Skip to content

Commit e5e5fe1

Browse files
committed
data/reports: update GO-2024-2527
- data/reports/GO-2024-2527.yaml Updates #2527 Fixes #2952 Change-Id: I9026e48ff8f896fd653f3accb55fbe1f5c630a07 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/597355 Reviewed-by: Tatiana Bradley <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
1 parent 002e9e9 commit e5e5fe1

File tree

2 files changed

+28
-22
lines changed

2 files changed

+28
-22
lines changed

data/osv/GO-2024-2527.json

+14-13
Original file line numberDiff line numberDiff line change
@@ -3,16 +3,15 @@
33
"id": "GO-2024-2527",
44
"modified": "0001-01-01T00:00:00Z",
55
"published": "0001-01-01T00:00:00Z",
6-
"withdrawn": "2024-07-01T15:21:57Z",
76
"aliases": [
87
"GHSA-5x4g-q5rc-36jp"
98
],
10-
"summary": "WITHDRAWN: Etcd pkg Insecure ciphers are allowed by default in go.etcd.io/etcd/client/pkg/v3",
11-
"details": "(This report has been withdrawn with reason: \"too many false positives\"). .\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: go.etcd.io/etcd/client/pkg/v3 before v3.3.23, from v3.4.0-rc.0 before v3.4.10.",
9+
"summary": "Insecure ciphers are allowed by default in go.etcd.io/etcd",
10+
"details": "The TLS ciphers list supported by etcd contains insecure cipher suites. Users may specify that an insecure cipher is used via “--cipher-suites” flag. A list of secure suites is used by default.",
1211
"affected": [
1312
{
1413
"package": {
15-
"name": "go.etcd.io/etcd/client/pkg/v3",
14+
"name": "go.etcd.io/etcd",
1615
"ecosystem": "Go"
1716
},
1817
"ranges": [
@@ -21,26 +20,28 @@
2120
"events": [
2221
{
2322
"introduced": "0"
23+
},
24+
{
25+
"fixed": "0.5.0-alpha.5.0.20221102000833-1f054980bc27"
2426
}
2527
]
2628
}
2729
],
2830
"ecosystem_specific": {
31+
"imports": [
32+
{
33+
"path": "go.etcd.io/etcd/pkg/tlsutil"
34+
}
35+
],
2936
"custom_ranges": [
3037
{
3138
"type": "ECOSYSTEM",
3239
"events": [
3340
{
34-
"introduced": "0"
35-
},
36-
{
37-
"fixed": "3.3.23"
38-
},
39-
{
40-
"introduced": "3.4.0-rc.0"
41+
"introduced": "3.2.22"
4142
},
4243
{
43-
"fixed": "3.4.10"
44+
"fixed": "3.4.22"
4445
}
4546
]
4647
}
@@ -56,6 +57,6 @@
5657
],
5758
"database_specific": {
5859
"url": "https://pkg.go.dev/vuln/GO-2024-2527",
59-
"review_status": "UNREVIEWED"
60+
"review_status": "REVIEWED"
6061
}
6162
}

data/reports/GO-2024-2527.yaml

+14-9
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,25 @@
11
id: GO-2024-2527
22
modules:
3-
- module: go.etcd.io/etcd/client/pkg/v3
3+
- module: go.etcd.io/etcd
4+
versions:
5+
- fixed: 0.5.0-alpha.5.0.20221102000833-1f054980bc27
46
non_go_versions:
5-
- fixed: 3.3.23
6-
- introduced: 3.4.0-rc.0
7-
- fixed: 3.4.10
8-
vulnerable_at: 3.5.14
9-
summary: 'WITHDRAWN: Etcd pkg Insecure ciphers are allowed by default in go.etcd.io/etcd/client/pkg/v3'
10-
description: '(This report has been withdrawn with reason: "too many false positives"). '
11-
withdrawn: 2024-07-01T15:21:57Z
7+
- introduced: 3.2.22
8+
- fixed: 3.4.22
9+
vulnerable_at: 0.5.0-alpha.5.0.20220915004622-85b640cee793
10+
packages:
11+
- package: go.etcd.io/etcd/pkg/tlsutil
12+
summary: Insecure ciphers are allowed by default in go.etcd.io/etcd
13+
description: |-
14+
The TLS ciphers list supported by etcd contains insecure cipher suites. Users
15+
may specify that an insecure cipher is used via “--cipher-suites” flag. A
16+
list of secure suites is used by default.
1217
ghsas:
1318
- GHSA-5x4g-q5rc-36jp
1419
references:
1520
- advisory: https://github.com/etcd-io/etcd/security/advisories/GHSA-5x4g-q5rc-36jp
1621
source:
1722
id: GHSA-5x4g-q5rc-36jp
1823
created: 2024-06-14T11:40:23.789526-04:00
19-
review_status: UNREVIEWED
24+
review_status: REVIEWED
2025
unexcluded: EFFECTIVELY_PRIVATE

0 commit comments

Comments
 (0)