Skip to content

Commit 0221ab8

Browse files
committed
data/reports: add GO-2024-2657.yaml
Aliases: CVE-2024-28250, GHSA-v6q2-4qr3-5cw6 Fixes #2657 Change-Id: Ia3bd85f146f0ba26a49484d8e1866fe317d9676f Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/573695 Reviewed-by: Damien Neil <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]> Run-TryBot: Tim King <[email protected]> TryBot-Result: Gopher Robot <[email protected]>
1 parent c4ed78b commit 0221ab8

File tree

2 files changed

+90
-0
lines changed

2 files changed

+90
-0
lines changed

data/osv/GO-2024-2657.json

+63
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2024-2657",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2024-28250",
8+
"GHSA-v6q2-4qr3-5cw6"
9+
],
10+
"summary": "Unencrypted traffic between nodes in github.com/cilium/cilium",
11+
"details": "In Cilium clusters with WireGuard enabled and traffic matching Layer 7 policies: traffic that should be WireGuard-encrypted is sent unencrypted between a node's Envoy proxy and pods on other nodes, and traffic that should be WireGuard-encrypted is sent unencrypted between a node's DNS proxy and pods on other nodes.",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/cilium/cilium",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "1.14.0"
24+
},
25+
{
26+
"fixed": "1.14.8"
27+
},
28+
{
29+
"introduced": "1.15.0"
30+
},
31+
{
32+
"fixed": "1.15.2"
33+
}
34+
]
35+
}
36+
],
37+
"ecosystem_specific": {}
38+
}
39+
],
40+
"references": [
41+
{
42+
"type": "ADVISORY",
43+
"url": "https://github.com/cilium/cilium/security/advisories/GHSA-v6q2-4qr3-5cw6"
44+
}
45+
],
46+
"credits": [
47+
{
48+
"name": "@brb"
49+
},
50+
{
51+
"name": "@giorio94"
52+
},
53+
{
54+
"name": "@gandro"
55+
},
56+
{
57+
"name": "@jschwinger233"
58+
}
59+
],
60+
"database_specific": {
61+
"url": "https://pkg.go.dev/vuln/GO-2024-2657"
62+
}
63+
}

data/reports/GO-2024-2657.yaml

+27
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
id: GO-2024-2657
2+
modules:
3+
- module: github.com/cilium/cilium
4+
versions:
5+
- introduced: 1.14.0
6+
fixed: 1.14.8
7+
- introduced: 1.15.0
8+
fixed: 1.15.2
9+
vulnerable_at: 1.15.1
10+
summary: Unencrypted traffic between nodes in github.com/cilium/cilium
11+
description: |-
12+
In Cilium clusters with WireGuard enabled and traffic matching Layer 7 policies:
13+
traffic that should be WireGuard-encrypted is sent unencrypted between a node's
14+
Envoy proxy and pods on other nodes, and traffic that should be
15+
WireGuard-encrypted is sent unencrypted between a node's DNS proxy and pods on
16+
other nodes.
17+
cves:
18+
- CVE-2024-28250
19+
ghsas:
20+
- GHSA-v6q2-4qr3-5cw6
21+
credits:
22+
- '@brb'
23+
- '@giorio94'
24+
- '@gandro'
25+
- '@jschwinger233'
26+
references:
27+
- advisory: https://github.com/cilium/cilium/security/advisories/GHSA-v6q2-4qr3-5cw6

0 commit comments

Comments
 (0)