Affected by GO-2024-2617
and 6 other vulnerabilities
GO-2024-2617: Authentication bypass in github.com/hashicorp/vault
GO-2024-2690: HashiCorpVault does not correctly validate OCSP responses in github.com/hashicorp/vault
GO-2024-2921: HashiCorp Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims in github.com/hashicorp/vault
GO-2024-2982: Hashicorp Vault vulnerable to Improper Check or Handling of Exceptional Conditions in github.com/hashicorp/vault
GO-2024-3162: Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default in github.com/hashicorp/vault
GO-2024-3191: Vault Community Edition privilege escalation vulnerability in github.com/hashicorp/vault
GO-2024-3246: Hashicorp Vault vulnerable to denial of service through memory exhaustion in github.com/hashicorp/vault
package
Version:
v1.14.6
Opens a new window with list of versions in this module.
Published: Nov 6, 2023
License: MPL-2.0
Opens a new window with license information.
Imports: 6
Opens a new window with list of imports.
Imported by: 4
Opens a new window with list of known importers.
Documentation
¶
-
func FileGIDEqual(info fs.FileInfo, gid int) bool
-
func FilePermissionsMatch(info fs.FileInfo, path string, permissions int) error
-
func FileUIDEqual(info fs.FileInfo, uid int) bool
-
func FileUidMatch(info fs.FileInfo, path string, uid int) (err error)
-
func IsWriteGroup(mode os.FileMode) bool
-
func IsWriteOther(mode os.FileMode) bool
-
func OwnerPermissionsMatch(path string, uid int, permissions int) error
-
func OwnerPermissionsMatchFile(file *os.File, uid int, permissions int) error
-
func Umask(newmask int) int
OwnerPermissionsMatch checks if vault user is the owner and permissions are secure for input path
OwnerPermissionsMatchFile checks if vault user is the owner and permissions are secure for the input file
Sets new umask and returns old umask
Source Files
¶
Click to show internal directories.
Click to hide internal directories.