Skip to content

Commit d02edb6

Browse files
nicholashusingopherbot
authored andcommitted
data/reports: update 4 REVIEWED reports
- data/reports/GO-2023-2331.yaml - data/reports/GO-2024-2587.yaml - data/reports/GO-2025-3770.yaml - data/reports/GO-2025-4007.yaml Fixes #4016 Fixes #4080 Fixes #4089 Fixes #4092 Fixes #4132 Change-Id: I1053af845eb7fc5fe2f3fc2573c4af283af0a81a Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/721782 LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Reviewed-by: Ethan Lee <ethanalee@google.com> Auto-Submit: Nicholas Husin <nsh@golang.org> Reviewed-by: Nicholas Husin <husin@google.com>
1 parent 88dcc34 commit d02edb6

File tree

9 files changed

+26
-85
lines changed

9 files changed

+26
-85
lines changed

data/cve/v5/GO-2025-4007.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
"descriptions": [
1414
{
1515
"lang": "en",
16-
"value": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scals non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains."
16+
"value": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains."
1717
}
1818
],
1919
"affected": [

data/osv/GO-2023-2331.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@
2020
"type": "SEMVER",
2121
"events": [
2222
{
23-
"introduced": "0"
23+
"introduced": "0.37.0"
2424
},
2525
{
2626
"fixed": "0.46.0"

data/osv/GO-2024-2587.json

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,19 @@
3636
"ExecCypherMap"
3737
]
3838
}
39+
],
40+
"custom_ranges": [
41+
{
42+
"type": "ECOSYSTEM",
43+
"events": [
44+
{
45+
"introduced": "0"
46+
},
47+
{
48+
"fixed": "1.1.1"
49+
}
50+
]
51+
}
3952
]
4053
}
4154
}

data/osv/GO-2025-3770.json

Lines changed: 3 additions & 71 deletions
Original file line numberDiff line numberDiff line change
@@ -6,77 +6,9 @@
66
"aliases": [
77
"GHSA-vrw8-fxc6-2r93"
88
],
9-
"summary": "Host Header Injection which Leads to Open Redirect in RedirectSlashes in github.com/go-chi/chi",
10-
"details": "Host Header Injection which Leads to Open Redirect in RedirectSlashes in github.com/go-chi/chi",
9+
"summary": "Host header injection which leads to open redirect in RedirectSlashes in github.com/go-chi/chi",
10+
"details": "Host header injection which leads to open redirect in RedirectSlashes in github.com/go-chi/chi",
1111
"affected": [
12-
{
13-
"package": {
14-
"name": "github.com/go-chi/chi",
15-
"ecosystem": "Go"
16-
},
17-
"ranges": [
18-
{
19-
"type": "SEMVER",
20-
"events": [
21-
{
22-
"introduced": "0"
23-
}
24-
]
25-
}
26-
],
27-
"ecosystem_specific": {}
28-
},
29-
{
30-
"package": {
31-
"name": "github.com/go-chi/chi/v2",
32-
"ecosystem": "Go"
33-
},
34-
"ranges": [
35-
{
36-
"type": "SEMVER",
37-
"events": [
38-
{
39-
"introduced": "0"
40-
}
41-
]
42-
}
43-
],
44-
"ecosystem_specific": {}
45-
},
46-
{
47-
"package": {
48-
"name": "github.com/go-chi/chi/v3",
49-
"ecosystem": "Go"
50-
},
51-
"ranges": [
52-
{
53-
"type": "SEMVER",
54-
"events": [
55-
{
56-
"introduced": "0"
57-
}
58-
]
59-
}
60-
],
61-
"ecosystem_specific": {}
62-
},
63-
{
64-
"package": {
65-
"name": "github.com/go-chi/chi/v4",
66-
"ecosystem": "Go"
67-
},
68-
"ranges": [
69-
{
70-
"type": "SEMVER",
71-
"events": [
72-
{
73-
"introduced": "0"
74-
}
75-
]
76-
}
77-
],
78-
"ecosystem_specific": {}
79-
},
8012
{
8113
"package": {
8214
"name": "github.com/go-chi/chi/v5",
@@ -87,7 +19,7 @@
8719
"type": "SEMVER",
8820
"events": [
8921
{
90-
"introduced": "0"
22+
"introduced": "5.2.1"
9123
},
9224
{
9325
"fixed": "5.2.2"

data/osv/GO-2025-4007.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"CVE-2025-58187"
99
],
1010
"summary": "Quadratic complexity when checking name constraints in crypto/x509",
11-
"details": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scals non-linearly with respect to the size of the certificate.\n\nThis affects programs which validate arbitrary certificate chains.",
11+
"details": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate.\n\nThis affects programs which validate arbitrary certificate chains.",
1212
"affected": [
1313
{
1414
"package": {

data/reports/GO-2023-2331.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@ id: GO-2023-2331
22
modules:
33
- module: go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc
44
versions:
5+
- introduced: 0.37.0
56
- fixed: 0.46.0
67
vulnerable_at: 0.45.0
78
packages:

data/reports/GO-2024-2587.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
11
id: GO-2024-2587
22
modules:
33
- module: github.com/apache/age/drivers/golang
4+
non_go_versions:
5+
- fixed: 1.1.1
46
vulnerable_at: 0.0.0-20240221054422-3b2b394eb669
57
packages:
68
- package: github.com/apache/age/drivers/golang/age

data/reports/GO-2025-3770.yaml

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,13 @@
11
id: GO-2025-3770
22
modules:
3-
- module: github.com/go-chi/chi
4-
vulnerable_at: 1.5.5
5-
- module: github.com/go-chi/chi/v2
6-
vulnerable_at: 2.1.1
7-
- module: github.com/go-chi/chi/v3
8-
vulnerable_at: 3.3.5
9-
- module: github.com/go-chi/chi/v4
10-
vulnerable_at: 4.1.3
113
- module: github.com/go-chi/chi/v5
124
versions:
5+
- introduced: 5.2.1
136
- fixed: 5.2.2
147
vulnerable_at: 5.2.1
158
summary: |-
16-
Host Header Injection which Leads to Open Redirect in RedirectSlashes
17-
in github.com/go-chi/chi
9+
Host header injection which leads to open redirect in RedirectSlashes in
10+
github.com/go-chi/chi
1811
ghsas:
1912
- GHSA-vrw8-fxc6-2r93
2013
references:

data/reports/GO-2025-4007.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ modules:
4646
summary: Quadratic complexity when checking name constraints in crypto/x509
4747
description: |-
4848
Due to the design of the name constraint checking algorithm, the processing time
49-
of some inputs scals non-linearly with respect to the size of the certificate.
49+
of some inputs scale non-linearly with respect to the size of the certificate.
5050
5151
This affects programs which validate arbitrary certificate chains.
5252
cves:

0 commit comments

Comments
 (0)