Skip to content

Commit 117c14b

Browse files
thatnealpatelgopherbot
authored andcommitted
data/reports: add 2 reports
- data/reports/GO-2025-3639.yaml - data/reports/GO-2025-3640.yaml Fixes #3639 Fixes #3640 Change-Id: I72026aade82ba97aa497d2c31672f973b88cd44a Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/667836 Reviewed-by: Zvonimir Pavlinovic <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]> Auto-Submit: Neal Patel <[email protected]> Commit-Queue: Neal Patel <[email protected]>
1 parent 78446b5 commit 117c14b

File tree

4 files changed

+176
-0
lines changed

4 files changed

+176
-0
lines changed

data/osv/GO-2025-3639.json

+60
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2025-3639",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2017-9232",
8+
"GHSA-j3hp-pv6v-rgrx"
9+
],
10+
"summary": "Juju uses a UNIX domain socket without setting appropriate permissions in github.com/juju/juju",
11+
"details": "Juju uses a UNIX domain socket without setting appropriate permissions in github.com/juju/juju",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/juju/juju",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "0.0.0-20170524231039-0417178a3c28"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {}
32+
}
33+
],
34+
"references": [
35+
{
36+
"type": "ADVISORY",
37+
"url": "https://github.com/advisories/GHSA-j3hp-pv6v-rgrx"
38+
},
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9232"
42+
},
43+
{
44+
"type": "FIX",
45+
"url": "https://github.com/juju/juju/commit/0417178a3c2869537860e8b3b5e787ce1732231f"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://bugs.launchpad.net/juju/+bug/1682411"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://www.exploit-db.com/exploits/44023"
54+
}
55+
],
56+
"database_specific": {
57+
"url": "https://pkg.go.dev/vuln/GO-2025-3639",
58+
"review_status": "UNREVIEWED"
59+
}
60+
}

data/osv/GO-2025-3640.json

+69
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2025-3640",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2017-14992",
8+
"GHSA-hqwh-8xv9-42hw"
9+
],
10+
"summary": "Memory exhaustion in github.com/vbatts/tar-split",
11+
"details": "Memory exhaustion in github.com/vbatts/tar-split",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/vbatts/tar-split",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "0.10.2"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {
32+
"imports": [
33+
{
34+
"path": "github.com/vbatts/tar-split/tar/asm",
35+
"symbols": [
36+
"NewInputTarStream"
37+
]
38+
}
39+
]
40+
}
41+
}
42+
],
43+
"references": [
44+
{
45+
"type": "ADVISORY",
46+
"url": "https://github.com/advisories/GHSA-hqwh-8xv9-42hw"
47+
},
48+
{
49+
"type": "FIX",
50+
"url": "https://github.com/vbatts/tar-split/pull/42"
51+
},
52+
{
53+
"type": "WEB",
54+
"url": "https://github.com/moby/moby/issues/35075"
55+
},
56+
{
57+
"type": "WEB",
58+
"url": "https://github.com/vbatts/tar-split/releases/tag/v0.10.2"
59+
},
60+
{
61+
"type": "WEB",
62+
"url": "https://web.archive.org/web/20171119174639/https://blog.cloudpassage.com/2017/10/13/discovering-docker-cve-2017-14992"
63+
}
64+
],
65+
"database_specific": {
66+
"url": "https://pkg.go.dev/vuln/GO-2025-3640",
67+
"review_status": "REVIEWED"
68+
}
69+
}

data/reports/GO-2025-3639.yaml

+22
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
id: GO-2025-3639
2+
modules:
3+
- module: github.com/juju/juju
4+
versions:
5+
- fixed: 0.0.0-20170524231039-0417178a3c28
6+
summary: Juju uses a UNIX domain socket without setting appropriate permissions in github.com/juju/juju
7+
cves:
8+
- CVE-2017-9232
9+
ghsas:
10+
- GHSA-j3hp-pv6v-rgrx
11+
references:
12+
- advisory: https://github.com/advisories/GHSA-j3hp-pv6v-rgrx
13+
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2017-9232
14+
- fix: https://github.com/juju/juju/commit/0417178a3c2869537860e8b3b5e787ce1732231f
15+
- web: https://bugs.launchpad.net/juju/+bug/1682411
16+
- web: https://www.exploit-db.com/exploits/44023
17+
notes:
18+
- fix: 'github.com/juju/juju: could not add vulnerable_at: cannot auto-guess when fixed version is 0.0.0 pseudo-version'
19+
source:
20+
id: GHSA-j3hp-pv6v-rgrx
21+
created: 2025-04-24T12:21:22.192354-04:00
22+
review_status: UNREVIEWED

data/reports/GO-2025-3640.yaml

+25
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
id: GO-2025-3640
2+
modules:
3+
- module: github.com/vbatts/tar-split
4+
versions:
5+
- fixed: 0.10.2
6+
vulnerable_at: 0.10.1
7+
packages:
8+
- package: github.com/vbatts/tar-split/tar/asm
9+
symbols:
10+
- NewInputTarStream
11+
summary: Memory exhaustion in github.com/vbatts/tar-split
12+
cves:
13+
- CVE-2017-14992
14+
ghsas:
15+
- GHSA-hqwh-8xv9-42hw
16+
references:
17+
- advisory: https://github.com/advisories/GHSA-hqwh-8xv9-42hw
18+
- fix: https://github.com/vbatts/tar-split/pull/42
19+
- web: https://github.com/moby/moby/issues/35075
20+
- web: https://github.com/vbatts/tar-split/releases/tag/v0.10.2
21+
- web: https://web.archive.org/web/20171119174639/https://blog.cloudpassage.com/2017/10/13/discovering-docker-cve-2017-14992
22+
source:
23+
id: GHSA-hqwh-8xv9-42hw
24+
created: 2025-04-24T12:20:42.620793-04:00
25+
review_status: REVIEWED

0 commit comments

Comments
 (0)