Skip to content

Commit 1b6c74b

Browse files
committed
data/reports: add 15 unreviewed reports
- data/reports/GO-2024-2898.yaml - data/reports/GO-2024-2905.yaml - data/reports/GO-2024-2924.yaml - data/reports/GO-2024-2926.yaml - data/reports/GO-2024-2927.yaml - data/reports/GO-2024-2928.yaml - data/reports/GO-2024-2929.yaml - data/reports/GO-2024-2931.yaml - data/reports/GO-2024-2932.yaml - data/reports/GO-2024-2933.yaml - data/reports/GO-2024-2934.yaml - data/reports/GO-2024-2938.yaml - data/reports/GO-2024-2939.yaml - data/reports/GO-2024-2940.yaml - data/reports/GO-2024-2941.yaml Fixes #2898 Fixes #2905 Fixes #2924 Fixes #2926 Fixes #2927 Fixes #2928 Fixes #2929 Fixes #2931 Fixes #2932 Fixes #2933 Fixes #2934 Fixes #2938 Fixes #2939 Fixes #2940 Fixes #2941 Change-Id: I235c85ba4f067ada8ca1ff0dc33bb4fb14f13f80 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/595636 LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Reviewed-by: Damien Neil <dneil@google.com>
1 parent 4ad8671 commit 1b6c74b

30 files changed

+1807
-0
lines changed

data/osv/GO-2024-2898.json

+81
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,81 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2024-2898",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2024-36106",
8+
"GHSA-3cqf-953p-h5cp"
9+
],
10+
"summary": "Argo-cd authenticated users can enumerate clusters by name in github.com/argoproj/argo-cd",
11+
"details": "Argo-cd authenticated users can enumerate clusters by name in github.com/argoproj/argo-cd",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/argoproj/argo-cd",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0.11.0"
24+
}
25+
]
26+
}
27+
],
28+
"ecosystem_specific": {}
29+
},
30+
{
31+
"package": {
32+
"name": "github.com/argoproj/argo-cd/v2",
33+
"ecosystem": "Go"
34+
},
35+
"ranges": [
36+
{
37+
"type": "SEMVER",
38+
"events": [
39+
{
40+
"introduced": "0"
41+
},
42+
{
43+
"fixed": "2.9.17"
44+
},
45+
{
46+
"introduced": "2.10.0"
47+
},
48+
{
49+
"fixed": "2.10.12"
50+
},
51+
{
52+
"introduced": "2.11.0"
53+
},
54+
{
55+
"fixed": "2.11.3"
56+
}
57+
]
58+
}
59+
],
60+
"ecosystem_specific": {}
61+
}
62+
],
63+
"references": [
64+
{
65+
"type": "ADVISORY",
66+
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-3cqf-953p-h5cp"
67+
},
68+
{
69+
"type": "ADVISORY",
70+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36106"
71+
},
72+
{
73+
"type": "FIX",
74+
"url": "https://github.com/argoproj/argo-cd/commit/c2647055c261a550e5da075793260f6524e65ad9"
75+
}
76+
],
77+
"database_specific": {
78+
"url": "https://pkg.go.dev/vuln/GO-2024-2898",
79+
"review_status": "UNREVIEWED"
80+
}
81+
}

data/osv/GO-2024-2905.json

+56
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2024-2905",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2024-5037"
8+
],
9+
"summary": "Openshift/telemeter: iss check during jwt authentication can be bypassed in github.com/openshift/telemeter",
10+
"details": "Openshift/telemeter: iss check during jwt authentication can be bypassed in github.com/openshift/telemeter",
11+
"affected": [
12+
{
13+
"package": {
14+
"name": "github.com/openshift/telemeter",
15+
"ecosystem": "Go"
16+
},
17+
"ranges": [
18+
{
19+
"type": "SEMVER",
20+
"events": [
21+
{
22+
"introduced": "0"
23+
}
24+
]
25+
}
26+
],
27+
"ecosystem_specific": {}
28+
}
29+
],
30+
"references": [
31+
{
32+
"type": "ADVISORY",
33+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5037"
34+
},
35+
{
36+
"type": "FIX",
37+
"url": "https://github.com/kubernetes/kubernetes/pull/123540"
38+
},
39+
{
40+
"type": "REPORT",
41+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272339"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://access.redhat.com/security/cve/CVE-2024-5037"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/openshift/telemeter/blob/a9417a6062c3a31ed78c06ea3a0613a52f2029b2/pkg/authorize/jwt/client_authorizer.go#L78"
50+
}
51+
],
52+
"database_specific": {
53+
"url": "https://pkg.go.dev/vuln/GO-2024-2905",
54+
"review_status": "UNREVIEWED"
55+
}
56+
}

data/osv/GO-2024-2924.json

+49
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2024-2924",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2024-36586",
8+
"GHSA-7jp9-vgmq-c8r5"
9+
],
10+
"summary": "AdGuardHome privilege escalation vulnerability in github.com/AdguardTeam/AdGuardHome",
11+
"details": "AdGuardHome privilege escalation vulnerability in github.com/AdguardTeam/AdGuardHome",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/AdguardTeam/AdGuardHome",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
}
25+
]
26+
}
27+
],
28+
"ecosystem_specific": {}
29+
}
30+
],
31+
"references": [
32+
{
33+
"type": "ADVISORY",
34+
"url": "https://github.com/advisories/GHSA-7jp9-vgmq-c8r5"
35+
},
36+
{
37+
"type": "ADVISORY",
38+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36586"
39+
},
40+
{
41+
"type": "WEB",
42+
"url": "https://github.com/go-compile/security-advisories/blob/master/vulns/CVE-2024-36586.md"
43+
}
44+
],
45+
"database_specific": {
46+
"url": "https://pkg.go.dev/vuln/GO-2024-2924",
47+
"review_status": "UNREVIEWED"
48+
}
49+
}

0 commit comments

Comments
 (0)