Skip to content

Commit 1b6716a

Browse files
committed
internal/report,data/osv: add explanation of non-Go versions
For unreviewed reports with "non_go_versions", add an explanation that the versions list may not match external advisories to the "details" section of the OSV. In the future, this should probably be part of the pkgsite UI, or embedded in structured OSV field, instead of placed in the OSV details, but it is causing enough confusion that it seems worth it to clarify this sooner rather than later. Change-Id: Id1409182f7fdef37c0a781d6e2ba06b1fc57c080 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/596182 Reviewed-by: Roland Shoemaker <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
1 parent cc32d7b commit 1b6716a

File tree

88 files changed

+198
-96
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

88 files changed

+198
-96
lines changed

data/osv/GO-2024-2428.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"GHSA-fp9f-44c2-cw27"
99
],
1010
"summary": "Ingress-nginx code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation in k8s.io/ingress-nginx",
11-
"details": "Ingress-nginx code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation in k8s.io/ingress-nginx",
11+
"details": "Ingress-nginx code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation in k8s.io/ingress-nginx.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: k8s.io/ingress-nginx before v1.9.0.",
1212
"affected": [
1313
{
1414
"package": {

data/osv/GO-2024-2430.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"GHSA-qc6v-g3xw-grmx"
99
],
1010
"summary": "Authenticated users can crash the CubeFS servers with maliciously crafted requests in github.com/cubefs/cubefs",
11-
"details": "Authenticated users can crash the CubeFS servers with maliciously crafted requests in github.com/cubefs/cubefs",
11+
"details": "Authenticated users can crash the CubeFS servers with maliciously crafted requests in github.com/cubefs/cubefs.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/cubefs/cubefs before v3.3.1.",
1212
"affected": [
1313
{
1414
"package": {

data/osv/GO-2024-2431.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"GHSA-4248-p65p-hcrm"
99
],
1010
"summary": "Insecure random string generator used for sensitive data in github.com/cubefs/cubefs",
11-
"details": "Insecure random string generator used for sensitive data in github.com/cubefs/cubefs",
11+
"details": "Insecure random string generator used for sensitive data in github.com/cubefs/cubefs.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/cubefs/cubefs before v3.3.1.",
1212
"affected": [
1313
{
1414
"package": {

data/osv/GO-2024-2432.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"GHSA-8579-7p32-f398"
99
],
1010
"summary": "CubeFS timing attack can leak user passwords in github.com/cubefs/cubefs",
11-
"details": "CubeFS timing attack can leak user passwords in github.com/cubefs/cubefs",
11+
"details": "CubeFS timing attack can leak user passwords in github.com/cubefs/cubefs.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/cubefs/cubefs before v3.3.1.",
1212
"affected": [
1313
{
1414
"package": {

data/osv/GO-2024-2433.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"GHSA-8h2x-gr2c-c275"
99
],
1010
"summary": "CubeFS leaks magic secret key when starting Blobstore access service in github.com/cubefs/cubefs",
11-
"details": "CubeFS leaks magic secret key when starting Blobstore access service in github.com/cubefs/cubefs",
11+
"details": "CubeFS leaks magic secret key when starting Blobstore access service in github.com/cubefs/cubefs.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/cubefs/cubefs before v3.3.1.",
1212
"affected": [
1313
{
1414
"package": {

data/osv/GO-2024-2434.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"GHSA-vwch-g97w-hfg2"
99
],
1010
"summary": "CubeFS leaks users key in logs in github.com/cubefs/cubefs",
11-
"details": "CubeFS leaks users key in logs in github.com/cubefs/cubefs",
11+
"details": "CubeFS leaks users key in logs in github.com/cubefs/cubefs.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/cubefs/cubefs before v3.3.1.",
1212
"affected": [
1313
{
1414
"package": {

data/osv/GO-2024-2442.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
"GHSA-76cc-p55w-63g3"
88
],
99
"summary": "Teleport Access List owners can escalate their privileges in github.com/gravitational/teleport",
10-
"details": "Teleport Access List owners can escalate their privileges in github.com/gravitational/teleport",
10+
"details": "Teleport Access List owners can escalate their privileges in github.com/gravitational/teleport.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/gravitational/teleport from v13.0.0 before v13.4.13, from v14.0.0 before v14.2.4.",
1111
"affected": [
1212
{
1313
"package": {

data/osv/GO-2024-2444.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"GHSA-9w97-9rqx-8v4j"
99
],
1010
"summary": "Mattermost allows demoted guests to change group names in github.com/mattermost/mattermost-server",
11-
"details": "Mattermost allows demoted guests to change group names in github.com/mattermost/mattermost-server",
11+
"details": "Mattermost allows demoted guests to change group names in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.7.",
1212
"affected": [
1313
{
1414
"package": {

data/osv/GO-2024-2445.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
"GHSA-c9v7-wmwj-vf6x"
88
],
99
"summary": "SFTP is possible on the Proxy server for any user with SFTP access in github.com/gravitational/teleport",
10-
"details": "SFTP is possible on the Proxy server for any user with SFTP access in github.com/gravitational/teleport",
10+
"details": "SFTP is possible on the Proxy server for any user with SFTP access in github.com/gravitational/teleport.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/gravitational/teleport before v12.4.31, from v13.0.0 before v13.4.13, from v14.0.0 before v14.2.4.",
1111
"affected": [
1212
{
1313
"package": {

data/osv/GO-2024-2446.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"GHSA-h3gq-j7p9-x3p4"
99
],
1010
"summary": "Mattermost Cross-site Scripting vulnerability in github.com/mattermost/mattermost-server",
11-
"details": "Mattermost Cross-site Scripting vulnerability in github.com/mattermost/mattermost-server",
11+
"details": "Mattermost Cross-site Scripting vulnerability in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.7.",
1212
"affected": [
1313
{
1414
"package": {

0 commit comments

Comments
 (0)