-
Notifications
You must be signed in to change notification settings - Fork 61
Commit
- data/reports/GO-2022-0922.yaml - data/reports/GO-2022-0923.yaml - data/reports/GO-2022-0924.yaml - data/reports/GO-2022-0925.yaml - data/reports/GO-2022-0928.yaml - data/reports/GO-2022-0929.yaml - data/reports/GO-2022-0933.yaml - data/reports/GO-2022-0936.yaml - data/reports/GO-2022-0937.yaml - data/reports/GO-2022-0938.yaml - data/reports/GO-2022-0939.yaml - data/reports/GO-2022-0953.yaml - data/reports/GO-2022-0959.yaml - data/reports/GO-2022-0960.yaml - data/reports/GO-2022-0964.yaml - data/reports/GO-2022-0970.yaml - data/reports/GO-2022-0971.yaml - data/reports/GO-2022-0981.yaml - data/reports/GO-2022-0982.yaml - data/reports/GO-2022-0983.yaml Updates #922 Updates #923 Updates #924 Updates #925 Updates #928 Updates #929 Updates #933 Updates #936 Updates #937 Updates #938 Updates #939 Updates #953 Updates #959 Updates #960 Updates #964 Updates #970 Updates #971 Updates #981 Updates #982 Updates #983 Change-Id: I2c7e7a823ba3bf18dab1234a40c08ac4825903f6 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/607229 LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Auto-Submit: Tatiana Bradley <tatianabradley@google.com> Commit-Queue: Tatiana Bradley <tatianabradley@google.com> Reviewed-by: Damien Neil <dneil@google.com>
- Loading branch information
There are no files selected for viewing
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,90 @@ | ||
{ | ||
"schema_version": "1.3.1", | ||
"id": "GO-2022-0922", | ||
"modified": "0001-01-01T00:00:00Z", | ||
"published": "0001-01-01T00:00:00Z", | ||
"aliases": [ | ||
"CVE-2021-32783", | ||
"GHSA-5ph6-qq5x-7jwc" | ||
], | ||
"summary": "ExternalName Services can be used to gain access to Envoy's admin interface in github.com/projectcontour/contour", | ||
"details": "ExternalName Services can be used to gain access to Envoy's admin interface in github.com/projectcontour/contour", | ||
"affected": [ | ||
{ | ||
"package": { | ||
"name": "github.com/projectcontour/contour", | ||
"ecosystem": "Go" | ||
}, | ||
"ranges": [ | ||
{ | ||
"type": "SEMVER", | ||
"events": [ | ||
{ | ||
"introduced": "0" | ||
}, | ||
{ | ||
"fixed": "1.14.2" | ||
}, | ||
{ | ||
"introduced": "1.15.0" | ||
}, | ||
{ | ||
"fixed": "1.15.2" | ||
}, | ||
{ | ||
"introduced": "1.16.0" | ||
}, | ||
{ | ||
"fixed": "1.16.1" | ||
}, | ||
{ | ||
"introduced": "1.17.0" | ||
}, | ||
{ | ||
"fixed": "1.17.1" | ||
} | ||
] | ||
} | ||
], | ||
"ecosystem_specific": {} | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://github.com/projectcontour/contour/security/advisories/GHSA-5ph6-qq5x-7jwc" | ||
}, | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32783" | ||
}, | ||
{ | ||
"type": "FIX", | ||
"url": "https://github.com/projectcontour/contour/commit/5f3e6d0ab1d48e64bae46400c85c490b200393a3" | ||
}, | ||
{ | ||
"type": "FIX", | ||
"url": "https://github.com/projectcontour/contour/commit/b53a5c4fd927f4ea2c6cf02f1359d8e28bef852e" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/projectcontour/contour/releases/tag/v1.14.2" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/projectcontour/contour/releases/tag/v1.15.2" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/projectcontour/contour/releases/tag/v1.16.1" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/projectcontour/contour/releases/tag/v1.17.1" | ||
} | ||
], | ||
"database_specific": { | ||
"url": "https://pkg.go.dev/vuln/GO-2022-0922", | ||
"review_status": "UNREVIEWED" | ||
} | ||
} |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,73 @@ | ||
{ | ||
"schema_version": "1.3.1", | ||
"id": "GO-2022-0923", | ||
"modified": "0001-01-01T00:00:00Z", | ||
"published": "0001-01-01T00:00:00Z", | ||
"aliases": [ | ||
"CVE-2021-32813", | ||
"GHSA-m697-4v8f-55qg" | ||
], | ||
"summary": "Header dropping in traefik in github.com/traefik/traefik", | ||
"details": "Header dropping in traefik in github.com/traefik/traefik", | ||
"affected": [ | ||
{ | ||
"package": { | ||
"name": "github.com/traefik/traefik", | ||
"ecosystem": "Go" | ||
}, | ||
"ranges": [ | ||
{ | ||
"type": "SEMVER", | ||
"events": [ | ||
{ | ||
"introduced": "0" | ||
} | ||
] | ||
} | ||
], | ||
"ecosystem_specific": {} | ||
}, | ||
{ | ||
"package": { | ||
"name": "github.com/traefik/traefik/v2", | ||
"ecosystem": "Go" | ||
}, | ||
"ranges": [ | ||
{ | ||
"type": "SEMVER", | ||
"events": [ | ||
{ | ||
"introduced": "0" | ||
}, | ||
{ | ||
"fixed": "2.4.13" | ||
} | ||
] | ||
} | ||
], | ||
"ecosystem_specific": {} | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://github.com/traefik/traefik/security/advisories/GHSA-m697-4v8f-55qg" | ||
}, | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32813" | ||
}, | ||
{ | ||
"type": "FIX", | ||
"url": "https://github.com/traefik/traefik/pull/8319/commits/cbaf86a93014a969b8accf39301932c17d0d73f9" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/traefik/traefik/releases/tag/v2.4.13" | ||
} | ||
], | ||
"database_specific": { | ||
"url": "https://pkg.go.dev/vuln/GO-2022-0923", | ||
"review_status": "UNREVIEWED" | ||
} | ||
} |