forked from wolfi-dev/advisories
-
Notifications
You must be signed in to change notification settings - Fork 0
/
calico.advisories.yaml
350 lines (325 loc) · 9.75 KB
/
calico.advisories.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
schema-version: 2.0.2
package:
name: calico
advisories:
- id: CGA-2cvj-f2mr-fc7r
aliases:
- CVE-2020-13597
- GHSA-pf59-j7c2-rh6x
events:
- timestamp: 2024-04-26T07:10:26Z
type: detection
data:
type: scan/v1
data:
subpackageName: calico
componentID: 5ad83767079d8c0a
componentName: github.com/projectcalico/calico
componentVersion: v0.0.0-20240401174130-638464f94665
componentType: go-module
componentLocation: /usr/bin/calico-filecheck
scanner: grype
- timestamp: 2024-05-16T16:18:19Z
type: false-positive-determination
data:
type: vulnerable-code-version-not-used
note: This vulnerbility affects versions 3.14.0 and below, but the installed commit corresponds to version 3.28.0.
- id: CGA-35qx-c4ph-xfm9
aliases:
- CVE-2023-5528
- GHSA-hq6q-c2x6-hmch
events:
- timestamp: 2023-11-22T09:29:22Z
type: fixed
data:
fixed-version: 3.26.4-r1
- id: CGA-3mf3-62wc-gr85
aliases:
- CVE-2023-48795
- GHSA-45x7-px36-x8w8
events:
- timestamp: 2023-12-19T10:31:08Z
type: fixed
data:
fixed-version: 3.27.0-r0
- id: CGA-5hp6-8xch-g7p7
aliases:
- CVE-2023-2727
- GHSA-qc2g-gmh6-95p4
events:
- timestamp: 2023-07-06T19:08:57Z
type: fixed
data:
fixed-version: 3.26.1-r5
- id: CGA-5rx5-w72p-44h8
aliases:
- CVE-2023-45284
- GHSA-rq3x-83w4-p28c
events:
- timestamp: 2023-11-07T19:23:53Z
type: false-positive-determination
data:
type: vulnerable-code-not-included-in-package
note: Only affects Windows
- id: CGA-6gv6-6q3m-628r
aliases:
- CVE-2023-45142
- GHSA-rcjv-mgp8-qvmr
events:
- timestamp: 2023-10-30T12:36:29Z
type: fixed
data:
fixed-version: 3.26.3-r4
- id: CGA-84hf-mcg7-797m
aliases:
- CVE-2023-45289
- GHSA-32ch-6x54-q4h9
events:
- timestamp: 2024-03-12T07:10:13Z
type: fixed
data:
fixed-version: 3.27.2-r2
- id: CGA-8733-3cqm-ggr3
aliases:
- CVE-2024-24786
- GHSA-8r3f-844c-mc37
events:
- timestamp: 2024-03-14T07:03:58Z
type: detection
data:
type: scan/v1
data:
subpackageName: calico-typha-client
componentID: 32ecb90c16c6c15a
componentName: google.golang.org/protobuf
componentVersion: v1.31.0
componentType: go-module
componentLocation: /usr/bin/typha-client
scanner: grype
- timestamp: 2024-03-15T18:08:16Z
type: fixed
data:
fixed-version: 3.27.2-r3
- id: CGA-8cf4-mmm4-2rr5
aliases:
- CVE-2023-32731
- GHSA-cfgp-2977-2fmm
events:
- timestamp: 2023-07-06T19:08:10Z
type: fixed
data:
fixed-version: 3.26.1-r5
- id: CGA-8wx7-fm9g-94xf
aliases:
- CVE-2020-8552
- GHSA-82hx-w2r5-c2wq
events:
- timestamp: 2023-09-19T16:40:39Z
type: false-positive-determination
data:
type: vulnerable-code-not-included-in-package
note: Go vulndb has marked this code NOT_IMPORTABLE.
- id: CGA-9c58-fhmc-cvq5
aliases:
- CVE-2023-45288
- GHSA-4v7x-pqxf-cx7m
events:
- timestamp: 2024-04-20T12:15:40Z
type: detection
data:
type: scan/v1
data:
subpackageName: calico-felix
componentID: 79f1ea4bfeb6abea
componentName: golang.org/x/net
componentVersion: v0.19.0
componentType: go-module
componentLocation: /usr/bin/iptables-locker
scanner: grype
- timestamp: 2024-04-20T14:44:36Z
type: fixed
data:
fixed-version: 3.27.3-r1
- id: CGA-9g26-x9q7-w8vh
aliases:
- CVE-2022-28224
- GHSA-9394-xfq9-6qrp
events:
- timestamp: 2024-04-26T07:10:23Z
type: detection
data:
type: scan/v1
data:
subpackageName: calico
componentID: 5ad83767079d8c0a
componentName: github.com/projectcalico/calico
componentVersion: v0.0.0-20240401174130-638464f94665
componentType: go-module
componentLocation: /usr/bin/calico-filecheck
scanner: grype
- timestamp: 2024-05-06T00:09:48Z
type: false-positive-determination
data:
type: vulnerable-code-version-not-used
note: 'This vulnerability was matched to the module "github.com/projectcalico/calico" at the following location(s): /usr/bin/calicoctl. In all cases, the installed version of the module (git commit 638464f946657417dd4900724112eb844ce5be03) corresponds to a version tag (v3.27.3) that is later than the fixed version (3.20.5).'
- id: CGA-9mcm-vfq6-7r34
aliases:
- CVE-2024-24791
- GHSA-hw49-2p59-3mhj
events:
- timestamp: 2024-07-04T07:06:52Z
type: detection
data:
type: scan/v1
data:
subpackageName: calico
componentID: b13e0e06ee7fd897
componentName: stdlib
componentVersion: go1.22.4
componentType: go-module
componentLocation: /bin/calico-node
scanner: grype
- timestamp: 2024-07-04T17:20:18Z
type: fixed
data:
fixed-version: 3.28.0-r4
- id: CGA-fpwp-859h-r7h7
aliases:
- CVE-2024-24783
- GHSA-3q2c-pvp5-3cqp
events:
- timestamp: 2024-03-12T07:10:17Z
type: fixed
data:
fixed-version: 3.27.2-r2
- id: CGA-fxrq-3q78-hxqf
aliases:
- CVE-2024-24785
- GHSA-j6m3-gc37-6r6q
events:
- timestamp: 2024-03-12T07:10:19Z
type: fixed
data:
fixed-version: 3.27.2-r2
- id: CGA-h3hf-wvxm-w8fq
aliases:
- CVE-2023-44487
- GHSA-m425-mq94-257g
- GHSA-qppj-fm5r-hxr3
events:
- timestamp: 2023-10-30T10:57:46Z
type: fixed
data:
fixed-version: 3.26.3-r4
- id: CGA-p3r2-w7pg-893h
aliases:
- CVE-2024-24784
- GHSA-fgq5-q76c-gx78
events:
- timestamp: 2024-03-12T07:10:14Z
type: fixed
data:
fixed-version: 3.27.2-r2
- id: CGA-p4rc-vvrv-gcqw
aliases:
- CVE-2023-3955
- GHSA-q78c-gwqw-jcmc
events:
- timestamp: 2023-11-02T14:08:02Z
type: fixed
data:
fixed-version: 3.26.3-r5
- id: CGA-pr9r-wvpf-hqjp
aliases:
- CVE-2023-45290
- GHSA-rr6r-cfgf-gc6h
events:
- timestamp: 2024-03-12T07:10:16Z
type: fixed
data:
fixed-version: 3.27.2-r2
- id: CGA-q488-wj55-wx4j
aliases:
- CVE-2023-45283
- GHSA-vvjp-q62m-2vph
events:
- timestamp: 2023-11-07T19:23:51Z
type: false-positive-determination
data:
type: vulnerable-code-not-included-in-package
note: Only affects Windows
- id: CGA-v7vw-h5w2-c4qw
aliases:
- CVE-2024-3177
- GHSA-pxhw-596r-rwq5
events:
- timestamp: 2024-04-24T08:13:30Z
type: detection
data:
type: scan/v1
data:
subpackageName: calico
componentID: 1745e3712bfb78d2
componentName: k8s.io/kubernetes
componentVersion: v1.27.8
componentType: go-module
componentLocation: /bin/calico-node
scanner: grype
- timestamp: 2024-05-13T11:00:57Z
type: fixed
data:
fixed-version: 3.28.0-r0
- id: CGA-vw5m-65r5-hgf5
aliases:
- CVE-2024-33522
- GHSA-6362-gv4m-53ww
events:
- timestamp: 2024-06-11T08:09:25Z
type: detection
data:
type: scan/v1
data:
subpackageName: calico
componentID: 0a9fb93e8e3d86bc
componentName: github.com/projectcalico/calico
componentVersion: v0.0.0-20240510230432-413e6f5593a8
componentType: go-module
componentLocation: /usr/bin/calico-apiserver
scanner: grype
- timestamp: 2024-06-20T13:39:25Z
type: false-positive-determination
data:
type: vulnerable-code-version-not-used
note: CVE exists in versions <3.26.5 or >=3.27.0 and <3.27.3. This package uses v3.28.0.
- id: CGA-w36x-cq9x-2c3j
aliases:
- CVE-2023-41378
- GHSA-5r5h-q934-cccp
events:
- timestamp: 2024-04-26T07:10:21Z
type: detection
data:
type: scan/v1
data:
subpackageName: calico
componentID: 0c887b83763f5ef6
componentName: github.com/projectcalico/calico
componentVersion: v0.0.0-20240401174130-638464f94665
componentType: go-module
componentLocation: /usr/bin/calico-apiserver
scanner: grype
- timestamp: 2024-05-06T00:09:48Z
type: false-positive-determination
data:
type: vulnerable-code-version-not-used
note: 'This vulnerability was matched to the module "github.com/projectcalico/calico" at the following location(s): /usr/bin/calicoctl. In all cases, the installed version of the module (git commit 638464f946657417dd4900724112eb844ce5be03) corresponds to a version tag (v3.27.3) that is later than the fixed version (3.26.3).'
- id: CGA-xpgv-5933-6hp8
aliases:
- CVE-2019-11255
- GHSA-f4w6-3rh6-6q4q
events:
- timestamp: 2023-08-11T21:07:34Z
type: false-positive-determination
data:
type: component-vulnerability-mismatch
note: Vulnerable code is part of external-csi-driver and not included in calico