-
Notifications
You must be signed in to change notification settings - Fork 73
Correct misinformation in GO-2025-3783 #3878
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). View this failed invocation of the CLA check for more information. For the most up to date status, view the checks section at the bottom of the pull request. |
ac3af68
to
ccd5918
Compare
fyi @thatnealpatel @markus-kusano as you triaged #3783. |
This PR (HEAD: ccd5918) has been imported to Gerrit for code review. Please visit Gerrit at https://go-review.googlesource.com/c/vulndb/+/695295. Important tips:
|
02174b7
to
9fba31b
Compare
This PR (HEAD: 9fba31b) has been imported to Gerrit for code review. Please visit Gerrit at https://go-review.googlesource.com/c/vulndb/+/695295. Important tips:
|
Message from Gopher Robot: Patch Set 1: (1 comment) Please don’t reply on this GitHub thread. Visit golang.org/cl/695295. |
Message from Gopher Robot: Patch Set 1: Congratulations on opening your first change. Thank you for your contribution! Next steps: Most changes in the Go project go through a few rounds of revision. This can be Please don’t reply on this GitHub thread. Visit golang.org/cl/695295. |
9fba31b
to
07b78f4
Compare
Thanks @markus-kusano, sorry, @gopherbot didn't tell me about CL comments. |
Message from Markus Kusano: Patch Set 2: Code-Review+2 Please don’t reply on this GitHub thread. Visit golang.org/cl/695295. |
Message from Markus Kusano: Patch Set 2: (1 comment) Please don’t reply on this GitHub thread. Visit golang.org/cl/695295. |
This PR (HEAD: 07b78f4) has been imported to Gerrit for code review. Please visit Gerrit at https://go-review.googlesource.com/c/vulndb/+/695295. Important tips:
|
07b78f4
to
1c26612
Compare
Message from Alexander Scheel: Patch Set 2: (3 comments) Please don’t reply on this GitHub thread. Visit golang.org/cl/695295. |
Message from Alexander Scheel: Patch Set 2: (1 comment) Please don’t reply on this GitHub thread. Visit golang.org/cl/695295. |
This PR (HEAD: 1c26612) has been imported to Gerrit for code review. Please visit Gerrit at https://go-review.googlesource.com/c/vulndb/+/695295. Important tips:
|
Message from Markus Kusano: Patch Set 3: Code-Review+2 (2 comments) Please don’t reply on this GitHub thread. Visit golang.org/cl/695295. |
Message from Ethan Lee: Patch Set 4: (3 comments) Please don’t reply on this GitHub thread. Visit golang.org/cl/695295. |
This vulnerability was incorrectly edited by GitHub staff without consulting the project. As noted in the original report, this affects the rotation endpoints on the server: it does not impact the client API package in any way. This vulnerability was original to HashiCorp Vault thus the initial affected version is 0 (present in all earlier OpenBao versions). The server is not directly importable and should not be consumed by third-parties except through a release. See also: GHSA-prpj-rchp-9j5h See also: github/advisory-database#5990 Fixes golang#3877 Signed-off-by: Alexander Scheel <[email protected]>
1c26612
to
806644b
Compare
This PR (HEAD: 806644b) has been imported to Gerrit for code review. Please visit Gerrit at https://go-review.googlesource.com/c/vulndb/+/695295. Important tips:
|
Message from Alexander Scheel: Patch Set 4: (4 comments) Please don’t reply on this GitHub thread. Visit golang.org/cl/695295. |
Message from Alexander Scheel: Patch Set 4: (1 comment) Please don’t reply on this GitHub thread. Visit golang.org/cl/695295. |
Message from t hepudds: Patch Set 5: (2 comments) Please don’t reply on this GitHub thread. Visit golang.org/cl/695295. |
This vulnerability was incorrectly edited by GitHub staff without consulting the project. As noted in the original report, this affects the rotation endpoints on the server: it does not impact the client API package in any way.
This vulnerability was original to HashiCorp Vault thus the initial affected version is 0 (present in all earlier OpenBao versions).
The server is not directly importable and should not be consumed by third-parties except through a release.
See also: GHSA-prpj-rchp-9j5h
See also: github/advisory-database#5990
Resolves: #3877