Skip to content

Commit

Permalink
data/reports: add 2 unreviewed reports
Browse files Browse the repository at this point in the history
  - data/reports/GO-2024-3074.yaml
  - data/reports/GO-2024-3075.yaml

Fixes #3074
Fixes #3075

Change-Id: I71e41d344ff0e3cb37b2739b8e0aad47c09b4382
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/606361
Reviewed-by: Damien Neil <dneil@google.com>
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
  • Loading branch information
tatianab authored and gopherbot committed Aug 19, 2024
1 parent 9fd9786 commit 52066e8
Show file tree
Hide file tree
Showing 4 changed files with 195 additions and 0 deletions.
70 changes: 70 additions & 0 deletions data/osv/GO-2024-3074.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,70 @@
{
"schema_version": "1.3.1",
"id": "GO-2024-3074",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-42486",
"GHSA-vwf8-q6fw-4wcm"
],
"summary": "Cilium leaks information via incorrect ReferenceGrant update logic in Gateway API in github.com/cilium/cilium",
"details": "Cilium leaks information via incorrect ReferenceGrant update logic in Gateway API in github.com/cilium/cilium",
"affected": [
{
"package": {
"name": "github.com/cilium/cilium",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.15.0"
},
{
"fixed": "1.15.8"
},
{
"introduced": "1.16.0"
},
{
"fixed": "1.16.1"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cilium/cilium/security/advisories/GHSA-vwf8-q6fw-4wcm"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42486"
},
{
"type": "FIX",
"url": "https://github.com/cilium/cilium/commit/414a96b53d51ef6e6645c44426e26bc8e7c7c059"
},
{
"type": "FIX",
"url": "https://github.com/cilium/cilium/commit/92c110e58a7be6586819dd51fb0f6ee1ec4be8f8"
},
{
"type": "FIX",
"url": "https://github.com/cilium/cilium/commit/ed3dfa0aab8b80f7e841a6d49d2a990ac2dca053"
},
{
"type": "FIX",
"url": "https://github.com/cilium/cilium/pull/34032"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-3074",
"review_status": "UNREVIEWED"
}
}
75 changes: 75 additions & 0 deletions data/osv/GO-2024-3075.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,75 @@
{
"schema_version": "1.3.1",
"id": "GO-2024-3075",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-7646"
],
"summary": "CVE-2024-7646 in github.com/kubernetes/ingress-nginx",
"details": "CVE-2024-7646 in github.com/kubernetes/ingress-nginx.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/kubernetes/ingress-nginx before v1.11.2.",
"affected": [
{
"package": {
"name": "github.com/kubernetes/ingress-nginx",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.11.2"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7646"
},
{
"type": "FIX",
"url": "https://github.com/kubernetes/ingress-nginx/pull/11719"
},
{
"type": "FIX",
"url": "https://github.com/kubernetes/ingress-nginx/pull/11721"
},
{
"type": "REPORT",
"url": "https://github.com/kubernetes/kubernetes/issues/126744"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/kubernetes-security-announce/c/a1__cKjWkfA"
}
],
"credits": [
{
"name": "André Storfjord Kristiansen"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-3075",
"review_status": "UNREVIEWED"
}
}
27 changes: 27 additions & 0 deletions data/reports/GO-2024-3074.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
id: GO-2024-3074
modules:
- module: github.com/cilium/cilium
versions:
- introduced: 1.15.0
- fixed: 1.15.8
- introduced: 1.16.0
- fixed: 1.16.1
vulnerable_at: 1.16.0
summary: |-
Cilium leaks information via incorrect ReferenceGrant update logic in Gateway
API in github.com/cilium/cilium
cves:
- CVE-2024-42486
ghsas:
- GHSA-vwf8-q6fw-4wcm
references:
- advisory: https://github.com/cilium/cilium/security/advisories/GHSA-vwf8-q6fw-4wcm
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-42486
- fix: https://github.com/cilium/cilium/commit/414a96b53d51ef6e6645c44426e26bc8e7c7c059
- fix: https://github.com/cilium/cilium/commit/92c110e58a7be6586819dd51fb0f6ee1ec4be8f8
- fix: https://github.com/cilium/cilium/commit/ed3dfa0aab8b80f7e841a6d49d2a990ac2dca053
- fix: https://github.com/cilium/cilium/pull/34032
source:
id: GHSA-vwf8-q6fw-4wcm
created: 2024-08-16T17:24:49.080621-04:00
review_status: UNREVIEWED
23 changes: 23 additions & 0 deletions data/reports/GO-2024-3075.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
id: GO-2024-3075
modules:
- module: github.com/kubernetes/ingress-nginx
non_go_versions:
- fixed: 1.11.2
unsupported_versions:
- cve_version_range: 'unaffected at 1.11.2 (default: unknown)'
vulnerable_at: 1.0.0-alpha.1
summary: CVE-2024-7646 in github.com/kubernetes/ingress-nginx
cves:
- CVE-2024-7646
credits:
- André Storfjord Kristiansen
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-7646
- fix: https://github.com/kubernetes/ingress-nginx/pull/11719
- fix: https://github.com/kubernetes/ingress-nginx/pull/11721
- report: https://github.com/kubernetes/kubernetes/issues/126744
- web: https://groups.google.com/g/kubernetes-security-announce/c/a1__cKjWkfA
source:
id: CVE-2024-7646
created: 2024-08-16T17:24:43.246938-04:00
review_status: UNREVIEWED

0 comments on commit 52066e8

Please sign in to comment.