-
Notifications
You must be signed in to change notification settings - Fork 61
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x/vulndb: potential Go vuln in github.com/agnivade/easy-scrypt: CVE-2014-125055 #1294
Comments
This is a real vulnerability, but it's in an eight-year-old version of the package which predates Go modules, has no go.mod file, and doesn't build any more because it imports OUT_OF_SCOPE seems like the clearest status here. |
Changing to NOT_IMPORTABLE so we'll still get an excluded report for this one |
Change https://go.dev/cl/461640 mentions this issue: |
Change https://go.dev/cl/461643 mentions this issue: |
Change https://go.dev/cl/592759 mentions this issue: |
Change https://go.dev/cl/606781 mentions this issue: |
- data/reports/GO-2023-1270.yaml - data/reports/GO-2023-1283.yaml - data/reports/GO-2023-1285.yaml - data/reports/GO-2023-1291.yaml - data/reports/GO-2023-1292.yaml - data/reports/GO-2023-1294.yaml - data/reports/GO-2023-1377.yaml - data/reports/GO-2023-1388.yaml - data/reports/GO-2023-1449.yaml - data/reports/GO-2023-1461.yaml - data/reports/GO-2023-1462.yaml - data/reports/GO-2023-1463.yaml - data/reports/GO-2023-1465.yaml - data/reports/GO-2023-1468.yaml - data/reports/GO-2023-1469.yaml - data/reports/GO-2023-1471.yaml - data/reports/GO-2023-1492.yaml - data/reports/GO-2023-1502.yaml - data/reports/GO-2023-1504.yaml - data/reports/GO-2023-1509.yaml Updates #1270 Updates #1283 Updates #1285 Updates #1291 Updates #1292 Updates #1294 Updates #1377 Updates #1388 Updates #1449 Updates #1461 Updates #1462 Updates #1463 Updates #1465 Updates #1468 Updates #1469 Updates #1471 Updates #1492 Updates #1502 Updates #1504 Updates #1509 Change-Id: Ic7939af0290afe43600530ce10f5af9f2a0f7408 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/606781 Reviewed-by: Damien Neil <dneil@google.com> Auto-Submit: Tatiana Bradley <tatianabradley@google.com> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
CVE-2014-125055 references github.com/agnivade/easy-scrypt, which may be a Go module.
Description:
A vulnerability, which was classified as problematic, was found in agnivade easy-scrypt. Affected is the function VerifyPassphrase of the file scrypt.go. The manipulation leads to observable timing discrepancy. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 477c10cf3b144ddf96526aa09f5fdea613f21812. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217596.
References:
Cross references:
No existing reports found with this module or alias.
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: