|CVE-2022-1552||sourcegraph/server||High||Info||The vulnerability affects Postgres servers with multiple users where one user can bypass authorization controls and execute commands under a superuser identity. Sourcegraph runs Postgres with only the sg user, making the application not affected by this vulnerability.|
|CVE-2022-27191||caddy, sourcegraph/grafana, sourcegraph/prometheus, sourcegraph/server||High||Info||This vulnerability impacts SSH servers using the affected dependency. None of the affected images have ssh servers, much less using the dependency. Sourcegraph is not affected by this issue.|
|CVE-2021-33194||sourcegraph/grafana, sourcegraph/cadvisor, sourcegraph/server||High||Low||The CVE affects HTML parsers, specifically the |
ParseFragment function. The affected dependencies don’t use the function nor import the library.
|CVE-2021-44716||sourcegraph/grafana, sourcegraph/cadvisor, sourcegraph/server||High||Low||In certain conditions, the monitoring functionality packaged with Sourcegraph (Grafana and cAdvisor) could be rendered temporarily inoperable via specially crafted HTTP/2 requests. Exploiting this vulnerability requires administrator-level access, and does not affect the core Sourcegraph functionality. Sourcegraph does not consider this issue a viable security threat to the product.|
|CVE-2022-21698||sourcegraph/cadvisor, sourcegraph/grafana, sourcegraph/postgres_exporter, sourcegraph/server||High||Low||The vulnerability affects several third party images shipped with Sourcegraph. However, it doesn’t affect Sourcegraph services dirtectly and the third party services are not exposed via HTTP. Sourcegraph is not vulnerable to this vulnerability.|
|CVE-2021-38561||sourcegraph/grafana, sourcegraph/cadvisor, sourcegraph/server||High||Info||The CVE affects application parsing language tag using the affected library. Neither of the Sourcegraph dependencies use |
x/text to parse arbitrary language tags.