From 595da9f5f2bd9edae7ab0a1b905be95f62efc542 Mon Sep 17 00:00:00 2001 From: Zvonimir Pavlinovic Date: Mon, 9 Dec 2024 18:03:09 +0000 Subject: [PATCH] data/reports: add 3 reports - data/reports/GO-2024-3311.yaml - data/reports/GO-2024-3312.yaml - data/reports/GO-2024-3313.yaml Fixes golang/vulndb#3311 Fixes golang/vulndb#3312 Fixes golang/vulndb#3313 Change-Id: I6f204f50a95f8095c39e255261151c4e1d0ec1bd Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/634615 LUCI-TryBot-Result: Go LUCI Reviewed-by: Tatiana Bradley --- data/osv/GO-2024-3311.json | 60 ++++++++++++++++++++++++++++++++++ data/osv/GO-2024-3312.json | 58 ++++++++++++++++++++++++++++++++ data/osv/GO-2024-3313.json | 58 ++++++++++++++++++++++++++++++++ data/reports/GO-2024-3311.yaml | 22 +++++++++++++ data/reports/GO-2024-3312.yaml | 16 +++++++++ data/reports/GO-2024-3313.yaml | 16 +++++++++ 6 files changed, 230 insertions(+) create mode 100644 data/osv/GO-2024-3311.json create mode 100644 data/osv/GO-2024-3312.json create mode 100644 data/osv/GO-2024-3313.json create mode 100644 data/reports/GO-2024-3311.yaml create mode 100644 data/reports/GO-2024-3312.yaml create mode 100644 data/reports/GO-2024-3313.yaml diff --git a/data/osv/GO-2024-3311.json b/data/osv/GO-2024-3311.json new file mode 100644 index 00000000..2fdb1e6c --- /dev/null +++ b/data/osv/GO-2024-3311.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.3.1", + "id": "GO-2024-3311", + "modified": "0001-01-01T00:00:00Z", + "published": "0001-01-01T00:00:00Z", + "aliases": [ + "CVE-2024-36620", + "GHSA-q59j-vv4j-v33c" + ], + "summary": "NULL Pointer Dereference on moby image history in github.com/moby/moby", + "details": "NULL Pointer Dereference on moby image history in github.com/moby/moby", + "affected": [ + { + "package": { + "name": "github.com/moby/moby", + "ecosystem": "Go" + }, + "ranges": [ + { + "type": "SEMVER", + "events": [ + { + "introduced": "25.0.0+incompatible" + }, + { + "fixed": "26.1.0+incompatible" + } + ] + } + ], + "ecosystem_specific": {} + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-q59j-vv4j-v33c" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36620" + }, + { + "type": "FIX", + "url": "https://github.com/moby/moby/commit/ab570ab3d62038b3d26f96a9bb585d0b6095b9b4" + }, + { + "type": "WEB", + "url": "https://gist.github.com/1047524396/f08816669701ab478a265a811d2c89b2" + }, + { + "type": "WEB", + "url": "https://github.com/moby/moby/blob/v26.0.2/daemon/images/image_history.go#L48" + } + ], + "database_specific": { + "url": "https://pkg.go.dev/vuln/GO-2024-3311", + "review_status": "UNREVIEWED" + } +} \ No newline at end of file diff --git a/data/osv/GO-2024-3312.json b/data/osv/GO-2024-3312.json new file mode 100644 index 00000000..b3084895 --- /dev/null +++ b/data/osv/GO-2024-3312.json @@ -0,0 +1,58 @@ +{ + "schema_version": "1.3.1", + "id": "GO-2024-3312", + "modified": "0001-01-01T00:00:00Z", + "published": "0001-01-01T00:00:00Z", + "aliases": [ + "CVE-2024-6156" + ], + "summary": "CVE-2024-6156 in github.com/canonical/lxd", + "details": "CVE-2024-6156 in github.com/canonical/lxd.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/canonical/lxd before v5.21.2.", + "affected": [ + { + "package": { + "name": "github.com/canonical/lxd", + "ecosystem": "Go" + }, + "ranges": [ + { + "type": "SEMVER", + "events": [ + { + "introduced": "0" + } + ] + } + ], + "ecosystem_specific": { + "custom_ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.21.2" + } + ] + } + ] + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://www.cve.org/CVERecord?id=CVE-2024-6156" + }, + { + "type": "WEB", + "url": "https://github.com/canonical/lxd/security/advisories/GHSA-4c49-9fpc-hc3v" + } + ], + "database_specific": { + "url": "https://pkg.go.dev/vuln/GO-2024-3312", + "review_status": "UNREVIEWED" + } +} \ No newline at end of file diff --git a/data/osv/GO-2024-3313.json b/data/osv/GO-2024-3313.json new file mode 100644 index 00000000..2f70f84c --- /dev/null +++ b/data/osv/GO-2024-3313.json @@ -0,0 +1,58 @@ +{ + "schema_version": "1.3.1", + "id": "GO-2024-3313", + "modified": "0001-01-01T00:00:00Z", + "published": "0001-01-01T00:00:00Z", + "aliases": [ + "CVE-2024-6219" + ], + "summary": "CVE-2024-6219 in github.com/canonical/lxd", + "details": "CVE-2024-6219 in github.com/canonical/lxd.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/canonical/lxd before v5.21.1.", + "affected": [ + { + "package": { + "name": "github.com/canonical/lxd", + "ecosystem": "Go" + }, + "ranges": [ + { + "type": "SEMVER", + "events": [ + { + "introduced": "0" + } + ] + } + ], + "ecosystem_specific": { + "custom_ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.21.1" + } + ] + } + ] + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://www.cve.org/CVERecord?id=CVE-2024-6219" + }, + { + "type": "WEB", + "url": "https://github.com/canonical/lxd/security/advisories/GHSA-jpmc-7p9c-4rxf" + } + ], + "database_specific": { + "url": "https://pkg.go.dev/vuln/GO-2024-3313", + "review_status": "UNREVIEWED" + } +} \ No newline at end of file diff --git a/data/reports/GO-2024-3311.yaml b/data/reports/GO-2024-3311.yaml new file mode 100644 index 00000000..81716b07 --- /dev/null +++ b/data/reports/GO-2024-3311.yaml @@ -0,0 +1,22 @@ +id: GO-2024-3311 +modules: + - module: github.com/moby/moby + versions: + - introduced: 25.0.0+incompatible + - fixed: 26.1.0+incompatible + vulnerable_at: 26.0.2+incompatible +summary: NULL Pointer Dereference on moby image history in github.com/moby/moby +cves: + - CVE-2024-36620 +ghsas: + - GHSA-q59j-vv4j-v33c +references: + - advisory: https://github.com/advisories/GHSA-q59j-vv4j-v33c + - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-36620 + - fix: https://github.com/moby/moby/commit/ab570ab3d62038b3d26f96a9bb585d0b6095b9b4 + - web: https://gist.github.com/1047524396/f08816669701ab478a265a811d2c89b2 + - web: https://github.com/moby/moby/blob/v26.0.2/daemon/images/image_history.go#L48 +source: + id: GHSA-q59j-vv4j-v33c + created: 2024-12-09T18:00:06.921857542Z +review_status: UNREVIEWED diff --git a/data/reports/GO-2024-3312.yaml b/data/reports/GO-2024-3312.yaml new file mode 100644 index 00000000..ccc79543 --- /dev/null +++ b/data/reports/GO-2024-3312.yaml @@ -0,0 +1,16 @@ +id: GO-2024-3312 +modules: + - module: github.com/canonical/lxd + non_go_versions: + - fixed: 5.21.2 + vulnerable_at: 0.0.0-20241209155119-76da976c6ee7 +summary: CVE-2024-6156 in github.com/canonical/lxd +cves: + - CVE-2024-6156 +references: + - advisory: https://www.cve.org/CVERecord?id=CVE-2024-6156 + - web: https://github.com/canonical/lxd/security/advisories/GHSA-4c49-9fpc-hc3v +source: + id: CVE-2024-6156 + created: 2024-12-09T18:00:39.790548961Z +review_status: UNREVIEWED diff --git a/data/reports/GO-2024-3313.yaml b/data/reports/GO-2024-3313.yaml new file mode 100644 index 00000000..f79800e8 --- /dev/null +++ b/data/reports/GO-2024-3313.yaml @@ -0,0 +1,16 @@ +id: GO-2024-3313 +modules: + - module: github.com/canonical/lxd + non_go_versions: + - fixed: 5.21.1 + vulnerable_at: 0.0.0-20241209155119-76da976c6ee7 +summary: CVE-2024-6219 in github.com/canonical/lxd +cves: + - CVE-2024-6219 +references: + - advisory: https://www.cve.org/CVERecord?id=CVE-2024-6219 + - web: https://github.com/canonical/lxd/security/advisories/GHSA-jpmc-7p9c-4rxf +source: + id: CVE-2024-6219 + created: 2024-12-09T18:00:49.879863433Z +review_status: UNREVIEWED