.0
|
||||
- fixed: 1.8.3
|
||||
vulnerable_at: 1.8.2
|
||||
summary: |-
|
||||
OpenTofu potential leaking of secret variable values when using static
|
||||
evaluation in v1.8 in github.com/opentofu/opentofu
|
||||
ghsas:
|
||||
- GHSA-wpr2-j6gr-pjw9
|
||||
references:
|
||||
- advisory: https://github.com/opentofu/opentofu/security/advisories/GHSA-wpr2-j6gr-pjw9
|
||||
source:
|
||||
id: GHSA-wpr2-j6gr-pjw9
|
||||
created: 2024-10-08T10:54:13.414193-04:00
|
||||
review_status: UNREVIEWED
|
Загрузка…
Ссылка в новой задаче