Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/treeverse/lakefs: GHSA-hh33-46q4-hwm2 #3291

Closed
GoVulnBot opened this issue Nov 26, 2024 · 1 comment
Labels

Comments

@GoVulnBot
Copy link

Advisory GHSA-hh33-46q4-hwm2 references a vulnerability in the following Go modules:

Module
github.com/treeverse/lakefs

Description:

Impact

Existing lakeFS users who have issued credentials to users who have been deleted.
Creating a new user with the same username, that user will inherit all of the previous user's credentials lakeFS needs to delete user credentials upon user deletion.

Patches

Has the problem been patched? What versions should users upgrade to?

Workarounds

A possible workaround will be not to reuse usernames that were previously deleted

References

Are there any links users can visit to find out more?

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/treeverse/lakefs
      versions:
        - fixed: 1.33.0
      vulnerable_at: 1.32.1
summary: |-
    Re-creating a deleted user in lakeFS will re-enable previous user credentials
    that existed prior to its deletion in github.com/treeverse/lakefs
cves:
    - CVE-2024-43784
ghsas:
    - GHSA-hh33-46q4-hwm2
references:
    - advisory: https://github.com/advisories/GHSA-hh33-46q4-hwm2
    - advisory: https://github.com/treeverse/lakeFS/security/advisories/GHSA-hh33-46q4-hwm2
source:
    id: GHSA-hh33-46q4-hwm2
    created: 2024-11-26T20:01:24.628589051Z
review_status: UNREVIEWED

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/632255 mentions this issue: data/reports: add 7 unreviewed reports

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants