You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have received a complain by my information security department about multiple found vulnerabilities in the alertmanager and amtools binaries provided with the latest (v0.27.0) release.
Could the affected packages please be updated and a new release created?
Findings:
alertmanager
=== Symbol Results ===
Vulnerability #1: GO-2024-2963
Denial of service due to improper 100-continue handling in net/http
More info: https://pkg.go.dev/vuln/GO-2024-2963
Standard library
Found in: net/[email protected]
Fixed in: net/[email protected]
Vulnerable symbols found:
#1: http.Client.CloseIdleConnections
#2: http.Client.Do
#3: http.Client.Get
#4: http.Client.Head
#5: http.Client.Post
Use '-show traces' to see the other 5 found symbols
Vulnerability #2: GO-2024-2887
Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses in
net/netip
More info: https://pkg.go.dev/vuln/GO-2024-2887
Standard library
Found in: net/[email protected]
Fixed in: net/[email protected]
Vulnerable symbols found:
#1: netip.Addr.IsGlobalUnicast
#2: netip.Addr.IsInterfaceLocalMulticast
#3: netip.Addr.IsLinkLocalMulticast
#4: netip.Addr.IsLoopback
#5: netip.Addr.IsMulticast
Use '-show traces' to see the other 1 found symbols
Vulnerability #3: GO-2024-2883
Denial of service via malicious preflight requests in github.com/rs/cors
More info: https://pkg.go.dev/vuln/GO-2024-2883
Module: github.com/rs/cors
Found in: github.com/rs/[email protected]
Fixed in: github.com/rs/[email protected]
Vulnerable symbols found:
#1: cors.Default
#2: cors.New
Vulnerability #4: GO-2024-2687
HTTP/2 CONTINUATION flood in net/http
More info: https://pkg.go.dev/vuln/GO-2024-2687
Module: golang.org/x/net
Found in: golang.org/x/[email protected]
Fixed in: golang.org/x/[email protected]
Vulnerable symbols found:
#1: http2.ClientConn.Close
#2: http2.ClientConn.Ping
#3: http2.ClientConn.RoundTrip
#4: http2.ClientConn.Shutdown
#5: http2.ConfigureTransports
Use '-show traces' to see the other 42 found symbols
Standard library
Found in: net/[email protected]
Fixed in: net/[email protected]
Vulnerable symbols found:
#1: http.CanonicalHeaderKey
#2: http.Client.CloseIdleConnections
#3: http.Client.Do
#4: http.Client.Get
#5: http.Client.Head
Use '-show traces' to see the other 162 found symbols
Vulnerability #5: GO-2024-2610
Errors returned from JSON marshaling may break template escaping in
html/template
More info: https://pkg.go.dev/vuln/GO-2024-2610
Standard library
Found in: html/[email protected]
Fixed in: html/[email protected]
Vulnerable symbols found:
#1: template.Template.Execute
#2: template.Template.ExecuteTemplate
Vulnerability #6: GO-2024-2609
Comments in display names are incorrectly handled in net/mail
More info: https://pkg.go.dev/vuln/GO-2024-2609
Standard library
Found in: net/[email protected]
Fixed in: net/[email protected]
Vulnerable symbols found:
#1: mail.ParseAddress
#2: mail.ParseAddressList
Vulnerability #7: GO-2024-2600
Incorrect forwarding of sensitive headers and cookies on HTTP redirect in
net/http
More info: https://pkg.go.dev/vuln/GO-2024-2600
Standard library
Found in: net/[email protected]
Fixed in: net/[email protected]
Vulnerable symbols found:
#1: http.Client.Do
#2: http.Client.Get
#3: http.Client.Head
#4: http.Client.Post
#5: http.Client.PostForm
Use '-show traces' to see the other 1 found symbols
Vulnerability #8: GO-2024-2599
Memory exhaustion in multipart form parsing in net/textproto and net/http
More info: https://pkg.go.dev/vuln/GO-2024-2599
Standard library
Found in: net/[email protected]
Fixed in: net/[email protected]
Vulnerable symbols found:
#1: textproto.Reader.ReadCodeLine
#2: textproto.Reader.ReadContinuedLine
#3: textproto.Reader.ReadContinuedLineBytes
#4: textproto.Reader.ReadDotLines
#5: textproto.Reader.ReadLine
Use '-show traces' to see the other 3 found symbols
Vulnerability #9: GO-2024-2598
Verify panics on certificates with an unknown public key algorithm in
crypto/x509
More info: https://pkg.go.dev/vuln/GO-2024-2598
Standard library
Found in: crypto/[email protected]
Fixed in: crypto/[email protected]
Vulnerable symbols found:
#1: x509.Certificate.Verify
Your code is affected by 9 vulnerabilities from 1 module and the Go standard library.
This scan also found 0 vulnerabilities in packages you import and 3
vulnerabilities in modules you require, but your code doesn't appear to call
these vulnerabilities.
Use '-show verbose' for more details.
amtool
=== Symbol Results ===
Vulnerability #1: GO-2024-2963
Denial of service due to improper 100-continue handling in net/http
More info: https://pkg.go.dev/vuln/GO-2024-2963
Standard library
Found in: net/[email protected]
Fixed in: net/[email protected]
Vulnerable symbols found:
#1: http.Client.CloseIdleConnections
#2: http.Client.Do
#3: http.Client.Get
#4: http.Client.Head
#5: http.Client.Post
Use '-show traces' to see the other 5 found symbols
Vulnerability #2: GO-2024-2887
Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses in
net/netip
More info: https://pkg.go.dev/vuln/GO-2024-2887
Standard library
Found in: net/[email protected]
Fixed in: net/[email protected]
Vulnerable symbols found:
#1: netip.Addr.IsGlobalUnicast
#2: netip.Addr.IsInterfaceLocalMulticast
#3: netip.Addr.IsLinkLocalMulticast
#4: netip.Addr.IsLoopback
#5: netip.Addr.IsMulticast
Use '-show traces' to see the other 1 found symbols
Vulnerability #3: GO-2024-2687
HTTP/2 CONTINUATION flood in net/http
More info: https://pkg.go.dev/vuln/GO-2024-2687
Module: golang.org/x/net
Found in: golang.org/x/[email protected]
Fixed in: golang.org/x/[email protected]
Vulnerable symbols found:
#1: http2.ClientConn.Close
#2: http2.ClientConn.Ping
#3: http2.ClientConn.RoundTrip
#4: http2.ClientConn.Shutdown
#5: http2.ConfigureTransports
Use '-show traces' to see the other 42 found symbols
Standard library
Found in: net/[email protected]
Fixed in: net/[email protected]
Vulnerable symbols found:
#1: http.CanonicalHeaderKey
#2: http.Client.CloseIdleConnections
#3: http.Client.Do
#4: http.Client.Get
#5: http.Client.Head
Use '-show traces' to see the other 109 found symbols
Vulnerability #4: GO-2024-2610
Errors returned from JSON marshaling may break template escaping in
html/template
More info: https://pkg.go.dev/vuln/GO-2024-2610
Standard library
Found in: html/[email protected]
Fixed in: html/[email protected]
Vulnerable symbols found:
#1: template.Template.Execute
#2: template.Template.ExecuteTemplate
Vulnerability #5: GO-2024-2609
Comments in display names are incorrectly handled in net/mail
More info: https://pkg.go.dev/vuln/GO-2024-2609
Standard library
Found in: net/[email protected]
Fixed in: net/[email protected]
Vulnerable symbols found:
#1: mail.ParseAddress
Vulnerability #6: GO-2024-2600
Incorrect forwarding of sensitive headers and cookies on HTTP redirect in
net/http
More info: https://pkg.go.dev/vuln/GO-2024-2600
Standard library
Found in: net/[email protected]
Fixed in: net/[email protected]
Vulnerable symbols found:
#1: http.Client.Do
#2: http.Client.Get
#3: http.Client.Head
#4: http.Client.Post
#5: http.Client.PostForm
Use '-show traces' to see the other 1 found symbols
Vulnerability #7: GO-2024-2599
Memory exhaustion in multipart form parsing in net/textproto and net/http
More info: https://pkg.go.dev/vuln/GO-2024-2599
Standard library
Found in: net/[email protected]
Fixed in: net/[email protected]
Vulnerable symbols found:
#1: textproto.Reader.ReadCodeLine
#2: textproto.Reader.ReadContinuedLine
#3: textproto.Reader.ReadContinuedLineBytes
#4: textproto.Reader.ReadDotLines
#5: textproto.Reader.ReadLine
Use '-show traces' to see the other 3 found symbols
Vulnerability #8: GO-2024-2598
Verify panics on certificates with an unknown public key algorithm in
crypto/x509
More info: https://pkg.go.dev/vuln/GO-2024-2598
Standard library
Found in: crypto/[email protected]
Fixed in: crypto/[email protected]
Vulnerable symbols found:
#1: x509.Certificate.Verify
Your code is affected by 8 vulnerabilities from the Go standard library.
This scan also found 0 vulnerabilities in packages you import and 3
vulnerabilities in modules you require, but your code doesn't appear to call
these vulnerabilities.
Use '-show verbose' for more details.
The text was updated successfully, but these errors were encountered:
I have received a complain by my information security department about multiple found vulnerabilities in the alertmanager and amtools binaries provided with the latest (v0.27.0) release.
Could the affected packages please be updated and a new release created?
Findings:
alertmanager
amtool
The text was updated successfully, but these errors were encountered: