Affected by GO-2022-0560
and 17 other vulnerabilities
GO-2022-0560: Nomad Spread Job Stanza May Trigger Panic in Servers in github.com/hashicorp/nomad
GO-2022-0573: Improper Authentication in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-0584: Arbitrary file reads in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-0591: Privilege escalation in Hashicorp Nomad in github.com/hashicorp/nomad
GO-2022-0600: HashiCorp Nomad Artifact Download Race Condition in github.com/hashicorp/nomad
GO-2022-0622: Improper Privilege Management in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-0709: Improper network isolation in Hashicorp Nomad in github.com/hashicorp/nomad
GO-2022-0732: Privilege escalation in Hashicorp Nomad in github.com/hashicorp/nomad
GO-2022-0770: Path Traversal in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-0806: Use After Free in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-0821: Improper Certificate Validation in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-0840: Allocation of Resources Without Limits or Throttling in HashiCorp Nomad in github.com/hashicorp/nomad
GO-2022-1062: Nomad Panics On Job Submission With Bad Artifact Stanza Source URL in github.com/hashicorp/nomad
GO-2024-2670: ACL security vulnerability in github.com/hashicorp/nomad
GO-2024-3073: Nomad Vulnerable to Allocation Directory Escape On Non-Existing File Paths Through Archive Unpacking in github.com/hashicorp/nomad
GO-2024-3262: Hashicorp Nomad Incorrect Authorization vulnerability in github.com/hashicorp/nomad
GO-2024-3354: Hashicorp Nomad Incorrect Privilege Assignment vulnerability in github.com/hashicorp/nomad
GO-2025-3510: Nomad is vulnerable to unintentional exposure of the workload identity token and client secret token in audit logs in github.com/hashicorp/nomad
HandleGrpcErr is used to handle errors made to a remote gRPC plugin. It
handles detecting if the plugin has shutdown via the passeed pluginCtx. The
parameters are:
- err: the error returned from the streaming RPC
- pluginCtx: the plugins done ctx used to detect the plugin dying
The return values are:
- ErrPluginShutdown if the error is because the plugin shutdown
- The original error
HandleReqCtxGrpcErr is used to handle a non io.EOF error in a GRPC request
where a user supplied context is used. It handles detecting if the plugin has
shutdown via the passeed pluginCtx. The parameters are:
- err: the error returned from the streaming RPC
- reqCtx: the user context passed to the request
- pluginCtx: the plugins done ctx used to detect the plugin dying
The return values are:
- ErrPluginShutdown if the error is because the plugin shutdown
- context.Canceled if the reqCtx is canceled
- The original error