Bug 2375247 (GHSA-fv92-fjc5-jj9h)
| Summary: | github.com/go-viper/mapstructure/v2: mapstructure May Leak Sensitive Information | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability-draft | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | alcohan, brainfor, cfergeau, debarshir, gparvin, jbalunas, jkoehler, ldai, lphiri, lsharar, lucarval, mwringe, njean, owatkins, pahickey, rhaigner, sdawley |
| Target Milestone: | --- | Keywords: | Reopened, Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
An information disclosure flaw has been discovered in mapstructure. When the library encounters an error while processing sensitive information it may insert the sensitive information into an error log.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2025-07-04 07:45:42 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2375621, 2375623, 2375626, 2375601, 2375602, 2375603, 2375604, 2375605, 2375606, 2375607, 2375608, 2375609, 2375610, 2375611, 2375612, 2375613, 2375614, 2375615, 2375616, 2375617, 2375618, 2375619, 2375620, 2375622, 2375624, 2375625, 2375627, 2375628, 2375629, 2375630, 2375631, 2375632 | ||
| Bug Blocks: | |||
|
Description
OSIDB Bzimport
2025-06-27 20:01:15 UTC
gvisor-tap-vsock only use github.com/go-viper/mapstructure/v2 through golangci-lint, which is optionally used at build time to run static checks on the source code. This code does not handle sensitive data, so no information to disclose. Closing the bug. I was looking at the wrong bug :-/ Am I missing something or is the version of github.com/go-viper/mapstructure/v2 where this security bug is fixed is not mentioned at all in this report? Based on the notification that we received upstream, I believe this is fixed in github.com/go-viper/mapstructure/v2 version 2.3.0: https://github.com/containers/toolbox/security/dependabot/22 *** Bug 2384095 has been marked as a duplicate of this bug. *** |