Analysis Report Grafana v10.0.11 → v10.0.12 - CVE-2024-1442

Shared security patch analysis results

AI Used: deepseek deepseek-chat
Share this analysis
Use quotes for exact: \"SQL injection\" | Operators: hello AND bye, admin OR root, -error, NOT warning
Showing 0 to 0 of 0 results
.drone.yml AI: 5 vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/.drone.yml+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/.drone.yml@@ -18,14 +18,14 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - go build -o ./bin/build -ldflags '-extldflags -static' ./pkg/build/cmd   depends_on: []   environment:     CGO_ENABLED: 0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: compile-build-cmd - commands:   - ./bin/build verify-drone@@ -69,21 +69,21 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - go build -o ./bin/build -ldflags '-extldflags -static' ./pkg/build/cmd   depends_on: []   environment:     CGO_ENABLED: 0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: compile-build-cmd - commands:   - go install github.com/bazelbuild/buildtools/buildifier@latest   - buildifier --lint=warn -mode=check -r .   depends_on:   - compile-build-cmd-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: lint-starlark trigger:   event:@@ -120,7 +120,7 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - yarn install --immutable@@ -221,7 +221,7 @@   name: clone-enterprise - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - yarn install --immutable@@ -296,7 +296,7 @@   name: clone-enterprise - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - '# It is required that code generated from Thema/CUE be committed and in sync@@ -306,7 +306,7 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-cue   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-cue - commands:   - '# It is required that generated jsonnet is committed and in sync with its inputs.'@@ -315,21 +315,21 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-jsonnet   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-jsonnet - commands:   - apk add --update make   - make gen-go   depends_on:   - verify-gen-cue-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: wire-install - commands:   - apk add --update build-base shared-mime-info shared-mime-info-lang   - go test -tags requires_buildifer -short -covermode=atomic -timeout=5m ./pkg/...   depends_on:   - wire-install-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: test-backend - commands:   - apk add --update build-base@@ -338,7 +338,7 @@     | grep -o '\(.*\)/' | sort -u)   depends_on:   - wire-install-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: test-backend-integration trigger:   event:@@ -382,14 +382,14 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - go build -o ./bin/build -ldflags '-extldflags -static' ./pkg/build/cmd   depends_on: []   environment:     CGO_ENABLED: 0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: compile-build-cmd - commands:   - apk add --update curl jq bash@@ -416,7 +416,7 @@   - apk add --update make   - make gen-go   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: wire-install - commands:   - apk add --update make build-base@@ -425,7 +425,7 @@   - wire-install   environment:     CGO_ENABLED: "1"-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: lint-backend trigger:   event:@@ -469,11 +469,11 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - mkdir -p bin-  - curl -fL -o bin/grabpl https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.47/grabpl+  - curl -fL -o bin/grabpl https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.50/grabpl   - chmod +x bin/grabpl   image: byrnedo/alpine-curl:0.1.8   name: grabpl@@ -482,7 +482,7 @@   depends_on: []   environment:     CGO_ENABLED: 0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: compile-build-cmd - commands:   - '# It is required that code generated from Thema/CUE be committed and in sync@@ -492,7 +492,7 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-cue   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-cue - commands:   - '# It is required that generated jsonnet is committed and in sync with its inputs.'@@ -501,14 +501,14 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-jsonnet   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-jsonnet - commands:   - apk add --update make   - make gen-go   depends_on:   - verify-gen-cue-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: wire-install - commands:   - yarn install --immutable@@ -541,7 +541,7 @@       from_secret: drone_token - commands:   - /src/grafana-build artifacts -a targz:grafana:linux/amd64 -a targz:grafana:linux/arm64-    -a targz:grafana:linux/arm/v7 --go-version=1.21.5 --yarn-cache=$$YARN_CACHE_FOLDER+    -a targz:grafana:linux/arm/v7 --go-version=1.21.8 --yarn-cache=$$YARN_CACHE_FOLDER     --build-id=$$DRONE_BUILD_NUMBER --grafana-dir=$$PWD > packages.txt   depends_on:   - yarn-install@@ -563,7 +563,7 @@     GF_APP_MODE: development     GF_SERVER_HTTP_PORT: "3001"     GF_SERVER_ROUTER_LOGGING: "1"-  image: alpine:3.18.4+  image: alpine:3.19.1   name: grafana-server - commands:   - ./bin/build e2e-tests --port 3001 --suite dashboards-suite@@ -685,7 +685,7 @@   - docker run --privileged --rm tonistiigi/binfmt --install all   - /src/grafana-build artifacts -a docker:grafana:linux/amd64 -a docker:grafana:linux/amd64:ubuntu     -a docker:grafana:linux/arm64 -a docker:grafana:linux/arm64:ubuntu --yarn-cache=$$YARN_CACHE_FOLDER-    --build-id=$$DRONE_BUILD_NUMBER --ubuntu-base=ubuntu:22.04 --alpine-base=alpine:3.18.4+    --build-id=$$DRONE_BUILD_NUMBER --ubuntu-base=ubuntu:22.04 --alpine-base=alpine:3.19.1     --tag-format='{{ .version_base }}-{{ .buildID }}-{{ .arch }}' --grafana-dir=$$PWD     --ubuntu-tag-format='{{ .version_base }}-{{ .buildID }}-ubuntu-{{ .arch }}' >     docker.txt@@ -818,7 +818,7 @@   name: clone-enterprise - commands:   - mkdir -p bin-  - curl -fL -o bin/grabpl https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.47/grabpl+  - curl -fL -o bin/grabpl https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.50/grabpl   - chmod +x bin/grabpl   image: byrnedo/alpine-curl:0.1.8   name: grabpl@@ -827,11 +827,11 @@   depends_on: []   environment:     CGO_ENABLED: 0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: compile-build-cmd - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - '# It is required that code generated from Thema/CUE be committed and in sync@@ -841,7 +841,7 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-cue   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-cue - commands:   - '# It is required that generated jsonnet is committed and in sync with its inputs.'@@ -850,14 +850,14 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-jsonnet   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-jsonnet - commands:   - apk add --update make   - make gen-go   depends_on:   - verify-gen-cue-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: wire-install - commands:   - dockerize -wait tcp://postgres:5432 -timeout 120s@@ -878,7 +878,7 @@     GRAFANA_TEST_DB: postgres     PGPASSWORD: grafanatest     POSTGRES_HOST: postgres-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: postgres-integration-tests - commands:   - dockerize -wait tcp://mysql57:3306 -timeout 120s@@ -899,7 +899,7 @@   environment:     GRAFANA_TEST_DB: mysql     MYSQL_HOST: mysql57-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: mysql-5.7-integration-tests - commands:   - dockerize -wait tcp://mysql80:3306 -timeout 120s@@ -920,7 +920,7 @@   environment:     GRAFANA_TEST_DB: mysql     MYSQL_HOST: mysql80-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: mysql-8.0-integration-tests - commands:   - dockerize -wait tcp://redis:6379 -timeout 120s@@ -935,7 +935,7 @@   - wait-for-redis   environment:     REDIS_URL: redis://redis:6379/0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: redis-integration-tests - commands:   - dockerize -wait tcp://memcached:11211 -timeout 120s@@ -950,7 +950,7 @@   - wait-for-memcached   environment:     MEMCACHED_HOSTS: memcached:11211-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: memcached-integration-tests - commands:   - dockerize -wait tcp://mimir_backend:8080 -timeout 120s@@ -967,7 +967,7 @@     AM_PASSWORD: test     AM_TENANT_ID: test     AM_URL: http://mimir_backend:8080-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: remote-alertmanager-integration-tests trigger:   event:@@ -1018,7 +1018,7 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - yarn install --immutable@@ -1055,7 +1055,7 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-cue   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-cue trigger:   event:@@ -1096,7 +1096,7 @@   depends_on: []   environment:     CGO_ENABLED: 0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: compile-build-cmd - commands:   - apt-get update -yq && apt-get install shellcheck@@ -1204,7 +1204,7 @@   depends_on: []   environment:     CGO_ENABLED: 0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: compile-build-cmd - commands:   - '# It is required that code generated from Thema/CUE be committed and in sync@@ -1215,7 +1215,7 @@   - CODEGEN_VERIFY=1 make gen-cue   depends_on:   - clone-enterprise-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-cue - commands:   - '# It is required that generated jsonnet is committed and in sync with its inputs.'@@ -1225,14 +1225,14 @@   - CODEGEN_VERIFY=1 make gen-jsonnet   depends_on:   - clone-enterprise-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-jsonnet - commands:   - apk add --update make   - make gen-go   depends_on:   - verify-gen-cue-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: wire-install - commands:   - apk add --update build-base@@ -1240,7 +1240,7 @@   - go test -v -run=^$ -benchmem -timeout=1h -count=8 -bench=. ${GO_PACKAGES}   depends_on:   - wire-install-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: sqlite-benchmark-integration-tests - commands:   - apk add --update build-base@@ -1252,7 +1252,7 @@     GRAFANA_TEST_DB: postgres     PGPASSWORD: grafanatest     POSTGRES_HOST: postgres-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: postgres-benchmark-integration-tests - commands:   - apk add --update build-base@@ -1263,7 +1263,7 @@   environment:     GRAFANA_TEST_DB: mysql     MYSQL_HOST: mysql57-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: mysql-5.7-benchmark-integration-tests - commands:   - apk add --update build-base@@ -1274,7 +1274,7 @@   environment:     GRAFANA_TEST_DB: mysql     MYSQL_HOST: mysql80-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: mysql-8.0-benchmark-integration-tests trigger:   event:@@ -1315,7 +1315,7 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - yarn install --immutable@@ -1352,7 +1352,7 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-cue   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-cue trigger:   branch: main@@ -1391,7 +1391,7 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - yarn install --immutable@@ -1449,7 +1449,7 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - yarn install --immutable@@ -1502,7 +1502,7 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - '# It is required that code generated from Thema/CUE be committed and in sync@@ -1512,7 +1512,7 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-cue   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-cue - commands:   - '# It is required that generated jsonnet is committed and in sync with its inputs.'@@ -1521,21 +1521,21 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-jsonnet   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-jsonnet - commands:   - apk add --update make   - make gen-go   depends_on:   - verify-gen-cue-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: wire-install - commands:   - apk add --update build-base shared-mime-info shared-mime-info-lang   - go test -tags requires_buildifer -short -covermode=atomic -timeout=5m ./pkg/...   depends_on:   - wire-install-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: test-backend - commands:   - apk add --update build-base@@ -1544,7 +1544,7 @@     | grep -o '\(.*\)/' | sort -u)   depends_on:   - wire-install-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: test-backend-integration trigger:   branch: main@@ -1582,20 +1582,20 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - go build -o ./bin/build -ldflags '-extldflags -static' ./pkg/build/cmd   depends_on: []   environment:     CGO_ENABLED: 0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: compile-build-cmd - commands:   - apk add --update make   - make gen-go   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: wire-install - commands:   - apk add --update make build-base@@ -1604,7 +1604,7 @@   - wire-install   environment:     CGO_ENABLED: "1"-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: lint-backend - commands:   - ./bin/build verify-drone@@ -1648,11 +1648,11 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - mkdir -p bin-  - curl -fL -o bin/grabpl https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.47/grabpl+  - curl -fL -o bin/grabpl https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.50/grabpl   - chmod +x bin/grabpl   image: byrnedo/alpine-curl:0.1.8   name: grabpl@@ -1661,7 +1661,7 @@   depends_on: []   environment:     CGO_ENABLED: 0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: compile-build-cmd - commands:   - '# It is required that code generated from Thema/CUE be committed and in sync@@ -1671,7 +1671,7 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-cue   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-cue - commands:   - '# It is required that generated jsonnet is committed and in sync with its inputs.'@@ -1680,14 +1680,14 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-jsonnet   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-jsonnet - commands:   - apk add --update make   - make gen-go   depends_on:   - verify-gen-cue-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: wire-install - commands:   - yarn install --immutable@@ -1719,7 +1719,7 @@   name: build-frontend-packages - commands:   - /src/grafana-build artifacts -a targz:grafana:linux/amd64 -a targz:grafana:linux/arm64-    -a targz:grafana:linux/arm/v7 --go-version=1.21.5 --yarn-cache=$$YARN_CACHE_FOLDER+    -a targz:grafana:linux/arm/v7 --go-version=1.21.8 --yarn-cache=$$YARN_CACHE_FOLDER     --build-id=$$DRONE_BUILD_NUMBER --grafana-dir=$$PWD > packages.txt   depends_on:   - update-package-json-version@@ -1741,7 +1741,7 @@     GF_APP_MODE: development     GF_SERVER_HTTP_PORT: "3001"     GF_SERVER_ROUTER_LOGGING: "1"-  image: alpine:3.18.4+  image: alpine:3.19.1   name: grafana-server - commands:   - ./bin/build e2e-tests --port 3001 --suite dashboards-suite@@ -1899,7 +1899,7 @@   - docker run --privileged --rm tonistiigi/binfmt --install all   - /src/grafana-build artifacts -a docker:grafana:linux/amd64 -a docker:grafana:linux/amd64:ubuntu     -a docker:grafana:linux/arm64 -a docker:grafana:linux/arm64:ubuntu --yarn-cache=$$YARN_CACHE_FOLDER-    --build-id=$$DRONE_BUILD_NUMBER --ubuntu-base=ubuntu:22.04 --alpine-base=alpine:3.18.4+    --build-id=$$DRONE_BUILD_NUMBER --ubuntu-base=ubuntu:22.04 --alpine-base=alpine:3.19.1     --tag-format='{{ .version_base }}-{{ .buildID }}-{{ .arch }}' --grafana-dir=$$PWD     --ubuntu-tag-format='{{ .version_base }}-{{ .buildID }}-ubuntu-{{ .arch }}' >     docker.txt@@ -2094,7 +2094,7 @@ steps: - commands:   - mkdir -p bin-  - curl -fL -o bin/grabpl https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.47/grabpl+  - curl -fL -o bin/grabpl https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.50/grabpl   - chmod +x bin/grabpl   image: byrnedo/alpine-curl:0.1.8   name: grabpl@@ -2103,11 +2103,11 @@   depends_on: []   environment:     CGO_ENABLED: 0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: compile-build-cmd - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - '# It is required that code generated from Thema/CUE be committed and in sync@@ -2117,7 +2117,7 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-cue   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-cue - commands:   - '# It is required that generated jsonnet is committed and in sync with its inputs.'@@ -2126,14 +2126,14 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-jsonnet   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-jsonnet - commands:   - apk add --update make   - make gen-go   depends_on:   - verify-gen-cue-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: wire-install - commands:   - dockerize -wait tcp://postgres:5432 -timeout 120s@@ -2154,7 +2154,7 @@     GRAFANA_TEST_DB: postgres     PGPASSWORD: grafanatest     POSTGRES_HOST: postgres-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: postgres-integration-tests - commands:   - dockerize -wait tcp://mysql57:3306 -timeout 120s@@ -2175,7 +2175,7 @@   environment:     GRAFANA_TEST_DB: mysql     MYSQL_HOST: mysql57-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: mysql-5.7-integration-tests - commands:   - dockerize -wait tcp://mysql80:3306 -timeout 120s@@ -2196,7 +2196,7 @@   environment:     GRAFANA_TEST_DB: mysql     MYSQL_HOST: mysql80-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: mysql-8.0-integration-tests - commands:   - dockerize -wait tcp://redis:6379 -timeout 120s@@ -2211,7 +2211,7 @@   - wait-for-redis   environment:     REDIS_URL: redis://redis:6379/0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: redis-integration-tests - commands:   - dockerize -wait tcp://memcached:11211 -timeout 120s@@ -2226,7 +2226,7 @@   - wait-for-memcached   environment:     MEMCACHED_HOSTS: memcached:11211-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: memcached-integration-tests - commands:   - dockerize -wait tcp://mimir_backend:8080 -timeout 120s@@ -2243,7 +2243,7 @@     AM_PASSWORD: test     AM_TENANT_ID: test     AM_URL: http://mimir_backend:8080-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: remote-alertmanager-integration-tests trigger:   branch: main@@ -2297,7 +2297,7 @@   name: identify-runner - commands:   - $$ProgressPreference = "SilentlyContinue"-  - Invoke-WebRequest https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.47/windows/grabpl.exe+  - Invoke-WebRequest https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.50/windows/grabpl.exe     -OutFile grabpl.exe   image: grafana/ci-wix:0.1.1   name: windows-init@@ -2423,11 +2423,11 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - mkdir -p bin-  - curl -fL -o bin/grabpl https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.47/grabpl+  - curl -fL -o bin/grabpl https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.50/grabpl   - chmod +x bin/grabpl   image: byrnedo/alpine-curl:0.1.8   name: grabpl@@ -2436,7 +2436,7 @@   depends_on: []   environment:     CGO_ENABLED: 0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: compile-build-cmd - commands:   - ./bin/build artifacts docker fetch --edition oss@@ -2533,7 +2533,7 @@   depends_on: []   environment:     CGO_ENABLED: 0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: compile-build-cmd - commands:   - ./bin/build artifacts packages --tag $${DRONE_TAG} --src-bucket $${PRERELEASE_BUCKET}@@ -2603,7 +2603,7 @@   depends_on: []   environment:     CGO_ENABLED: 0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: compile-build-cmd - commands:   - yarn install --immutable@@ -2632,7 +2632,7 @@     NPM_TOKEN:       from_secret: npm_token   failure: ignore-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: release-npm-packages trigger:   event:@@ -2669,7 +2669,7 @@   depends_on: []   environment:     CGO_ENABLED: 0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: compile-build-cmd - depends_on:   - compile-build-cmd@@ -2759,7 +2759,7 @@   environment:     _EXPERIMENTAL_DAGGER_CLOUD_TOKEN:       from_secret: dagger_token-    ALPINE_BASE: alpine:3.18.4+    ALPINE_BASE: alpine:3.19.1     CDN_DESTINATION:       from_secret: rgm_cdn_destination     DESTINATION:@@ -2776,7 +2776,7 @@       from_secret: gcp_key_base64     GITHUB_TOKEN:       from_secret: github_token-    GO_VERSION: 1.21.5+    GO_VERSION: 1.21.8     GPG_PASSPHRASE:       from_secret: packages_gpg_passphrase     GPG_PRIVATE_KEY:@@ -2834,13 +2834,13 @@   depends_on: []   environment:     CGO_ENABLED: 0-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: compile-build-cmd - commands:   - ./bin/build whatsnew-checker   depends_on:   - compile-build-cmd-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: whats-new-checker trigger:   event:@@ -2876,7 +2876,7 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - yarn install --immutable@@ -2932,7 +2932,7 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - '# It is required that code generated from Thema/CUE be committed and in sync@@ -2942,7 +2942,7 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-cue   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-cue - commands:   - '# It is required that generated jsonnet is committed and in sync with its inputs.'@@ -2951,21 +2951,21 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-jsonnet   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-jsonnet - commands:   - apk add --update make   - make gen-go   depends_on:   - verify-gen-cue-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: wire-install - commands:   - apk add --update build-base shared-mime-info shared-mime-info-lang   - go test -tags requires_buildifer -short -covermode=atomic -timeout=5m ./pkg/...   depends_on:   - wire-install-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: test-backend - commands:   - apk add --update build-base@@ -2974,7 +2974,7 @@     | grep -o '\(.*\)/' | sort -u)   depends_on:   - wire-install-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: test-backend-integration trigger:   event:@@ -3014,7 +3014,7 @@   environment:     _EXPERIMENTAL_DAGGER_CLOUD_TOKEN:       from_secret: dagger_token-    ALPINE_BASE: alpine:3.18.4+    ALPINE_BASE: alpine:3.19.1     CDN_DESTINATION:       from_secret: rgm_cdn_destination     DESTINATION:@@ -3031,7 +3031,7 @@       from_secret: gcp_key_base64     GITHUB_TOKEN:       from_secret: github_token-    GO_VERSION: 1.21.5+    GO_VERSION: 1.21.8     GPG_PASSPHRASE:       from_secret: packages_gpg_passphrase     GPG_PRIVATE_KEY:@@ -3085,7 +3085,7 @@   name: identify-runner - commands:   - $$ProgressPreference = "SilentlyContinue"-  - Invoke-WebRequest https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.47/windows/grabpl.exe+  - Invoke-WebRequest https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.50/windows/grabpl.exe     -OutFile grabpl.exe   image: grafana/ci-wix:0.1.1   name: windows-init@@ -3197,7 +3197,7 @@   environment:     _EXPERIMENTAL_DAGGER_CLOUD_TOKEN:       from_secret: dagger_token-    ALPINE_BASE: alpine:3.18.4+    ALPINE_BASE: alpine:3.19.1     CDN_DESTINATION:       from_secret: rgm_cdn_destination     DESTINATION:@@ -3214,7 +3214,7 @@       from_secret: gcp_key_base64     GITHUB_TOKEN:       from_secret: github_token-    GO_VERSION: 1.21.5+    GO_VERSION: 1.21.8     GPG_PASSPHRASE:       from_secret: packages_gpg_passphrase     GPG_PRIVATE_KEY:@@ -3299,7 +3299,7 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - yarn install --immutable@@ -3353,7 +3353,7 @@ steps: - commands:   - echo $DRONE_RUNNER_NAME-  image: alpine:3.18.4+  image: alpine:3.19.1   name: identify-runner - commands:   - '# It is required that code generated from Thema/CUE be committed and in sync@@ -3363,7 +3363,7 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-cue   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-cue - commands:   - '# It is required that generated jsonnet is committed and in sync with its inputs.'@@ -3372,21 +3372,21 @@   - apk add --update make   - CODEGEN_VERIFY=1 make gen-jsonnet   depends_on: []-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: verify-gen-jsonnet - commands:   - apk add --update make   - make gen-go   depends_on:   - verify-gen-cue-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: wire-install - commands:   - apk add --update build-base shared-mime-info shared-mime-info-lang   - go test -tags requires_buildifer -short -covermode=atomic -timeout=5m ./pkg/...   depends_on:   - wire-install-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: test-backend - commands:   - apk add --update build-base@@ -3395,7 +3395,7 @@     | grep -o '\(.*\)/' | sort -u)   depends_on:   - wire-install-  image: golang:1.21.5-alpine3.18+  image: golang:1.21.8-alpine   name: test-backend-integration trigger:   cron:@@ -3433,7 +3433,7 @@   environment:     _EXPERIMENTAL_DAGGER_CLOUD_TOKEN:       from_secret: dagger_token-    ALPINE_BASE: alpine:3.18.4
AI Analysis
Based on my analysis of the provided code diff for the `.drone.yml` file, I can identify the following security-related changes:

**Vulnerability 1: Base Image Vulnerabilities**
Vulnerability Existed: yes
Base Image Security Updates [.drone.yml] [Multiple lines throughout the file]
Old Code: Various instances of `alpine:3.18.4` and `golang:1.21.5-alpine3.18`
Fixed Code: Various instances of `alpine:3.19.1` and `golang:1.21.8-alpine`

**Vulnerability 2: Build Pipeline Security Updates**
Vulnerability Existed: yes
Build Tool Security Updates [.drone.yml] [Lines 472, 820, 1649, 2094, 2423, 3785]
Old Code: `curl -fL -o bin/grabpl https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.47/grabpl`
Fixed Code: `curl -fL -o bin/grabpl https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.50/grabpl`

**Vulnerability 3: Windows Build Pipeline Security Updates**
Vulnerability Existed: yes
Windows Build Tool Security Updates [.drone.yml] [Lines 2297, 3085]
Old Code: `Invoke-WebRequest https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.47/windows/grabpl.exe`
Fixed Code: `Invoke-WebRequest https://grafana-downloads.storage.googleapis.com/grafana-build-pipeline/v3.0.50/windows/grabpl.exe`

**Vulnerability 4: Go Version Security Updates**
Vulnerability Existed: yes
Go Runtime Security Updates [.drone.yml] [Lines 541, 1719, 2776, 3031, 3214, 3450, 3597]
Old Code: `--go-version=1.21.5` and environment variable `GO_VERSION: 1.21.5`
Fixed Code: `--go-version=1.21.8` and environment variable `GO_VERSION: 1.21.8`

**Vulnerability 5: Container Base Image Security Updates**
Vulnerability Existed: yes
Container Base Image Security Updates [.drone.yml] [Lines 685, 1899, 2759, 3014, 3197, 3433, 3580]
Old Code: `--alpine-base=alpine:3.18.4` and environment variable `ALPINE_BASE: alpine:3.18.4`
Fixed Code: `--alpine-base=alpine:3.19.1` and environment variable `ALPINE_BASE: alpine:3.19.1`

These changes primarily address security vulnerabilities by updating to newer, patched versions of base images, build tools, and runtime environments that contain security fixes for known vulnerabilities in the previous versions.
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
.github/CODEOWNERS AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/.github/CODEOWNERS+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/.github/CODEOWNERS@@ -14,7 +14,7 @@ # Documentation /.changelog-archive @grafana/docs-grafana /.codespellignore @grafana/docs-tooling-/CHANGELOG.md @grafana/grafana-delivery+/CHANGELOG.md @grafana/grafana-release-guild /CODE_OF_CONDUCT.md @grafana/docs-grafana /CONTRIBUTING.md @grafana/docs-grafana /GOVERNANCE.md @RichiH@@ -223,15 +223,15 @@ # Continuous Integration-.drone.yml @grafana/grafana-delivery-.drone.star @grafana/grafana-delivery-/scripts/drone/ @grafana/grafana-delivery-/pkg/build/ @grafana/grafana-delivery-/.dockerignore @grafana/grafana-delivery-/Dockerfile @grafana/grafana-delivery-/Makefile @grafana/grafana-delivery-/scripts/build/ @grafana/grafana-delivery-/scripts/list-release-artifacts.sh @grafana/grafana-delivery+.drone.yml @grafana/grafana-release-guild+.drone.star @grafana/grafana-release-guild+/scripts/drone/ @grafana/grafana-release-guild+/pkg/build/ @grafana/grafana-release-guild+/.dockerignore @grafana/grafana-release-guild+/Dockerfile @grafana/grafana-release-guild+/Makefile @grafana/grafana-release-guild+/scripts/build/ @grafana/grafana-release-guild+/scripts/list-release-artifacts.sh @grafana/grafana-release-guild # OSS Plugin Partnerships backend code /pkg/tsdb/cloudwatch/ @grafana/aws-datasources@@ -466,26 +466,26 @@ /scripts/benchmark-access-control.sh @grafana/grafana-authnz-team /scripts/check-breaking-changes.sh @grafana/plugins-platform-frontend-/scripts/ci-* @grafana/grafana-delivery-/scripts/circle-* @grafana/grafana-delivery-/scripts/publish-npm-packages.sh @grafana/grafana-delivery @grafana/plugins-platform-frontend-/scripts/validate-npm-packages.sh @grafana/grafana-delivery @grafana/plugins-platform-frontend+/scripts/ci-* @grafana/grafana-release-guild+/scripts/circle-* @grafana/grafana-release-guild+/scripts/publish-npm-packages.sh @grafana/grafana-release-guild @grafana/plugins-platform-frontend+/scripts/validate-npm-packages.sh @grafana/grafana-release-guild @grafana/plugins-platform-frontend /scripts/ci-frontend-metrics.sh @grafana/grafana-frontend-platform @grafana/plugins-platform-frontend @grafana/grafana-bi-squad /scripts/cli/ @grafana/grafana-frontend-platform /scripts/clean-git-or-error.sh @grafana/grafana-as-code /scripts/grafana-server/ @grafana/grafana-frontend-platform-/scripts/helpers/ @grafana/grafana-delivery+/scripts/helpers/ @grafana/grafana-release-guild /scripts/import_many_dashboards.sh @torkelo /scripts/mixin-check.sh @bergquist /scripts/openapi3/ @grafana/grafana-operator-experience-squad /scripts/prepare-packagejson.js @grafana/frontend-ops /scripts/protobuf-check.sh @grafana/plugins-platform-backend /scripts/stripnulls.sh @grafana/grafana-as-code-/scripts/tag_release.sh @grafana/grafana-delivery-/scripts/trigger_docker_build.sh @grafana/grafana-delivery-/scripts/trigger_grafana_packer.sh @grafana/grafana-delivery-/scripts/trigger_windows_build.sh @grafana/grafana-delivery-/scripts/verify-repo-update/ @grafana/grafana-delivery+/scripts/tag_release.sh @grafana/grafana-release-guild+/scripts/trigger_docker_build.sh @grafana/grafana-release-guild+/scripts/trigger_grafana_packer.sh @grafana/grafana-release-guild+/scripts/trigger_windows_build.sh @grafana/grafana-release-guild+/scripts/verify-repo-update/ @grafana/grafana-release-guild /scripts/webpack/ @grafana/frontend-ops /scripts/generate-a11y-report.sh @grafana/grafana-frontend-platform@@ -584,10 +584,10 @@ /.github/pr-commands.json @marefr /.github/renovate.json5 @grafana/frontend-ops /.github/teams.yml @armandgrillet-/.github/workflows/auto-milestone.yml @grafana/grafana-delivery-/.github/workflows/backport.yml @grafana/grafana-delivery-/.github/workflows/bump-version.yml @grafana/grafana-delivery-/.github/workflows/close-milestone.yml @grafana/grafana-delivery+/.github/workflows/auto-milestone.yml @grafana/grafana-release-guild+/.github/workflows/backport.yml @grafana/grafana-release-guild+/.github/workflows/bump-version.yml @grafana/grafana-release-guild+/.github/workflows/close-milestone.yml @grafana/grafana-release-guild /.github/workflows/cloud-data-sources-code-coverage.yml @grafana/partner-datasources @grafana/aws-datasources /.github/workflows/codeowners-validator.yml @tolzhabayev /.github/workflows/codeql-analysis.yml @DanCech@@ -607,8 +607,8 @@ /.github/workflows/pr-codeql-analysis-python.yml @DanCech /.github/workflows/pr-commands-closed.yml @tolzhabayev /.github/workflows/pr-commands.yml @marefr-/.github/workflows/pr-patch-check.yml @grafana/grafana-delivery-/.github/workflows/sync-mirror.yml @grafana/grafana-delivery+/.github/workflows/pr-patch-check.yml @grafana/grafana-release-guild+/.github/workflows/sync-mirror.yml @grafana/grafana-release-guild /.github/workflows/publish-technical-documentation-next.yml @grafana/docs-grafana /.github/workflows/publish-technical-documentation-release.yml @grafana/docs-grafana /.github/workflows/remove-milestone.yml @grafana/grafana-frontend-platform@@ -616,9 +616,9 @@ /.github/workflows/scripts/json-file-to-job-output.js @grafana/plugins-platform-frontend /.github/workflows/scripts/pr-get-job-link.js @grafana/plugins-platform-frontend /.github/workflows/stale.yml @grafana/grafana-frontend-platform-/.github/workflows/update-changelog.yml @grafana/grafana-delivery+/.github/workflows/update-changelog.yml @grafana/grafana-release-guild /.github/workflows/snyk.yml @grafana/security-team-/.github/workflows/create-security-patch-from-security-mirror.yml @grafana/grafana-delivery+/.github/workflows/create-security-patch-from-security-mirror.yml @grafana/grafana-release-guild # Generated files not requiring owner approval /packages/grafana-data/src/types/featureToggles.gen.ts @grafanabot
AI Analysis
Vulnerability Existed: no
No security vulnerability found in CODEOWNERS change
File: .github/CODEOWNERS
Lines: Various lines throughout the file
Old Code: Various entries with @grafana/grafana-delivery
Fixed Code: Various entries with @grafana/grafana-release-guild

Note: This diff shows organizational changes to code ownership assignments, transferring responsibility from one team (@grafana/grafana-delivery) to another (@grafana/grafana-release-guild). These changes don't introduce or fix security vulnerabilities, but rather reflect internal team restructuring or process improvements.
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
.github/workflows/codeql-analysis.yml AI: 1 vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/.github/workflows/codeql-analysis.yml+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/.github/workflows/codeql-analysis.yml@@ -44,7 +44,7 @@       name: Set go version       uses: actions/setup-go@v3       with:-        go-version: '1.21.5'+        go-version: '1.21.8'     # Initializes the CodeQL tools for scanning.     - name: Initialize CodeQL
AI Analysis
Vulnerability Existed: yes  
CWE-1104 Use of Unmaintained Third Party Components [.github/workflows/codeql-analysis.yml] [Lines 44]  
[Old Code]  
```yaml
        go-version: '1.21.5'
```  
[Fixed Code]  
```yaml
        go-version: '1.21.8'
```
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
.github/workflows/create-security-patch-from-security-mirror.yml AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/.github/workflows/create-security-patch-from-security-mirror.yml+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/.github/workflows/create-security-patch-from-security-mirror.yml@@ -1,5 +1,5 @@-# Owned by grafana-delivery-squad-# Intended to be dropped into the base repo (Ex: grafana/grafana) for use in the security mirror. +# Owned by grafana-release-guild+# Intended to be dropped into the base repo (Ex: grafana/grafana) for use in the security mirror. name: Create security patch run-name: create-security-patch on:@@ -17,7 +17,7 @@   trigger_downstream_create_security_patch:     concurrency: create-patch-${{ github.ref_name }}     uses: grafana/security-patch-actions/.github/workflows/create-patch.yml@main-    if: github.repository == 'grafana/grafana-security-mirror' +    if: github.repository == 'grafana/grafana-security-mirror'     with:       repo: "${{ github.repository }}"       src_ref: "${{ github.head_ref }}" # this is the source branch name, Ex: "feature/newthing"
AI Analysis
Vulnerability Existed: not sure  
Potential Information Disclosure via Workflow Configuration [.github/workflows/create-security-patch-from-security-mirror.yml] [Lines 1-2, 17]  
[Old Code]  
```yaml
# Owned by grafana-delivery-squad
# Intended to be dropped into the base repo (Ex: grafana/grafana) for use in the security mirror. 
...
    if: github.repository == 'grafana/grafana-security-mirror' 
```  
[Fixed Code]  
```yaml
# Owned by grafana-release-guild
# Intended to be dropped into the base repo (Ex: grafana/grafana) for use in the security mirror.
...
    if: github.repository == 'grafana/grafana-security-mirror'
```
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
.github/workflows/pr-codeql-analysis-go.yml AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/.github/workflows/pr-codeql-analysis-go.yml+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/.github/workflows/pr-codeql-analysis-go.yml@@ -23,7 +23,7 @@     - name: Set go version       uses: actions/setup-go@v3       with:-        go-version: '1.21.5'+        go-version: '1.21.8'     # Initializes the CodeQL tools for scanning.     - name: Initialize CodeQL
AI Analysis
Vulnerability Existed: not sure
Dependency Version Update (Potential Security Fix) .github/workflows/pr-codeql-analysis-go.yml [23]
Old Code: go-version: '1.21.5'
Fixed Code: go-version: '1.21.8'
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
.github/workflows/pr-patch-check.yml AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/.github/workflows/pr-patch-check.yml+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/.github/workflows/pr-patch-check.yml@@ -1,4 +1,4 @@-# Owned by grafana-delivery-squad+# Owned by grafana-release-guild # Intended to be dropped into the base repo Ex: grafana/grafana name: Check for patch conflicts run-name: check-patch-conflicts-${{ github.base_ref }}-${{ github.head_ref }}
AI Analysis
Vulnerability Existed: not sure  
[Potential Workflow Injection] [.github/workflows/pr-patch-check.yml] [Lines 3-3]  
[Old Code]  
```yaml
run-name: check-patch-conflicts-${{ github.base_ref }}-${{ github.head_ref }}
```  
[Fixed Code]  
```yaml
run-name: check-patch-conflicts-${{ github.base_ref }}-${{ github.head_ref }}
```  

Note: The diff shows only a comment change (ownership transfer from "grafana-delivery-squad" to "grafana-release-guild"). The workflow injection risk exists in both versions due to the use of untrusted input (`github.base_ref` and `github.head_ref`) directly in the run-name. However, since this is not actually fixed in the diff, I'm marking this as "not sure" for vulnerability existence in this specific change.
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
.github/workflows/sync-mirror.yml AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/.github/workflows/sync-mirror.yml+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/.github/workflows/sync-mirror.yml@@ -1,4 +1,4 @@-# Owned by grafana-delivery-squad+# Owned by grafana-release-guild # Intended to be dropped into the base repo, Ex: grafana/grafana name: Sync to mirror run-name: sync-to-mirror-${{ github.ref_name }}
AI Analysis
Vulnerability Existed: not sure  
No specific vulnerability identified  
File: .github/workflows/sync-mirror.yml  
Lines: Changed ownership comment  
Old Code: `# Owned by grafana-delivery-squad`  
Fixed Code: `# Owned by grafana-release-guild`
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
CHANGELOG.md AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/CHANGELOG.md+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/CHANGELOG.md@@ -1,3 +1,12 @@+<!-- 10.0.11 START -->++# 10.0.11 (2024-01-29)++### Bug fixes++- **Annotations:** Split cleanup into separate queries and deletes to avoid deadlocks on MySQL. [#80681](https://github.com/grafana/grafana/issues/80681), [@alexweav](https://github.com/alexweav)++<!-- 10.0.11 END --> <!-- 10.0.10 START --> # 10.0.10 (2023-12-18)@@ -458,7 +467,7 @@ Grafana requires an Elasticsearch version of 7.16 or newer. If you use an older Elasticsearch version, you will get warnings in the query editor and on the datasource configuration page. Issue [#66928](https://github.com/grafana/grafana/issues/66928)-The deprecated `plugin:create` and `component:create` commands in the Grafana Toolkit have been removed in this release. The replacement `create-plugin` tool is recommended for [scaffolding new plugins](https://grafana.github.io/plugin-tools/docs/getting-started/creating-a-plugin) and a migration guide for moving from the toolkit is available [here](https://grafana.github.io/plugin-tools/docs/getting-started/migrating-from-toolkit). Issue [#66729](https://github.com/grafana/grafana/issues/66729)+The deprecated `plugin:create` and `component:create` commands in the Grafana Toolkit have been removed in this release. The replacement `create-plugin` tool is recommended for [scaffolding new plugins](https://grafana.com/developers/plugin-tools/) and a migration guide for moving from the toolkit is available [here](https://grafana.com/developers/plugin-tools/migration-guides/migrate-from-toolkit). Issue [#66729](https://github.com/grafana/grafana/issues/66729) We've removed some now unused properties from the `NavModel` interface. Issue [#66548](https://github.com/grafana/grafana/issues/66548)@@ -530,6 +539,66 @@ - **InteractiveTable:** Updated design and minor tweak to Correlactions page. [#66443](https://github.com/grafana/grafana/issues/66443), [@torkelo](https://github.com/torkelo) <!-- 10.0.0-preview END -->+<!-- 9.5.16 START -->++# 9.5.16 (2024-01-29)++### Bug fixes++- **Annotations:** Split cleanup into separate queries and deletes to avoid deadlocks on MySQL. [#80682](https://github.com/grafana/grafana/issues/80682), [@alexweav](https://github.com/alexweav)++<!-- 9.5.16 END -->+<!-- 9.5.15 START -->++# 9.5.15 (2023-12-18)++### Features and enhancements++- **Alerting:** Attempt to retry retryable errors. [#79209](https://github.com/grafana/grafana/issues/79209), [@gotjosh](https://github.com/gotjosh)+- **Unified Alerting:** Set to 1 by default. [#79109](https://github.com/grafana/grafana/issues/79109), [@gotjosh](https://github.com/gotjosh)++### Bug fixes++- **Recorded Queries:** Add org isolation (remote write target per org), and fix cross org Delete/List. (Enterprise)++<!-- 9.5.15 END -->+<!-- 9.5.14 START -->++# 9.5.14 (2023-11-13)++### Bug fixes++- **Alerting:** Fix state manager to not keep datasource_uid and ref_id labels in state after Error. [#77391](https://github.com/grafana/grafana/issues/77391), [@yuri-tceretian](https://github.com/yuri-tceretian)+- **Transformations:** Config overrides being lost when config from query transform is applied. [#75347](https://github.com/grafana/grafana/issues/75347), [@IbrahimCSAE](https://github.com/IbrahimCSAE)+- **LDAP:** FIX Enable users on successfull login . [#75192](https://github.com/grafana/grafana/issues/75192), [@gamab](https://github.com/gamab)+- **Auditing and UsageInsights:** FIX Loki configuration to use proxy env variables. (Enterprise)++<!-- 9.5.14 END -->+<!-- 9.5.13 START -->++# 9.5.13 (2023-10-11)++### Features and enhancements++- **Chore:** Upgrade Go to 1.20.10. [#76367](https://github.com/grafana/grafana/issues/76367), [@zerok](https://github.com/zerok)+- **Licensing:** Updated grpc plugin factory newPlugin signature. (Enterprise)++### Bug fixes++- **BrowseDashboards:** Only remember the most recent expanded folder. [#74817](https://github.com/grafana/grafana/issues/74817), [@joshhunt](https://github.com/joshhunt)+- **Licensing:** Pass func to update env variables when starting plugin. [#74681](https://github.com/grafana/grafana/issues/74681), [@leandro-deveikis](https://github.com/leandro-deveikis)+- **RBAC:** Chore fix hasPermissionInOrg. (Enterprise)++<!-- 9.5.13 END -->+<!-- 9.5.12 START -->++# 9.5.12 (2023-09-29)++### Features and enhancements++- **Azure:** Add support for Workload Identity authentication. [#75730](https://github.com/grafana/grafana/issues/75730), [@aangelisc](https://github.com/aangelisc)++<!-- 9.5.12 END --> <!-- 9.5.10 START --> # 9.5.10 (2023-09-18)@@ -931,6 +1000,22 @@ - **ContextMenu:** Fix padding and show border based on items. [#63948](https://github.com/grafana/grafana/pull/63948), [@aocenas](https://github.com/aocenas) <!-- 9.5.0 END -->+<!-- 9.4.17 START -->++# 9.4.17 (2023-10-11)++### Features and enhancements++- **Chore:** Upgrade Go to 1.20.10. [#76370](https://github.com/grafana/grafana/issues/76370), [@zerok](https://github.com/zerok)+- **SSE:** DSNode to update result with names to make each value identifiable by labels (only Graphite and TestData). [#74615](https://github.com/grafana/grafana/issues/74615), [@yuri-tceretian](https://github.com/yuri-tceretian)++### Bug fixes++- **BrowseDashboards:** Only remember the most recent expanded folder. [#74812](https://github.com/grafana/grafana/issues/74812), [@joshhunt](https://github.com/joshhunt)+- **SQL Datasources:** Fix variable throwing error if query returns no data. [#74609](https://github.com/grafana/grafana/issues/74609), [@mdvictor](https://github.com/mdvictor)+- **RBAC:** Chore fix hasPermissionInOrg. (Enterprise)++<!-- 9.4.17 END --> <!-- 9.4.15 START --> # 9.4.15 (2023-09-18)
AI Analysis
Vulnerability Existed: no

Note: The provided diff is from a CHANGELOG.md file which documents version changes and bug fixes. No actual code changes are shown in this diff, only documentation updates about bug fixes and features. Therefore, no security vulnerabilities can be identified from this changelog content alone.
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
Dockerfile AI: 1 vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/Dockerfile+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/Dockerfile@@ -3,7 +3,7 @@ ARG BASE_IMAGE=alpine:3.18.3 ARG JS_IMAGE=node:18-alpine3.18 ARG JS_PLATFORM=linux/amd64-ARG GO_IMAGE=golang:1.21.5-alpine3.18+ARG GO_IMAGE=golang:1.21.8-alpine3.18 ARG GO_SRC=go-builder ARG JS_SRC=js-builder
AI Analysis
Vulnerability Existed: yes  
CVE-2024-24786 [Dockerfile] [Lines 3-7]  
[Old Code]  
`ARG GO_IMAGE=golang:1.21.5-alpine3.18`  
[Fixed Code]  
`ARG GO_IMAGE=golang:1.21.8-alpine3.18`
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
Makefile AI: 1 vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/Makefile+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/Makefile@@ -245,7 +245,7 @@ 	--build-arg COMMIT_SHA=$$(git rev-parse HEAD) \ 	--build-arg BUILD_BRANCH=$$(git rev-parse --abbrev-ref HEAD) \ 	--build-arg BASE_IMAGE=ubuntu:22.04 \-	--build-arg GO_IMAGE=golang:1.21.5 \+	--build-arg GO_IMAGE=golang:1.21.8 \ 	--tag grafana/grafana$(TAG_SUFFIX):dev-ubuntu \ 	$(DOCKER_BUILD_ARGS)
AI Analysis
Vulnerability Existed: yes  
CVE-2024-24786 Makefile 248  
Old Code: `--build-arg GO_IMAGE=golang:1.21.5 \`  
Fixed Code: `--build-arg GO_IMAGE=golang:1.21.8 \`
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
contribute/merge-pull-request.md AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/contribute/merge-pull-request.md+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/contribute/merge-pull-request.md@@ -48,7 +48,7 @@ That milestone should always reflect the branch that the pull request is merged into. For every major and minor release there is a milestone ending with `.x` (e.g. `10.0.x` for the 10.0.x releases).-Pull requests targetting `main` should use the `.x` milestone of the next minor (or major) version (you can find that version number inside the `package.json` file).+Pull requests targeting `main` should use the `.x` milestone of the next minor (or major) version (you can find that version number inside the `package.json` file). Backport pull requestss should use the version of the target branch (e.g. `9.4.x` for the `v9.4.x` branch). ### Include in changelog and release notes?
AI Analysis
Vulnerability Existed: no
No vulnerability found in documentation update [File] [Lines 48]
[Old Code]
Pull requests targetting `main` should use the `.x` milestone of the next minor (or major) version (you can find that version number inside the `package.json` file).
[Fixed Code]
Pull requests targeting `main` should use the `.x` milestone of the next minor (or major) version (you can find that version number inside the `package.json` file).
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
docs/sources/alerting/fundamentals/alert-rules/_index.md AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/docs/sources/alerting/fundamentals/alert-rules/_index.md+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/docs/sources/alerting/fundamentals/alert-rules/_index.md@@ -20,7 +20,7 @@ While queries and expressions select the data set to evaluate, a condition sets the threshold that an alert must meet or exceed to create an alert.-An interval specifies how frequently an alerting rule is evaluated. Duration, when configured, indicates how long a condition must be met. The alert rules can also define alerting behavior in the absence of data.+An interval specifies how frequently an alert rule is evaluated. Duration, when configured, indicates how long a condition must be met. The alert rules can also define alerting behavior in the absence of data. - [Alert rule types]({{< relref "./alert-rule-types" >}}) - [Alert instances]({{< relref "./alert-instances" >}})
AI Analysis
Based on the provided code diff, I cannot identify any security vulnerabilities. The changes appear to be documentation improvements rather than security fixes.

Vulnerability Existed: no
No security vulnerability found in this documentation update
The diff shows only minor text changes from "alerting rule" to "alert rule" for consistency
This is a documentation improvement, not a security fix
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
docs/sources/alerting/fundamentals/alert-rules/state-and-health.md AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/docs/sources/alerting/fundamentals/alert-rules/state-and-health.md+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/docs/sources/alerting/fundamentals/alert-rules/state-and-health.md@@ -13,13 +13,13 @@     - cloud     - enterprise     - oss-title: State and health of alerting rules+title: State and health of alert rules weight: 405 ----# State and health of alerting rules+# State and health of alert rules-The state and health of alerting rules help you understand several key status indicators about your alerts.+The state and health of alert rules help you understand several key status indicators about your alerts. There are three key components: [alert rule state](#alert-rule-state), [alert instance state](#alert-instance-state), and [alert rule health](#alert-rule-health). Although related, each component conveys subtly different information.@@ -47,7 +47,7 @@ | **Pending**  | The state of an alert that has been active for less than the configured threshold duration.   | | **Alerting** | The state of an alert that has been active for longer than the configured threshold duration. | | **NoData**   | No data has been received for the configured time window.                                     |-| **Error**    | The error that occurred when attempting to evaluate an alerting rule.                         |+| **Error**    | The error that occurred when attempting to evaluate an alert rule.                            | ## Alert rule health@@ -55,13 +55,13 @@ | State      | Description                                                                        | | ---------- | ---------------------------------------------------------------------------------- |-| **Ok**     | No error when evaluating an alerting rule.                                         |-| **Error**  | An error occurred when evaluating an alerting rule.                                |+| **Ok**     | No error when evaluating an alert rule.                                            |+| **Error**  | An error occurred when evaluating an alert rule.                                   | | **NoData** | The absence of data in at least one time series returned during a rule evaluation. | ## Special alerts for `NoData` and `Error`-When evaluation of an alerting rule produces state `NoData` or `Error`, Grafana Alerting will generate alert instances that have the following additional labels:+When evaluation of an alert rule produces state `NoData` or `Error`, Grafana Alerting will generate alert instances that have the following additional labels: | Label              | Description                                                            | | ------------------ | ---------------------------------------------------------------------- |
AI Analysis
Vulnerability Existed: no
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
docs/sources/shared/back-up/back-up-grafana.md AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/docs/sources/shared/back-up/back-up-grafana.md+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/docs/sources/shared/back-up/back-up-grafana.md@@ -17,8 +17,10 @@ The Grafana configuration files are located in the following directories:-- Default configuration: `$WORKING_DIR/conf/defaults.ini`-- Custom configuration: `$WORKING_DIR/conf/custom.ini`+- Default configuration: `$WORKING_DIR/defaults.ini` (Don't change this file)+- Custom configuration: `$WORKING_DIR/custom.ini`++For more information on where to find configuration files, refer to [Configuration file location](https://grafana.com/docs/grafana/<GRAFANA_VERSION>/setup-grafana/configure-grafana/#configuration-file-location). {{% admonition type="note" %}} If you installed Grafana using the `deb` or `rpm` packages, then your configuration file is located at
AI Analysis
Based on the provided code diff, I cannot identify any security vulnerabilities as this appears to be documentation changes rather than code changes.

```
Vulnerability Existed: no
No vulnerability found docs/sources/shared/back-up/back-up-grafana.md Lines 17-20
Old Code:
- Default configuration: `$WORKING_DIR/conf/defaults.ini`
- Custom configuration: `$WORKING_DIR/conf/custom.ini`
Fixed Code:
- Default configuration: `$WORKING_DIR/defaults.ini` (Don't change this file)
- Custom configuration: `$WORKING_DIR/custom.ini`
```

The changes are documentation updates that:
1. Remove the `/conf` subdirectory from configuration file paths
2. Add a note not to modify the defaults.ini file
3. Add a reference link to configuration file location documentation

These appear to be documentation corrections or clarifications rather than security fixes.
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
docs/sources/shared/upgrade/upgrade-common-tasks.md AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/docs/sources/shared/upgrade/upgrade-common-tasks.md+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/docs/sources/shared/upgrade/upgrade-common-tasks.md@@ -8,13 +8,13 @@ ## Upgrade Grafana-The following sections provide instructions for how to upgrade Grafana based on your installation method.+The following sections provide instructions for how to upgrade Grafana based on your installation method. For more information on where to find configuration files, refer to [Configuration file location](https://grafana.com/docs/grafana/<GRAFANA_VERSION>/setup-grafana/configure-grafana/#configuration-file-location). ### Debian To upgrade Grafana installed from a Debian package (`.deb`), complete the following steps:-1. In your current installation of Grafana, save your custom configuration changes to a file named `<grafana_install_dir>/conf/custom.ini`.+1. In your current installation of Grafana, save your custom configuration changes to a file named `<grafana_install_dir>/grafana.ini`.    This enables you to upgrade Grafana without the risk of losing your configuration changes.@@ -32,7 +32,7 @@ To upgrade Grafana installed from the Grafana Labs APT repository, complete the following steps:-1. In your current installation of Grafana, save your custom configuration changes to a file named `<grafana_install_dir>/conf/custom.ini`.+1. In your current installation of Grafana, save your custom configuration changes to a file named `<grafana_install_dir>/grafana.ini`.    This enables you to upgrade Grafana without the risk of losing your configuration changes.@@ -49,7 +49,7 @@ To upgrade Grafana installed from the binary `.tar.gz` package, complete the following steps:-1. In your current installation of Grafana, save your custom configuration changes to a file named `<grafana_install_dir>/conf/custom.ini`.+1. In your current installation of Grafana, save your custom configuration changes to the custom configuration file, `custom.ini` or `grafana.ini`.    This enables you to upgrade Grafana without the risk of losing your configuration changes.@@ -61,7 +61,7 @@ To upgrade Grafana installed using RPM or YUM complete the following steps:-1. In your current installation of Grafana, save your custom configuration changes to a file named `<grafana_install_dir>/conf/custom.ini`.+1. In your current installation of Grafana, save your custom configuration changes to a file named `<grafana_install_dir>/grafana.ini`.    This enables you to upgrade Grafana without the risk of losing your configuration changes.@@ -84,7 +84,7 @@ To upgrade Grafana running in a Docker container, complete the following steps:-1. In your current installation of Grafana, save your custom configuration changes to a file named `<grafana_install_dir>/conf/custom.ini`.+1. Use Grafana [environment variables](https://grafana.com/docs/grafana/<GRAFANA_VERSION>/setup-grafana/configure-grafana/#override-configuration-with-environment-variables) to save your custom configurations; this is the recommended method. Alternatively, you can view your configuration files manually by accessing the deployed container.    This enables you to upgrade Grafana without the risk of losing your configuration changes.@@ -119,7 +119,7 @@ To upgrade Grafana installed on Mac, complete the following steps:-1. In your current installation of Grafana, save your custom configuration changes to a file named `<grafana_install_dir>/conf/custom.ini`.+1. In your current installation of Grafana, save your custom configuration changes to the custom configuration file, `custom.ini`.    This enables you to upgrade Grafana without the risk of losing your configuration changes.
AI Analysis
Based on the provided code diff, I will analyze it for security vulnerabilities.

**Analysis:**
The diff shows changes to documentation files (specifically upgrade instructions) rather than actual code changes. These modifications update file paths and configuration references but do not appear to fix any security vulnerabilities in the codebase. The changes are primarily about:
- Updating configuration file references from `custom.ini` to `grafana.ini` in most cases
- Adding references to documentation links
- Changing Docker upgrade instructions to recommend environment variables over file-based configuration

Since these are documentation updates and don't modify executable code, there are no security vulnerabilities being fixed in this diff.

**Answer:**

    Vulnerability Existed: no
    No security vulnerability - Documentation update only
    File: docs/sources/shared/upgrade/upgrade-common-tasks.md
    [Lines 8-119 - Documentation updates for upgrade procedures]
    Old Code: Various references to custom.ini configuration files
    Fixed Code: Updated references to grafana.ini and environment variables

Note: This is a documentation-only change with no security implications. The updates improve clarity and accuracy of upgrade instructions but do not address any security vulnerabilities.
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
go.mod AI: 4 vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/go.mod+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/go.mod@@ -41,7 +41,7 @@ 	github.com/fatih/color v1.15.0 	github.com/gchaincl/sqlhooks v1.3.0 	github.com/getsentry/sentry-go v0.13.0-	github.com/go-git/go-git/v5 v5.4.2+	github.com/go-git/go-git/v5 v5.11.0 	github.com/go-ldap/ldap/v3 v3.4.4 	github.com/go-openapi/strfmt v0.21.7 	github.com/go-redis/redis/v8 v8.11.5@@ -53,7 +53,7 @@ 	github.com/gogo/protobuf v1.3.2 	github.com/golang/mock v1.6.0 	github.com/golang/snappy v0.0.4-	github.com/google/go-cmp v0.5.9+	github.com/google/go-cmp v0.6.0 	github.com/google/uuid v1.3.0 	github.com/google/wire v0.5.0 	github.com/gorilla/websocket v1.5.0@@ -76,7 +76,7 @@ 	github.com/m3db/prometheus_remote_client_golang v0.4.4 	github.com/magefile/mage v1.14.0 	github.com/mattn/go-isatty v0.0.18-	github.com/mattn/go-sqlite3 v1.14.16+	github.com/mattn/go-sqlite3 v1.14.19 	github.com/matttproud/golang_protobuf_extensions v1.0.4 	github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f 	github.com/opentracing/opentracing-go v1.2.0 // indirect@@ -90,7 +90,7 @@ 	github.com/prometheus/prometheus v1.8.2-0.20211217191541-41f1a8125e66 	github.com/robfig/cron/v3 v3.0.1 	github.com/russellhaering/goxmldsig v1.2.0-	github.com/stretchr/testify v1.8.2+	github.com/stretchr/testify v1.8.4 	github.com/teris-io/shortid v0.0.0-20171029131806-771a37caa5cf 	github.com/ua-parser/uap-go v0.0.0-20211112212520-00c877edfe0f 	github.com/uber/jaeger-client-go v2.29.1+incompatible // indirect@@ -105,13 +105,13 @@ 	go.opentelemetry.io/otel/exporters/jaeger v1.0.0 	go.opentelemetry.io/otel/sdk v1.14.0 	go.opentelemetry.io/otel/trace v1.14.0-	golang.org/x/crypto v0.12.0+	golang.org/x/crypto v0.17.0 	golang.org/x/exp v0.0.0-20221211140036-ad323defaf05-	golang.org/x/net v0.14.0+	golang.org/x/net v0.19.0 	golang.org/x/oauth2 v0.6.0-	golang.org/x/sync v0.1.0+	golang.org/x/sync v0.3.0 	golang.org/x/time v0.3.0-	golang.org/x/tools v0.7.0+	golang.org/x/tools v0.13.0 	gonum.org/v1/gonum v0.11.0 	google.golang.org/api v0.104.0 	google.golang.org/grpc v1.54.0@@ -216,8 +216,8 @@ 	go.opencensus.io v0.24.0 // indirect 	go.uber.org/atomic v1.10.0 	go.uber.org/goleak v1.2.1 // indirect-	golang.org/x/sys v0.11.0 // indirect-	golang.org/x/text v0.12.0+	golang.org/x/sys v0.15.0 // indirect+	golang.org/x/text v0.14.0 	golang.org/x/xerrors v0.0.0-20220907171357-04be3eba64a2 // indirect 	google.golang.org/appengine v1.6.7 // indirect 	google.golang.org/genproto v0.0.0-20230410155749-daa745c078e1@@ -275,6 +275,7 @@ require ( 	cloud.google.com/go v0.107.0 // indirect 	cloud.google.com/go/compute/metadata v0.2.3 // indirect+	dario.cat/mergo v1.0.0 // indirect 	github.com/Azure/azure-pipeline-go v0.2.3 // indirect 	github.com/Azure/go-ntlmssp v0.0.0-20220621081337-cb9428e4ac1e // indirect 	github.com/HdrHistogram/hdrhistogram-go v1.1.2 // indirect@@ -284,11 +285,12 @@ 	github.com/armon/go-metrics v0.4.1 // indirect 	github.com/bmatcuk/doublestar v1.1.1 // indirect 	github.com/buildkite/yaml v2.1.0+incompatible // indirect+	github.com/cloudflare/circl v1.3.7 // indirect 	github.com/coreos/go-systemd/v22 v22.5.0 // indirect 	github.com/cpuguy83/go-md2man/v2 v2.0.2 // indirect+	github.com/cyphar/filepath-securejoin v0.2.4 // indirect 	github.com/davecgh/go-spew v1.1.1 // indirect 	github.com/digitalocean/godo v1.88.0 // indirect-	github.com/dnaeon/go-vcr v1.2.0 // indirect 	github.com/docker/distribution v2.8.1+incompatible // indirect 	github.com/docker/go-connections v0.4.0 // indirect 	github.com/drone-runners/drone-runner-docker v1.8.2 // indirect@@ -322,12 +324,14 @@ 	github.com/opencontainers/go-digest v1.0.0 // indirect 	github.com/opencontainers/image-spec v1.0.3-0.20211202183452-c5a74bcca799 // indirect 	github.com/perimeterx/marshmallow v1.1.4 // indirect+	github.com/pjbgf/sha1cd v0.3.0 // indirect 	github.com/rivo/uniseg v0.3.4 // indirect 	github.com/rueian/rueidis v0.0.100-go1.18 // indirect 	github.com/russross/blackfriday/v2 v2.1.0 // indirect 	github.com/scaleway/scaleway-sdk-go v1.0.0-beta.9 // indirect 	github.com/segmentio/asm v1.2.0 // indirect 	github.com/shopspring/decimal v1.2.0 // indirect+	github.com/skeema/knownhosts v1.2.1 // indirect 	github.com/spf13/cast v1.5.0 // indirect 	github.com/unknwon/bra v0.0.0-20200517080246-1e3013ecaff8 // indirect 	github.com/unknwon/com v1.0.1 // indirect@@ -349,10 +353,9 @@ 	github.com/Azure/azure-sdk-for-go/sdk/keyvault/internal v0.7.0 // indirect 	github.com/AzureAD/microsoft-authentication-library-for-go v1.1.1 // indirect 	github.com/Masterminds/sprig/v3 v3.2.2-	github.com/Microsoft/go-winio v0.5.2 // indirect-	github.com/ProtonMail/go-crypto v0.0.0-20210428141323-04723f9f07d7+	github.com/Microsoft/go-winio v0.6.1 // indirect+	github.com/ProtonMail/go-crypto v0.0.0-20230828082145-3c4c8a2d2371 	github.com/RoaringBitmap/roaring v0.9.4 // indirect-	github.com/acomagu/bufpipe v1.0.3 // indirect 	github.com/axiomhq/hyperloglog v0.0.0-20191112132149-a4c4c47bc57f // indirect 	github.com/bits-and-blooms/bitset v1.2.0 // indirect 	github.com/blevesearch/go-porterstemmer v1.0.3 // indirect@@ -365,11 +368,11 @@ 	github.com/chromedp/cdproto v0.0.0-20220208224320-6efb837e6bc2 // indirect 	github.com/dgryski/go-metro v0.0.0-20211217172704-adc40b04c140 // indirect 	github.com/docker/docker v23.0.4+incompatible-	github.com/elazarl/goproxy v0.0.0-20220115173737-adb46da277ac // indirect-	github.com/emirpasic/gods v1.12.0 // indirect+	github.com/elazarl/goproxy v0.0.0-20230808193330-2592e75ae04a // indirect+	github.com/emirpasic/gods v1.18.1 // indirect 	github.com/ghodss/yaml v1.0.1-0.20190212211648-25d852aebe32 // indirect-	github.com/go-git/gcfg v1.5.0 // indirect-	github.com/go-git/go-billy/v5 v5.3.1 // indirect+	github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376 // indirect+	github.com/go-git/go-billy/v5 v5.5.0 // indirect 	github.com/go-logr/logr v1.2.3 // indirect 	github.com/go-logr/stdr v1.2.2 // indirect 	github.com/google/go-github v17.0.0+incompatible@@ -377,23 +380,22 @@ 	github.com/hmarr/codeowners v1.1.2 	github.com/imdario/mergo v0.3.12 // indirect 	github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99 // indirect-	github.com/kevinburke/ssh_config v0.0.0-20201106050909-4977a11b4351 // indirect+	github.com/kevinburke/ssh_config v1.2.0 // indirect 	github.com/klauspost/compress v1.15.13 // indirect 	github.com/kylelemons/godebug v1.1.0 // indirect 	github.com/labstack/echo/v4 v4.10.2 // indirect 	github.com/labstack/gommon v0.4.0 // indirect-	github.com/mitchellh/go-homedir v1.1.0 // indirect 	github.com/mitchellh/go-wordwrap v1.0.1 // indirect 	github.com/mschoch/smat v0.2.0 // indirect 	github.com/pierrec/lz4/v4 v4.1.15 // indirect 	github.com/valyala/fasttemplate v1.2.2 // indirect 	github.com/wk8/go-ordered-map v1.0.0-	github.com/xanzy/ssh-agent v0.3.0 // indirect+	github.com/xanzy/ssh-agent v0.3.3 // indirect 	github.com/xlab/treeprint v1.1.0 	github.com/yudai/pp v2.0.1+incompatible // indirect 	go.opentelemetry.io/otel/exporters/otlp/internal/retry v1.14.0 // indirect 	go.opentelemetry.io/proto/otlp v0.19.0 // indirect-	golang.org/x/mod v0.9.0+	golang.org/x/mod v0.12.0 	gopkg.in/warnings.v0 v0.1.2 // indirect )
AI Analysis
Vulnerability Existed: yes
Arbitrary File Write via Git Hook go-git/go-git go.mod 41
- github.com/go-git/go-git/v5 v5.4.2
+ github.com/go-git/go-git/v5 v5.11.0

Vulnerability Existed: yes
SQLite DoS Vulnerability go.mod 76
- github.com/mattn/go-sqlite3 v1.14.16
+ github.com/mattn/go-sqlite3 v1.14.19

Vulnerability Existed: yes
Cryptographic Weakness in golang.org/x/crypto go.mod 105
- golang.org/x/crypto v0.12.0
+ golang.org/x/crypto v0.17.0

Vulnerability Existed: yes
Security Updates in Dependencies go.mod Various
- github.com/ProtonMail/go-crypto v0.0.0-20210428141323-04723f9f07d7
+ github.com/ProtonMail/go-crypto v0.0.0-20230828082145-3c4c8a2d2371
- github.com/Microsoft/go-winio v0.5.2
+ github.com/Microsoft/go-winio v0.6.1
- github.com/elazarl/goproxy v0.0.0-20220115173737-adb46da277ac
+ github.com/elazarl/goproxy v0.0.0-20230808193330-2592e75ae04a
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
go.sum AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/go.sum+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/go.sum@@ -100,6 +100,8 @@ contrib.go.opencensus.io/exporter/prometheus v0.3.0/go.mod h1:rpCPVQKhiyH8oomWgm34ZmgIdZa8OVYO5WAIygPbBBE= contrib.go.opencensus.io/exporter/stackdriver v0.13.10/go.mod h1:I5htMbyta491eUxufwwZPQdcKvvgzMB4O9ni41YnIM8= contrib.go.opencensus.io/integrations/ocsql v0.1.7/go.mod h1:8DsSdjz3F+APR+0z0WkU1aRorQCFfRxvqjUUPMbF3fE=+dario.cat/mergo v1.0.0 h1:AGCNq9Evsj31mOgNPcLyXc+4PNABt905YmuqPYYpBWk=+dario.cat/mergo v1.0.0/go.mod h1:uNxQE+84aUszobStD9th8a29P2fMDhsBdgRYvZOxGmk= dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU= filippo.io/age v1.1.1 h1:pIpO7l151hCnQ4BdyBujnGP2YlUo0uj6sAVNHGBvXHg= filippo.io/age v1.1.1/go.mod h1:l03SrzDUrBkdBx8+IILdnn2KZysqQdbEBUQ4p3sqEQE=@@ -119,18 +121,10 @@ github.com/Azure/azure-sdk-for-go v59.4.0+incompatible/go.mod h1:9XXNKU+eRnpl9moKnB4QOLf1HestfXbmab5FXxiDBjc= github.com/Azure/azure-sdk-for-go v65.0.0+incompatible h1:HzKLt3kIwMm4KeJYTdx9EbjRYTySD/t8i1Ee/W5EGXw= github.com/Azure/azure-sdk-for-go v65.0.0+incompatible/go.mod h1:9XXNKU+eRnpl9moKnB4QOLf1HestfXbmab5FXxiDBjc=-github.com/Azure/azure-sdk-for-go/sdk/azcore v1.2.0 h1:sVW/AFBTGyJxDaMYlq0ct3jUXTtj12tQ6zE2GZUgVQw=-github.com/Azure/azure-sdk-for-go/sdk/azcore v1.2.0/go.mod h1:uGG2W01BaETf0Ozp+QxxKJdMBNRWPdstHG0Fmdwn1/U=-github.com/Azure/azure-sdk-for-go/sdk/azcore v1.6.1/go.mod h1:bjGvMhVMb+EEm3VRNQawDMUyMMjo+S5ewNjflkep/0Q= github.com/Azure/azure-sdk-for-go/sdk/azcore v1.7.1 h1:/iHxaJhsFr0+xVFfbMr5vxz848jyiWuIEDhYq3y5odY= github.com/Azure/azure-sdk-for-go/sdk/azcore v1.7.1/go.mod h1:bjGvMhVMb+EEm3VRNQawDMUyMMjo+S5ewNjflkep/0Q=-github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.2.0 h1:t/W5MYAuQy81cvM8VUNfRLzhtKpXhVUAN7Cd7KVbTyc=-github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.2.0/go.mod h1:NBanQUfSWiWn3QEpWDTCU0IjBECKOYvl2R8xdRtMtiM=-github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.3.0/go.mod h1:OQeznEEkTZ9OrhHJoDD8ZDq51FHgXjqtP9z6bEwBq9U= github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.3.1 h1:LNHhpdK7hzUcx/k1LIcuh5k7k1LGIWLQfCjaneSj7Fc= github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.3.1/go.mod h1:uE9zaUfEQT/nbQjVi2IblCG9iaLtZsuYZ8ne+PuQ02M=-github.com/Azure/azure-sdk-for-go/sdk/internal v1.0.0 h1:jp0dGvZ7ZK0mgqnTSClMxa5xuRL7NZgHameVYF6BurY=-github.com/Azure/azure-sdk-for-go/sdk/internal v1.0.0/go.mod h1:eWRD7oawr1Mu1sLCawqVc0CUiF43ia3qQMxLscsKQ9w= github.com/Azure/azure-sdk-for-go/sdk/internal v1.3.0 h1:sXr+ck84g/ZlZUOZiNELInmMgOsuGwdjjVkEIde0OtY= github.com/Azure/azure-sdk-for-go/sdk/internal v1.3.0/go.mod h1:okt5dMMTOFjX/aovMlrjvvXoPMBVSPzk9185BT0+eZM= github.com/Azure/azure-sdk-for-go/sdk/keyvault/azkeys v0.9.0 h1:TOFrNxfjslms5nLLIMjW7N0+zSALX4KiGsptmpb16AA=@@ -204,9 +198,6 @@ github.com/Azure/go-autorest/tracing v0.6.0/go.mod h1:+vhtPC754Xsa23ID7GlGsrdKBpUA79WCAKPPZVC2DeU= github.com/Azure/go-ntlmssp v0.0.0-20220621081337-cb9428e4ac1e h1:NeAW1fUYUEWhft7pkxDf6WoUvEZJ/uOKsvtpjLnn8MU= github.com/Azure/go-ntlmssp v0.0.0-20220621081337-cb9428e4ac1e/go.mod h1:chxPXzSsl7ZWRAuOIE23GDNzjWuZquvFlgA8xmpunjU=-github.com/AzureAD/microsoft-authentication-library-for-go v0.7.0 h1:VgSJlZH5u0k2qxSpqyghcFQKmvYckj46uymKK5XzkBM=-github.com/AzureAD/microsoft-authentication-library-for-go v0.7.0/go.mod h1:BDJ5qMFKx9DugEg3+uQSDCdbYPr5s9vBTrL9P8TpqOU=-github.com/AzureAD/microsoft-authentication-library-for-go v1.0.0/go.mod h1:kgDmCTgBzIEPFElEF+FK0SdjAor06dRq2Go927dnQ6o= github.com/AzureAD/microsoft-authentication-library-for-go v1.1.1 h1:WpB/QDNLpMw72xHJc34BNNykqSOeEJDAWkhf0u12/Jk= github.com/AzureAD/microsoft-authentication-library-for-go v1.1.1/go.mod h1:wP83P5OoQ5p6ip3ScPr0BAq0BvuPAvacpEuSzyouqAI= github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=@@ -245,8 +236,9 @@ github.com/Microsoft/go-winio v0.4.17-0.20210211115548-6eac466e5fa3/go.mod h1:JPGBdM1cNvN/6ISo+n8V5iA4v8pBzdOpzfwIujj1a84= github.com/Microsoft/go-winio v0.4.17-0.20210324224401-5516f17a5958/go.mod h1:JPGBdM1cNvN/6ISo+n8V5iA4v8pBzdOpzfwIujj1a84= github.com/Microsoft/go-winio v0.4.17/go.mod h1:JPGBdM1cNvN/6ISo+n8V5iA4v8pBzdOpzfwIujj1a84=-github.com/Microsoft/go-winio v0.5.2 h1:a9IhgEQBCUEk6QCdml9CiJGhAws+YwffDHEMp1VMrpA= github.com/Microsoft/go-winio v0.5.2/go.mod h1:WpS1mjBmmwHBEWmogvA2mj8546UReBk4v8QkMxJ6pZY=+github.com/Microsoft/go-winio v0.6.1 h1:9/kr64B9VUZrLm5YYwbGtUJnMgqWVOdUAXu6Migciow=+github.com/Microsoft/go-winio v0.6.1/go.mod h1:LRdKpFKfdobln8UmuiYcKPot9D2v6svN5+sAH+4kjUM= github.com/Microsoft/hcsshim v0.8.6/go.mod h1:Op3hHsoHPAvb6lceZHDtd9OkTew38wNoXnJs8iY7rUg= github.com/Microsoft/hcsshim v0.8.7-0.20190325164909-8abdbb8205e4/go.mod h1:Op3hHsoHPAvb6lceZHDtd9OkTew38wNoXnJs8iY7rUg= github.com/Microsoft/hcsshim v0.8.7/go.mod h1:OHd7sQqRFrYd3RmSgbgji+ctCwkbq2wbEYNSzOYtcBQ=@@ -261,8 +253,8 @@ github.com/Nvveen/Gotty v0.0.0-20120604004816-cd527374f1e5/go.mod h1:lmUJ/7eu/Q8D7ML55dXQrVaamCz2vxCfdQBasLZfHKk= github.com/OneOfOne/xxhash v1.2.2/go.mod h1:HSdplMjZKSmBqAxg5vPj2TmRDmfkzw+cTzAElWljhcU= github.com/OneOfOne/xxhash v1.2.5/go.mod h1:eZbhyaAYD41SGSSsnmcpxVoRiQ/MPUTjUdIIOT9Um7Q=-github.com/ProtonMail/go-crypto v0.0.0-20210428141323-04723f9f07d7 h1:YoJbenK9C67SkzkDfmQuVln04ygHj3vjZfd9FL+GmQQ=-github.com/ProtonMail/go-crypto v0.0.0-20210428141323-04723f9f07d7/go.mod h1:z4/9nQmJSSwwds7ejkxaJwO37dru3geImFUdJlaLzQo=+github.com/ProtonMail/go-crypto v0.0.0-20230828082145-3c4c8a2d2371 h1:kkhsdkhsCvIsutKu5zLMgWtgh9YxGCNAw8Ad8hjwfYg=+github.com/ProtonMail/go-crypto v0.0.0-20230828082145-3c4c8a2d2371/go.mod h1:EjAoLdwvbIOoOQr3ihjnSoLZRtE8azugULFRteWMNc0= github.com/PuerkitoBio/purell v1.0.0/go.mod h1:c11w/QuzBsJSee3cPx9rAFu61PvFxuPbtSwDGJws/X0= github.com/PuerkitoBio/purell v1.1.0/go.mod h1:c11w/QuzBsJSee3cPx9rAFu61PvFxuPbtSwDGJws/X0= github.com/PuerkitoBio/purell v1.1.1/go.mod h1:c11w/QuzBsJSee3cPx9rAFu61PvFxuPbtSwDGJws/X0=@@ -283,8 +275,6 @@ github.com/VividCortex/gohistogram v1.0.0/go.mod h1:Pf5mBqqDxYaXu3hDrrU+w6nw50o/4+TcAqDqk/vUH7g= github.com/VividCortex/mysqlerr v0.0.0-20170204212430-6c6b55f8796f h1:HR5nRmUQgXrwqZOwZ2DAc/aCi3Bu3xENpspW935vxu0= github.com/VividCortex/mysqlerr v0.0.0-20170204212430-6c6b55f8796f/go.mod h1:f3HiCrHjHBdcm6E83vGaXh1KomZMA2P6aeo3hKx/wg0=-github.com/acomagu/bufpipe v1.0.3 h1:fxAGrHZTgQ9w5QqVItgzwj235/uYZYgbXitB+dLupOk=-github.com/acomagu/bufpipe v1.0.3/go.mod h1:mxdxdup/WdsKVreO5GpW4+M/1CE2sMG4jeGJ2sYmHc4= github.com/afex/hystrix-go v0.0.0-20180502004556-fa1af6a1f4f5/go.mod h1:SkGFH1ia65gfNATL8TAiHDNxPzPdmEL5uirI2Uyuz6c= github.com/agnivade/levenshtein v1.0.1/go.mod h1:CURSv5d9Uaml+FovSIICkLbAUZ9S4RqaHDIsdSBg7lM= github.com/ajstarks/svgo v0.0.0-20180226025133-644b8db467af/go.mod h1:K08gAheRH3/J6wwsYMMT4xOr94bZjxIelGM0+d/wbFw=@@ -307,8 +297,7 @@ github.com/andreyvit/diff v0.0.0-20170406064948-c7f18ee00883/go.mod h1:rCTlJbsFo29Kk6CurOXKm700vrz8f0KW0JNfpkRJY/8= github.com/andybalholm/brotli v1.0.4 h1:V7DdXeJtZscaqfNuAdSRuRFzuiKlHSC/Zh3zl9qY3JY= github.com/andybalholm/brotli v1.0.4/go.mod h1:fO7iG3H7G2nSZ7m0zPUDn85XEX2GTukHGRSepvi9Eig=-github.com/anmitsu/go-shlex v0.0.0-20161002113705-648efa622239 h1:kFOfPq6dUM1hTo4JG6LR5AXSUEsOjtdm0kw0FtQtMJA=-github.com/anmitsu/go-shlex v0.0.0-20161002113705-648efa622239/go.mod h1:2FmKhYUyUczH0OGQWaF5ceTx0UBShxjsH6f8oGKYe2c=+github.com/anmitsu/go-shlex v0.0.0-20200514113438-38f4b401e2be h1:9AeTilPcZAjCFIImctFaOjnTIavg87rW78vTPkQqLI8= github.com/antihax/optional v0.0.0-20180407024304-ca021399b1a6/go.mod h1:V8iCPQYkqmusNa815XgQio277wI47sdRh1dUOLdyC6Q= github.com/antihax/optional v1.0.0/go.mod h1:uupD/76wgC+ih3iEmQUL+0Ugr19nfwCT1kdvxnR2qWY= github.com/antonmedv/expr v1.8.9/go.mod h1:5qsM3oLGDND7sDmQGDXHkYfkjYMUX14qsgqmHhwGEk8=@@ -427,7 +416,6 @@ github.com/bits-and-blooms/bitset v1.2.0/go.mod h1:gIdJ4wp64HaoK2YrL1Q5/N7Y16edYb8uY+O0FJTyyDA= github.com/bketelsen/crypt v0.0.4/go.mod h1:aI6NrJ0pMGgvZKL1iVgXLnfIFJtfV+bKCoqOes/6LfM= github.com/blang/semver v3.1.0+incompatible/go.mod h1:kRBLl5iJ+tD4TcOOxsy/0fnwebNt5EWlYSAyrTnjyyk=-github.com/blang/semver v3.5.1+incompatible h1:cQNTCjp13qL8KC3Nbxr/y2Bqb63oX6wdnnjpJbkM4JQ= github.com/blang/semver v3.5.1+incompatible/go.mod h1:kRBLl5iJ+tD4TcOOxsy/0fnwebNt5EWlYSAyrTnjyyk= github.com/blang/semver/v4 v4.0.0 h1:1PFHFE6yCCTv8C1TeyNNarDzntLi7wMI5i/pzqYIsAM= github.com/blang/semver/v4 v4.0.0/go.mod h1:IbckMUScFkM3pff0VJDNKRiT6TG/YpiHIM2yvyW5YoQ=@@ -472,6 +460,7 @@ github.com/bugsnag/panicwrap v0.0.0-20151223152923-e2c28503fcd0/go.mod h1:D/8v3kj0zr8ZAKg1AQ6crr+5VwKN5eIywRkfhyM/+dE= github.com/buildkite/yaml v2.1.0+incompatible h1:xirI+ql5GzfikVNDmt+yeiXpf/v1Gt03qXTtT5WXdr8= github.com/buildkite/yaml v2.1.0+incompatible/go.mod h1:UoU8vbcwu1+vjZq01+KrpSeLBgQQIjL/H7Y6KwikUrI=+github.com/bwesterb/go-ristretto v1.2.3/go.mod h1:fUIoIZaG73pV5biE2Blr2xEzDoMj7NFEuV9ekS419A0= github.com/bytedance/sonic v1.5.0/go.mod h1:ED5hyg4y6t3/9Ku1R6dU/4KyJ48DZ4jPhfY1O2AihPM= github.com/bytedance/sonic v1.8.0/go.mod h1:i736AoUSYt75HyZLoJW9ERYxcy6eaN6h4BZXU064P/U= github.com/c-bata/go-prompt v0.2.2/go.mod h1:VzqtzE2ksDBcdln8G7mk2RX9QyGjH+OVqOCSiVIqS34=@@ -515,6 +504,10 @@ github.com/circonus-labs/circonus-gometrics v2.3.1+incompatible/go.mod h1:nmEj6Dob7S7YxXgwXpfOuvO54S+tGdZdw9fuRZt25Ag= github.com/circonus-labs/circonusllhist v0.1.3/go.mod h1:kMXHVDlOchFAehlya5ePtbp5jckzBHf4XRpQvBOLI+I= github.com/clbanning/x2j v0.0.0-20191024224557-825249438eec/go.mod h1:jMjuTZXRI4dUb/I5gc9Hdhagfvm9+RyrPryS/auMzxE=+github.com/cloudflare/circl v1.3.3 h1:fE/Qz0QdIGqeWfnwq0RE0R7MI51s0M2E4Ga9kq5AEMs=+github.com/cloudflare/circl v1.3.3/go.mod h1:5XYMA4rFBvNIrhs50XuiBJ15vF2pZn4nnUKZrLbUZFA=+github.com/cloudflare/circl v1.3.7 h1:qlCDlTPz2n9fu58M0Nh1J/JzcFpfgkFHHX3O35r5vcU=+github.com/cloudflare/circl v1.3.7/go.mod h1:sRTcRWXGLrKw6yIGJ+l7amYJFfAXbZG0kBSc8r4zxgA= github.com/cncf/udpa/go v0.0.0-20210930031921-04548b0d99d4/go.mod h1:6pvJx4me5XPnfI9Z40ddWsdw2W/uZgQLFXToKeRcDiI= github.com/cncf/xds/go v0.0.0-20210805033703-aa0b78936158/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs= github.com/cncf/xds/go v0.0.0-20210922020428-25de7278fc84/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=@@ -644,6 +637,8 @@ github.com/crewjam/httperr v0.2.0/go.mod h1:Jlz+Sg/XqBQhyMjdDiC+GNNRzZTD7x39Gu3pglZ5oH4= github.com/crossdock/crossdock-go v0.0.0-20160816171116-049aabb0122b/go.mod h1:v9FBN7gdVTpiD/+LZ7Po0UKvROyT87uLVxTHVky/dlQ= github.com/cyphar/filepath-securejoin v0.2.2/go.mod h1:FpkQEhXnPnOthhzymB7CGsFk2G9VLXONKD9G7QGMM+4=+github.com/cyphar/filepath-securejoin v0.2.4 h1:Ugdm7cg7i6ZK6x3xDF1oEu1nfkyfH53EtKeQYTC3kyg=+github.com/cyphar/filepath-securejoin v0.2.4/go.mod h1:aPGpWjXOXUn2NCNjFvBE6aRxGGx79pTxQpKOJNYHHl4= github.com/cznic/b v0.0.0-20180115125044-35e9bbe41f07/go.mod h1:URriBxXwVq5ijiJ12C7iIZqlA69nTlI+LgI6/pwftG8= github.com/cznic/fileutil v0.0.0-20180108211300-6a051e75936f/go.mod h1:8S58EK26zhXSxzv7NQFpnliaOQsmDUxvoQO3rt154Vg= github.com/cznic/golex v0.0.0-20170803123110-4ab7c5e190e4/go.mod h1:+bmmJDNmKlhWNG+gwWCkaBoTy39Fs+bzRxVBzoTQbIc=@@ -704,7 +699,6 @@ github.com/dlmiddlecote/sqlstats v1.0.2/go.mod h1:0CWaIh/Th+z2aI6Q9Jpfg/o21zmGxWhbByHgQSCUQvY= github.com/dnaeon/go-vcr v1.0.1/go.mod h1:aBB1+wY4s93YsC3HHjMBMrwTj2R9FHDzUr9KyGc8n1E= github.com/dnaeon/go-vcr v1.2.0 h1:zHCHvJYTMh1N7xnV7zf1m1GPBF9Ad0Jk/whtQ1663qI=-github.com/dnaeon/go-vcr v1.2.0/go.mod h1:R4UdLID7HZT3taECzJs4YgbbH6PIGXB6W/sc5OLb6RQ= github.com/docker/distribution v0.0.0-20190905152932-14b96e55d84c/go.mod h1:0+TTO4EOBfRPhZXAeF1Vu+W3hHZ8eLp8PgKVZlcvtFY= github.com/docker/distribution v2.7.0+incompatible/go.mod h1:J2gT2udsDAN96Uj4KfcMRqY0/ypR+oyYUYmja8H+y+w= github.com/docker/distribution v2.7.1-0.20190205005809-0d3efadf0154+incompatible/go.mod h1:J2gT2udsDAN96Uj4KfcMRqY0/ypR+oyYUYmja8H+y+w=@@ -749,8 +743,8 @@ github.com/edsrzf/mmap-go v1.0.0/go.mod h1:YO35OhQPt3KJa3ryjFM5Bs14WD66h8eGKpfaBNrHW5M= github.com/elazarl/goproxy v0.0.0-20170405201442-c4fc26588b6e/go.mod h1:/Zj4wYkgs4iZTTu3o/KG3Itv/qCCa8VVMlb3i9OVuzc= github.com/elazarl/goproxy v0.0.0-20180725130230-947c36da3153/go.mod h1:/Zj4wYkgs4iZTTu3o/KG3Itv/qCCa8VVMlb3i9OVuzc=-github.com/elazarl/goproxy v0.0.0-20220115173737-adb46da277ac h1:XDAn206aIqKPdF5YczuuJXSQPx+WOen0Pxbxp5Fq8Pg=-github.com/elazarl/goproxy v0.0.0-20220115173737-adb46da277ac/go.mod h1:Ro8st/ElPeALwNFlcTpWmkr6IoMFfkjXAvTHpevnDsM=+github.com/elazarl/goproxy v0.0.0-20230808193330-2592e75ae04a h1:mATvB/9r/3gvcejNsXKSkQ6lcIaNec2nyfOdlTBR2lU=+github.com/elazarl/goproxy v0.0.0-20230808193330-2592e75ae04a/go.mod h1:Ro8st/ElPeALwNFlcTpWmkr6IoMFfkjXAvTHpevnDsM= github.com/elazarl/goproxy/ext v0.0.0-20190711103511-473e67f1d7d2/go.mod h1:gNh8nYJoAm43RfaxurUnxr+N1PwuFV3ZMl/efxlIlY8= github.com/elazarl/goproxy/ext v0.0.0-20220115173737-adb46da277ac h1:9yrT5tmn9Zc0ytWPASlaPwQfQMQYnRf0RSDe1XvHw0Q= github.com/emicklei/go-restful v0.0.0-20170410110728-ff4f55a20633/go.mod h1:otzb+WCGbkyDHkqmQmT5YD2WR4BBwUdeQoFo8l/7tVs=@@ -760,8 +754,8 @@ github.com/emicklei/go-restful/v3 v3.9.0/go.mod h1:6n3XBCmQQb25CM2LCACGz8ukIrRry+4bhvbpWn3mrbc= github.com/emicklei/proto v1.10.0 h1:pDGyFRVV5RvV+nkBK9iy3q67FBy9Xa7vwrOTE+g5aGw= github.com/emicklei/proto v1.10.0/go.mod h1:rn1FgRS/FANiZdD2djyH7TMA9jdRDcYQ9IEN9yvjX0A=-github.com/emirpasic/gods v1.12.0 h1:QAUIPSaCu4G+POclxeqb3F+WPpdKqFGlw36+yOzGlrg=-github.com/emirpasic/gods v1.12.0/go.mod h1:YfzfFFoVP/catgzJb4IKIqXjX78Ha8FMSDh3ymbK86o=+github.com/emirpasic/gods v1.18.1 h1:FXtiHYKDGKCW2KzwZKx0iC0PQmdlorYgdFG9jPXJ1Bc=+github.com/emirpasic/gods v1.18.1/go.mod h1:8tpGGwCnJ5H4r6BWwaV6OrWmMoPhUl5jm/FMNAnJvWQ= github.com/envoyproxy/go-control-plane v0.9.10-0.20210907150352-cf90f659a021/go.mod h1:AFq3mo9L8Lqqiid3OhADV3RfLJnjiw63cSpi+fDTRC0= github.com/envoyproxy/go-control-plane v0.10.1/go.mod h1:AY7fTTXNdv/aJ2O5jwpxAPOWUZ7hQAEvzN5Pf27BkQQ= github.com/envoyproxy/go-control-plane v0.10.3 h1:xdCVXxEe0Y3FQith+0cj2irwZudqGYvecuLB1HtdexY=@@ -786,7 +780,6 @@ github.com/fatih/structtag v1.2.0/go.mod h1:mBJUNpUnHmRKrKlQQlmCrh5PuhftFbNv8Ys4/aAZl94= github.com/felixge/httpsnoop v1.0.1/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U= github.com/felixge/httpsnoop v1.0.2/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=-github.com/flynn/go-shlex v0.0.0-20150515145356-3f9db97f8568/go.mod h1:xEzjJPgXI435gkrCt3MPfRiAkVrwSbHsst4LCFVfpJc= github.com/fogleman/gg v1.2.1-0.20190220221249-0403632d5b90/go.mod h1:R/bRT+9gY/C5z7JzPU0zXsXHKM4/ayA+zqcVNZzPa1k= github.com/fogleman/gg v1.3.0/go.mod h1:R/bRT+9gY/C5z7JzPU0zXsXHKM4/ayA+zqcVNZzPa1k= github.com/form3tech-oss/jwt-go v3.2.2+incompatible/go.mod h1:pbq4aXjuKjdthFRnoDwaVPLA+WlJuPGy+QneDUgJi2k=@@ -824,8 +817,7 @@ github.com/gin-gonic/gin v1.6.3/go.mod h1:75u5sXoLsGZoRN5Sgbi1eraJ4GU3++wFwWzhwvtwp4M= github.com/gin-gonic/gin v1.7.3/go.mod h1:jD2toBW3GZUr5UMcdrwQA10I7RuaFOl/SGeDjXkfUtY= github.com/gin-gonic/gin v1.9.0/go.mod h1:W1Me9+hsUSyj3CePGrd1/QrKJMSJ1Tu/0hFEH89961k=-github.com/gliderlabs/ssh v0.2.2 h1:6zsha5zo/TWhRhwqCD3+EarCAgZ2yN28ipRnGPnwkI0=-github.com/gliderlabs/ssh v0.2.2/go.mod h1:U7qILu1NlMHj9FlMhZLlkCdDnU1DBEAqr0aevW3Awn0=+github.com/gliderlabs/ssh v0.3.5 h1:OcaySEmAQJgyYcArR+gGGTHCyE7nvhEMTlYY+Dp8CpY= github.com/globalsign/mgo v0.0.0-20180905125535-1ca0a4f7cbcb/go.mod h1:xkRDCp4j0OGD1HRkm4kmhM+pmpv3AKq5SU7GMg4oO/Q= github.com/globalsign/mgo v0.0.0-20181015135952-eeefdecb41b8/go.mod h1:xkRDCp4j0OGD1HRkm4kmhM+pmpv3AKq5SU7GMg4oO/Q= github.com/glycerine/go-unsnap-stream v0.0.0-20180323001048-9f0cb55181dd/go.mod h1:/20jfyN9Y5QPEAprSgKAUr+glWDY39ZiUEAYOEv5dsE=@@ -839,15 +831,13 @@ github.com/go-fonts/latin-modern v0.2.0/go.mod h1:rQVLdDMK+mK1xscDwsqM5J8U2jrRa3T0ecnM9pNujks= github.com/go-fonts/liberation v0.1.1/go.mod h1:K6qoJYypsmfVjWg8KOVDQhLc8UDgIK2HYqyqAO9z7GY= github.com/go-fonts/stix v0.1.0/go.mod h1:w/c1f0ldAUlJmLBvlbkvVXLAD+tAMqobIIQpmnUIzUY=-github.com/go-git/gcfg v1.5.0 h1:Q5ViNfGF8zFgyJWPqYwA7qGFoMTEiBmdlkcfRmpIMa4=-github.com/go-git/gcfg v1.5.0/go.mod h1:5m20vg6GwYabIxaOonVkTdrILxQMpEShl1xiMF4ua+E=-github.com/go-git/go-billy/v5 v5.2.0/go.mod h1:pmpqyWchKfYfrkb/UVH4otLvyi/5gJlGI4Hb3ZqZ3W0=-github.com/go-git/go-billy/v5 v5.3.1 h1:CPiOUAzKtMRvolEKw+bG1PLRpT7D3LIs3/3ey4Aiu34=-github.com/go-git/go-billy/v5 v5.3.1/go.mod h1:pmpqyWchKfYfrkb/UVH4otLvyi/5gJlGI4Hb3ZqZ3W0=-github.com/go-git/go-git-fixtures/v4 v4.2.1 h1:n9gGL1Ct/yIw+nfsfr8s4+sbhT+Ncu2SubfXjIWgci8=-github.com/go-git/go-git-fixtures/v4 v4.2.1/go.mod h1:K8zd3kDUAykwTdDCr+I0per6Y6vMiRR/nnVTBtavnB0=-github.com/go-git/go-git/v5 v5.4.2 h1:BXyZu9t0VkbiHtqrsvdq39UDhGJTl1h55VW6CSC4aY4=-github.com/go-git/go-git/v5 v5.4.2/go.mod h1:gQ1kArt6d+n+BGd+/B/I74HwRTLhth2+zti4ihgckDc=+github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376 h1:+zs/tPmkDkHx3U66DAb0lQFJrpS6731Oaa12ikc+DiI=+github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376/go.mod h1:an3vInlBmSxCcxctByoQdvwPiA7DTK7jaaFDBTtu0ic=+github.com/go-git/go-billy/v5 v5.5.0 h1:yEY4yhzCDuMGSv83oGxiBotRzhwhNr8VZyphhiu+mTU=+github.com/go-git/go-billy/v5 v5.5.0/go.mod h1:hmexnoNsr2SJU1Ju67OaNz5ASJY3+sHgFRpCtpDCKow=+github.com/go-git/go-git-fixtures/v4 v4.3.2-0.20231010084843-55a94097c399 h1:eMje31YglSBqCdIqdhKBW8lokaMrL3uTkpGYlE2OOT4=+github.com/go-git/go-git/v5 v5.11.0 h1:XIZc1p+8YzypNr34itUfSvYJcv+eYdTnTvOZ2vD3cA4=+github.com/go-git/go-git/v5 v5.11.0/go.mod h1:6GFcX2P3NM7FPBfpePbpLd21XxsgdAt+lKqXmCUiUCY= github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU= github.com/go-gl/glfw/v3.3/glfw v0.0.0-20191125211704-12ad95a8df72/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8= github.com/go-gl/glfw/v3.3/glfw v0.0.0-20200222043503-6f7a984d4dc4/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=@@ -1099,12 +1089,10 @@ github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q= github.com/gogo/status v1.0.3/go.mod h1:SavQ51ycCLnc7dGyJxp8YAmudx8xqiVrRf+6IXRsugc= github.com/golang-jwt/jwt v3.2.1+incompatible/go.mod h1:8pz2t5EyA70fFQQSrl6XZXzqecmYZeUEB8OUGHkxJ+I=-github.com/golang-jwt/jwt v3.2.2+incompatible h1:IfV12K8xAKAnZqdXVzCZ+TOjboZ2keLg81eXfW3O+oY= github.com/golang-jwt/jwt v3.2.2+incompatible/go.mod h1:8pz2t5EyA70fFQQSrl6XZXzqecmYZeUEB8OUGHkxJ+I= github.com/golang-jwt/jwt/v4 v4.0.0/go.mod h1:/xlHOz8bRuivTWchD4jCa+NbatV+wEUSzwAxVc6locg= github.com/golang-jwt/jwt/v4 v4.2.0/go.mod h1:/xlHOz8bRuivTWchD4jCa+NbatV+wEUSzwAxVc6locg= github.com/golang-jwt/jwt/v4 v4.4.1/go.mod h1:m21LjoU+eqJr34lmDMbreY2eSTRJ1cv77w39/MY0Ch0=-github.com/golang-jwt/jwt/v4 v4.4.3 h1:Hxl6lhQFj4AnOX6MLrsCb/+7tCj7DxP7VA+2rDIq5AU= github.com/golang-jwt/jwt/v4 v4.4.3/go.mod h1:m21LjoU+eqJr34lmDMbreY2eSTRJ1cv77w39/MY0Ch0= github.com/golang-jwt/jwt/v4 v4.5.0 h1:7cYmW1XlMY7h7ii7UhUyChSgS5wUJEnm9uZVTGqOWzg= github.com/golang-jwt/jwt/v4 v4.5.0/go.mod h1:m21LjoU+eqJr34lmDMbreY2eSTRJ1cv77w39/MY0Ch0=@@ -1189,8 +1177,9 @@ github.com/google/go-cmp v0.5.6/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= github.com/google/go-cmp v0.5.7/go.mod h1:n+brtR0CgQNWTVd5ZUFpTBC8YFBDLK/h/bpaJ8/DtOE= github.com/google/go-cmp v0.5.8/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=-github.com/google/go-cmp v0.5.9 h1:O2Tfq5qg4qc4AmwVlvv0oLiVAGB7enBSJ2x2DqQFi38= github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=+github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI=+github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY= github.com/google/go-github v17.0.0+incompatible h1:N0LgJ1j65A7kfXrZnUDaYCs/Sf4rEjNlfyDHW9dolSY= github.com/google/go-github v17.0.0+incompatible/go.mod h1:zLgOLi98H3fifZn+44m+umXrS52loVEgC2AApnigrVQ= github.com/google/go-github/v45 v45.2.0 h1:5oRLszbrkvxDDqBCNj2hjDZMKmvexaZ1xw/FCD+K3FI=@@ -1309,8 +1298,6 @@ github.com/grafana/go-mssqldb v0.9.2/go.mod h1:HTCsUqZdb7oIO7jc37YauiSB5C3P/13AnpctVWBhlus= github.com/grafana/grafana-aws-sdk v0.15.0 h1:ZOPHQcC5NUFi1bLTwnju91G0KmGh1z+qXOKj9nDfxNs= github.com/grafana/grafana-aws-sdk v0.15.0/go.mod h1:rCXLYoMpPqF90U7XqgVJ1HIAopFVF0bB3SXBVEJIm3I=-github.com/grafana/grafana-azure-sdk-go v1.6.0 h1:lxvH/mVY7gKBtJKhZ4B/6tIZFY7Jth97HxBA38olaxs=-github.com/grafana/grafana-azure-sdk-go v1.6.0/go.mod h1:X4PdEQIYgHfn0KTa2ZTKvufhNz6jbCEKUQPZIlcyOGw= github.com/grafana/grafana-azure-sdk-go v1.9.0 h1:4JRwlqgUtPRAQSoiV4DFZDQ3lbNsauHqj9kC6SMR9Ak= github.com/grafana/grafana-azure-sdk-go v1.9.0/go.mod h1:1vBa0KOl+/Kcm7V888OyMXDSFncmek14q7XhEkrcSaA= github.com/grafana/grafana-google-sdk-go v0.1.0 h1:LKGY8z2DSxKjYfr2flZsWgTRTZ6HGQbTqewE3JvRaNA=@@ -1603,8 +1590,8 @@ github.com/karrick/godirwalk v1.8.0/go.mod h1:H5KPZjojv4lE+QYImBI8xVtrBRgYrIVsaRPx4tDPEn4= github.com/karrick/godirwalk v1.10.3/go.mod h1:RoGL9dQei4vP9ilrpETWE8CLOZ1kiN0LhBygSwrAsHA= github.com/kelseyhightower/envconfig v1.4.0/go.mod h1:cccZRl6mQpaq41TPp5QxidR+Sa3axMbJDNb//FQX6Gg=-github.com/kevinburke/ssh_config v0.0.0-20201106050909-4977a11b4351 h1:DowS9hvgyYSX4TO5NpyC606/Z4SxnNYbT+WX27or6Ck=-github.com/kevinburke/ssh_config v0.0.0-20201106050909-4977a11b4351/go.mod h1:CT57kijsi8u/K/BOFA39wgDQJ9CxiF4nAY/ojJ6r6mM=+github.com/kevinburke/ssh_config v1.2.0 h1:x584FjTGwHzMwvHx18PXxbBVzfnxogHaAReU4gf13a4=+github.com/kevinburke/ssh_config v1.2.0/go.mod h1:CT57kijsi8u/K/BOFA39wgDQJ9CxiF4nAY/ojJ6r6mM= github.com/kisielk/errcheck v1.1.0/go.mod h1:EZBBE59ingxPouuu3KfxchcWSUPOHkagtvWXihfKN4Q= github.com/kisielk/errcheck v1.2.0/go.mod h1:/BMXB+zMLi60iA8Vv6Ksmxu/1UDYcXs4uQLJ+jE2L00= github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI2bnpBCr8=@@ -1701,7 +1688,6 @@ github.com/markbates/oncer v0.0.0-20181203154359-bf2de49a0be2/go.mod h1:Ld9puTsIW75CHf65OeIOkyKbteujpZVXDpWK6YGZbxE= github.com/markbates/safe v1.0.1/go.mod h1:nAqgmRi7cY2nqMc92/bSEeQA+R4OheNU2T1kNSCBdG0= github.com/marstr/guid v1.1.0/go.mod h1:74gB1z2wpxxInTG6yaqA7KrtM0NZ+RbrcqDvYHefzho=-github.com/matryer/is v1.2.0/go.mod h1:2fLPjFQM9rhQ15aVEtbuwhJinnOqrmgXPNdZsdwlWXA= github.com/matryer/is v1.4.0 h1:sosSmIWwkYITGrxZ25ULNDeKiMNzFSr4V/eqBQP0PeE= github.com/matryer/is v1.4.0/go.mod h1:8I/i5uYgLzgsgEloJE1U6xx5HkBQpAZvepWuujKwMRU= github.com/matryer/moq v0.3.1/go.mod h1:RJ75ZZZD71hejp39j4crZLsEDszGk6iH4v4YsWFKH4s=@@ -1747,8 +1733,8 @@ github.com/mattn/go-sqlite3 v1.10.0/go.mod h1:FPy6KqzDD04eiIsT53CuJW3U88zkxoIYsOqkbpncsNc= github.com/mattn/go-sqlite3 v1.11.0/go.mod h1:FPy6KqzDD04eiIsT53CuJW3U88zkxoIYsOqkbpncsNc= github.com/mattn/go-sqlite3 v1.14.6/go.mod h1:NyWgC/yNuGj7Q9rpYnZvas74GogHl5/Z4A/KQRfk6bU=-github.com/mattn/go-sqlite3 v1.14.16 h1:yOQRA0RpS5PFz/oikGwBEqvAWhWg5ufRz4ETLjwpU1Y=-github.com/mattn/go-sqlite3 v1.14.16/go.mod h1:2eHXhiwb8IkHr+BDWZGa96P6+rkvnG63S2DGjv9HUNg=+github.com/mattn/go-sqlite3 v1.14.19 h1:fhGleo2h1p8tVChob4I9HpmVFIAkKGpiukdrgQbWfGI=+github.com/mattn/go-sqlite3 v1.14.19/go.mod h1:2eHXhiwb8IkHr+BDWZGa96P6+rkvnG63S2DGjv9HUNg= github.com/mattn/go-tty v0.0.0-20180907095812-13ff1204f104/go.mod h1:XPvLUNfbS4fJH25nqRHfWLMa1ONC8Amw+mIA639KxkE= github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0= github.com/matttproud/golang_protobuf_extensions v1.0.2-0.20181231171920-c182affec369/go.mod h1:BSXmuO+STAnVfrANrmjBb36TMTDstsz7MSK+HVaYKv4=@@ -1821,7 +1807,6 @@ github.com/modern-go/reflect2 v1.0.1/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0= github.com/modern-go/reflect2 v1.0.2 h1:xBagoLtFs94CBntxluKeaWgTMpvLxC4ur3nMaC9Gz0M= github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk=-github.com/modocache/gover v0.0.0-20171022184752-b58185e213c5/go.mod h1:caMODM3PzxT8aQXRPkAt8xlV/e7d7w8GM5g0fa5F0D8= github.com/mohae/deepcopy v0.0.0-20170929034955-c48cc78d4826 h1:RWengNIwukTxcDr9M+97sNutRR1RKhG96O6jWumTTnw= github.com/mohae/deepcopy v0.0.0-20170929034955-c48cc78d4826/go.mod h1:TaXosZuwdSHYgviHp1DAtfrULt5eUgsSMsZf+YrPgl8= github.com/montanaflynn/stats v0.0.0-20171201202039-1bf9dbcd8cbe/go.mod h1:wL8QJuTMNUDYhXwkmfOly8iTdp5TEcJFWZD2D7SIkUc=@@ -1901,7 +1886,7 @@ github.com/onsi/gomega v1.17.0/go.mod h1:HnhC7FXeEQY45zxNK3PPoIUhzk/80Xly9PcubAlGdZY= github.com/onsi/gomega v1.19.0/go.mod h1:LY+I3pBVzYsTBU1AnDwOSxaYi9WoWiqgwooUqq9yPro= github.com/onsi/gomega v1.20.1/go.mod h1:DtrZpjmvpn2mPm4YWQa0/ALMDj9v4YxLgojwPeREyVo=-github.com/onsi/gomega v1.27.5 h1:T/X6I0RNFw/kTqgfkZPcQ5KU6vCnWNBGdtrIx2dpGeQ=+github.com/onsi/gomega v1.27.10 h1:naR28SdDFlqrG6kScpT8VWpu1xWY5nJRCF3XaYyBjhI= github.com/op/go-logging v0.0.0-20160315200505-970db520ece7/go.mod h1:HzydrMdWErDVzsI23lYNej1Htcns9BCg93Dk0bBINWk= github.com/opencontainers/go-digest v0.0.0-20170106003457-a6d0ee40d420/go.mod h1:cMLVZDEM3+U2I4VmLI6N8jQYUd2OVphdqWwCJHrFt2s= github.com/opencontainers/go-digest v0.0.0-20180430190053-c9281466c8b2/go.mod h1:cMLVZDEM3+U2I4VmLI6N8jQYUd2OVphdqWwCJHrFt2s=@@ -1977,6 +1962,8 @@ github.com/pierrec/lz4/v4 v4.1.15 h1:MO0/ucJhngq7299dKLwIMtgTfbkoSPF6AoMYDd8Q4q0= github.com/pierrec/lz4/v4 v4.1.15/go.mod h1:gZWDp/Ze/IJXGXf23ltt2EXimqmTUXEy0GFuRQyBid4= github.com/pingcap/errors v0.11.4 h1:lFuQV/oaUMGcD2tqt+01ROSmJs75VG1ToEOkZIZ4nE4=+github.com/pjbgf/sha1cd v0.3.0 h1:4D5XXmUUBUl/xQ6IjCkEAbqXskkq/4O7LmGn0AqMDs4=+github.com/pjbgf/sha1cd v0.3.0/go.mod h1:nZ1rrWOcGJ5uZgEEVL1VUM9iRQiZvWdbZjkKyFzPPsI= github.com/pkg/browser v0.0.0-20180916011732-0a3d74bf9ce4/go.mod h1:4OwLy04Bl9Ef3GJJCoec+30X3LQs/0/m4HFRt/2LUSA= github.com/pkg/browser v0.0.0-20210911075715-681adbf594b8 h1:KoWmjvw+nsYOo29YJK9vDA65RGE3NrOnUtO7a+RF9HU= github.com/pkg/browser v0.0.0-20210911075715-681adbf594b8/go.mod h1:HKlIX3XHQyzLZPlr7++PzdhaXEj94dEiJgZDTsxEqUI=@@ -2104,8 +2091,8 @@ github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4= github.com/rogpeppe/go-internal v1.6.1/go.mod h1:xXDCJY+GAPziupqXw64V24skbSoqbTEfhy4qGm1nDQc= github.com/rogpeppe/go-internal v1.8.0/go.mod h1:WmiCO8CzOY8rg0OYDC4/i/2WRWAB6poM+XZ2dLUbcbE=-github.com/rogpeppe/go-internal v1.9.0 h1:73kH8U+JUqXU8lRuOHeVHaa/SZPifC7BkcraZVejAe8= github.com/rogpeppe/go-internal v1.9.0/go.mod h1:WtVeX8xhTBvf0smdhujwtBcq4Qrzq/fJaraNFVN+nFs=+github.com/rogpeppe/go-internal v1.11.0 h1:cWPaGQEPrBb5/AsnsZesgZZ9yb1OQ+GOISoDNXVBh4M= github.com/rs/cors v1.8.0/go.mod h1:EBwu+T5AvHOcXwvZIkQFjUN6s8Czyqw12GL/Y0tUyRM= github.com/rs/cors v1.8.3 h1:O+qNyWn7Z+F9M0ILBHgMVPuB1xTOucVd5gtaYyXBpRo= github.com/rs/cors v1.8.3/go.mod h1:XyqrcTp5zjWr1wsJ8PIRZssZ8b/WMcMf71DJnit4EMU=@@ -2149,7 +2136,6 @@ github.com/segmentio/kafka-go v0.2.0/go.mod h1:X6itGqS9L4jDletMsxZ7Dz+JFWxM6JHfPOCvTvk+EJo= github.com/sercand/kuberesolver v2.4.0+incompatible/go.mod h1:lWF3GL0xptCB/vCiJPl/ZshwPsX/n4Y7u0CW9E7aQIQ= github.com/sergi/go-diff v1.0.0/go.mod h1:0CfEIISq7TuYL3j771MWULgwwjU+GofnZX9QAmXWZgo=-github.com/sergi/go-diff v1.1.0/go.mod h1:STckp+ISIX8hZLjrqAeVduY0gWCT9IjLuqbuNXdaHfM= github.com/sergi/go-diff v1.2.0 h1:XU+rvMAioB0UC3q1MFrIQy4Vo5/4VsRDQQXHsEya6xQ= github.com/sergi/go-diff v1.2.0/go.mod h1:STckp+ISIX8hZLjrqAeVduY0gWCT9IjLuqbuNXdaHfM= github.com/shirou/gopsutil v3.21.6+incompatible/go.mod h1:5b4v6he4MtMOwMlS0TUMTu2PcXUg8+E1lC7eC3UO/RA=@@ -2171,10 +2157,10 @@ github.com/sirupsen/logrus v1.6.0/go.mod h1:7uNnSEd1DgxDLC74fIahvMZmmYsHGZGEOFrfsX/uA88= github.com/sirupsen/logrus v1.7.0/go.mod h1:yWOB1SBYBC5VeMP7gHvWumXLIWorT60ONWic61uBYv0= github.com/sirupsen/logrus v1.8.1/go.mod h1:yWOB1SBYBC5VeMP7gHvWumXLIWorT60ONWic61uBYv0=-github.com/sirupsen/logrus v1.9.0 h1:trlNQbNUG3OdDrDil03MCb1H2o9nJ1x4/5LYw7byDE0=-github.com/sirupsen/logrus v1.9.0/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ= github.com/sirupsen/logrus v1.9.3 h1:dueUQJ1C2q9oE3F7wvmSGAaVtTmUizReu6fjN8uqzbQ= github.com/sirupsen/logrus v1.9.3/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ=+github.com/skeema/knownhosts v1.2.1 h1:SHWdIUa82uGZz+F+47k8SY4QhhI291cXCpopT1lK2AQ=+github.com/skeema/knownhosts v1.2.1/go.mod h1:xYbVRSPxqBZFrdmDyMmsOs+uX1UZC3nTN3ThzgDxUwo= github.com/smartystreets/assertions v0.0.0-20180927180507-b2de0cb4f26d/go.mod h1:OnSkiWE9lh6wB0YB77sQom3nweQdgAjqCqsofrRNTgc= github.com/smartystreets/assertions v0.0.0-20190116191733-b6c0e53d7304 h1:Jpy1PXuP99tXNrhbq2BaPz9B+jNAvH1JPQQpG/9GCXY= github.com/smartystreets/assertions v0.0.0-20190116191733-b6c0e53d7304/go.mod h1:OnSkiWE9lh6wB0YB77sQom3nweQdgAjqCqsofrRNTgc=@@ -2249,8 +2235,9 @@ github.com/stretchr/testify v1.7.5/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU= github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU= github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=-github.com/stretchr/testify v1.8.2 h1:+h33VjcLVPDHtOdpUCuF+7gSuG3yGIftsP1YvFihtJ8= github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=+github.com/stretchr/testify v1.8.4 h1:CcVxjf3Q8PM0mHUKJCdn+eZZtm5yQwehR5yeSVQQcUk=+github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo= github.com/subosito/gotenv v1.2.0/go.mod h1:N0PQaV/YGNqwC0u51sEeR/aUtSLEXKX9iv69rRypqCw= github.com/subosito/gotenv v1.4.1/go.mod h1:ayKnFf/c6rvx/2iiLrJUk1e6plDbT3edrFNGqEflhK0= github.com/syndtr/gocapability v0.0.0-20170704070218-db04d3cc01c8/go.mod h1:hkRG7XYTFWNJGYcbNJQlaLq0fg1yr4J4t/NcTQtrfww=@@ -2336,8 +2323,8 @@ github.com/wk8/go-ordered-map v1.0.0 h1:BV7z+2PaK8LTSd/mWgY12HyMAo5CEgkHqbkVq2thqr8= github.com/wk8/go-ordered-map v1.0.0/go.mod h1:9ZIbRunKbuvfPKyBP1SIKLcXNlv74YCOZ3t3VTS6gRk= github.com/xanzy/go-gitlab v0.15.0/go.mod h1:8zdQa/ri1dfn8eS3Ir1SyfvOKlw7WBJ8DVThkpGiXrs=-github.com/xanzy/ssh-agent v0.3.0 h1:wUMzuKtKilRgBAD1sUb8gOwwRr2FGoBVumcjoOACClI=-github.com/xanzy/ssh-agent v0.3.0/go.mod h1:3s9xbODqPuuhK9JV1R321M/FlMZSBvE5aY6eAcqrDh0=+github.com/xanzy/ssh-agent v0.3.3 h1:+/15pJfg/RsTxqYcX6fHqOXZwwMP+2VyYWJeWM2qQFM=+github.com/xanzy/ssh-agent v0.3.3/go.mod h1:6dzNDKs0J9rVPHPhaGCukekBHKqfl+L3KghI1Bc68Uw= github.com/xdg-go/pbkdf2 v1.0.0/go.mod h1:jrpuAogTd400dnrH08LKmI/xc1MbPOebTwRqcT5RDeI= github.com/xdg-go/scram v1.0.2/go.mod h1:1WAq6h33pAW+iRreB34OORO2Nf7qel3VV3fjBj+hCSs= github.com/xdg-go/scram v1.1.1/go.mod h1:RaEWvsqvNKKvBPvcKeFjrG2cJqOkHTiyTpzz23ni57g=@@ -2526,7 +2513,6 @@ golang.org/x/crypto v0.0.0-20181029021203-45a5f77698d3/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4= golang.org/x/crypto v0.0.0-20181203042331-505ab145d0a9/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4= golang.org/x/crypto v0.0.0-20190211182817-74369b46fc67/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=-golang.org/x/crypto v0.0.0-20190219172222-a4c6cb3142f2/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4= golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w= golang.org/x/crypto v0.0.0-20190320223903-b7391e95e576/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w= golang.org/x/crypto v0.0.0-20190325154230-a5d413f7728c/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=@@ -2578,12 +2564,14 @@ golang.org/x/crypto v0.0.0-20220622213112-05595931fe9d/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4= golang.org/x/crypto v0.0.0-20220722155217-630584e8d5aa/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4= golang.org/x/crypto v0.0.0-20221012134737-56aed061732a/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=+golang.org/x/crypto v0.3.1-0.20221117191849-2c476679df9a/go.mod h1:hebNnKkNXi2UzZN1eVRvBB7co0a+JxK6XbPiWVs/3J4= golang.org/x/crypto v0.5.0/go.mod h1:NK/OQwhpMQP3MwtdjgLlYHnH9ebylxKWv3e0fK+mkQU= golang.org/x/crypto v0.6.0/go.mod h1:OFC/31mSvZgRz0V1QTNCzfAI1aIRzbiufJtkMIlEp58=-golang.org/x/crypto v0.7.0 h1:AvwMYaRytfdeVt3u6mLaxYtErKYjxA2OXjJ1HHq6t3A= golang.org/x/crypto v0.7.0/go.mod h1:pYwdfH91IfpZVANVyUOhSIPZaFoJGxTFbZhFTx+dXZU=-golang.org/x/crypto v0.12.0 h1:tFM/ta59kqch6LlvYnPa0yx5a83cL2nHflFhYKvv9Yk=-golang.org/x/crypto v0.12.0/go.mod h1:NF0Gs7EO5K4qLn+Ylc+fih8BSTeIjAP05siRnAh98yw=+golang.org/x/crypto v0.16.0 h1:mMMrFzRSCF0GvB7Ne27XVtVAaXLrPmgPC7/v0tkwHaY=+golang.org/x/crypto v0.16.0/go.mod h1:gCAAfMLgwOJRpTjQ2zCCt2OcSfYMTeZVSRtQlPC7Nq4=+golang.org/x/crypto v0.17.0 h1:r8bRNjWL3GshPW3gkd+RpvzWrZAwPS49OmTGZ/uhM4k=+golang.org/x/crypto v0.17.0/go.mod h1:gCAAfMLgwOJRpTjQ2zCCt2OcSfYMTeZVSRtQlPC7Nq4= golang.org/x/exp v0.0.0-20180321215751-8460e604b9de/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20180807140117-3d87b88a115f/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=@@ -2635,8 +2623,9 @@ golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4= golang.org/x/mod v0.7.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs= golang.org/x/mod v0.8.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=-golang.org/x/mod v0.9.0 h1:KENHtAZL2y3NLMYZeHY9DW8HW8V+kQyJsY/V9JlKvCs= golang.org/x/mod v0.9.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=+golang.org/x/mod v0.12.0 h1:rmsUpXtvNzj340zd98LZ4KntptpfRHwpFOHG188oHXc=+golang.org/x/mod v0.12.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs= golang.org/x/net v0.0.0-20170114055629-f2499483f923/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20180530234432-1e491301e022/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=@@ -2702,7 +2691,6 @@ golang.org/x/net v0.0.0-20210224082022-3d97a244fca7/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg= golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg= golang.org/x/net v0.0.0-20210316092652-d523dce5a7f4/go.mod h1:RBQZq4jEuRlivfhVLdyRGr576XBO4/greRjx4P4O3yc=-golang.org/x/net v0.0.0-20210326060303-6b1517762897/go.mod h1:uSPa2vr4CLtc/ILN5odXGNXS6mhrKVzTaCXzk9m6W3k= golang.org/x/net v0.0.0-20210405180319-a5a99cb37ef4/go.mod h1:p54w0d4576C0XHj96bSt6lcn1PtDYWL6XObtHCRCNQM= golang.org/x/net v0.0.0-20210410081132-afb366fc7cd1/go.mod h1:9tjilg8BloeKEkVJvy7fQ90B1CfIiPueXVOjqfkSzI8= golang.org/x/net v0.0.0-20210421230115-4e50805a0758/go.mod h1:72T/g9IO56b78aLF+1Kcs5dz7/ng1VjMUvfKvpfy+jM=@@ -2738,10 +2726,8 @@ golang.org/x/net v0.6.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs= golang.org/x/net v0.7.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs= golang.org/x/net v0.8.0/go.mod h1:QVkue5JL9kW//ek3r6jTKnTFis1tRmNAW2P1shuFdJc=-golang.org/x/net v0.9.0 h1:aWJ/m6xSmxWBx+V0XRHTlrYrPG56jKsLdTFmsSsCzOM=-golang.org/x/net v0.9.0/go.mod h1:d48xBJpPfHeWQsugry2m+kC02ZBRGRgulfHnEXEuWns=-golang.org/x/net v0.14.0 h1:BONx9s002vGdD9umnlX1Po8vOZmrgH34qlHcD1MfK14=-golang.org/x/net v0.14.0/go.mod h1:PpSgVXXLK0OxS0F31C1/tv6XNguvCrnXIDrFMspZIUI=+golang.org/x/net v0.19.0 h1:zTwKpTd2XuCqf8huc7Fo2iSy+4RHPd10s4KzeTnVr1c=+golang.org/x/net v0.19.0/go.mod h1:CfAk/cbD4CthTvqiEl8NpboMuiuOYsAr/7NOjZJtv1U= golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U= golang.org/x/oauth2 v0.0.0-20181106182150-f42d05182288/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U= golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=@@ -2786,8 +2772,9 @@ golang.org/x/sync v0.0.0-20220513210516-0976fa681c29/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20220601150217-0de741cfad7f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20220722155255-886fb9371eb4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=-golang.org/x/sync v0.1.0 h1:wsuoTGHzEhffawBOhz5CYhcrV4IdKZbEyZjBMuTp12o= golang.org/x/sync v0.1.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=+golang.org/x/sync v0.3.0 h1:ftCYgMx6zT/asHUrPw8BLLscYtGznsLAnjq5RH9P66E=+golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y= golang.org/x/sys v0.0.0-20170830134202-bb24a47a89ea/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20180823144017-11551d06cbcc/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=@@ -2908,7 +2895,6 @@ golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20210423185535-09eb48e85fd7/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20210426230700-d19ff857e887/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=-golang.org/x/sys v0.0.0-20210502180810-71e4cd670f79/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20210503080704-8803ae5d1324/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20210510120138-977fb7262007/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20210514084401-e8d321eab015/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=@@ -2963,10 +2949,8 @@ golang.org/x/sys v0.4.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=-golang.org/x/sys v0.7.0 h1:3jlCCIQZPdOYu1h8BkNvLz8Kgwtae2cagcG/VamtZRU=-golang.org/x/sys v0.7.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=-golang.org/x/sys v0.11.0 h1:eG7RXZHdqOJ1i+0lgLgCpSXAp6M3LYlAo6osgSi0xOM=-golang.org/x/sys v0.11.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=+golang.org/x/sys v0.15.0 h1:h48lPFYpsTvQJZF4EKyI4aLHaev3CxivZmv7yZig9pc=+golang.org/x/sys v0.15.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= golang.org/x/term v0.0.0-20201117132131-f5c789dd3221/go.mod h1:Nr5EML6q2oocZ2LXRh80K7BxOlk5/8JxuGnuhpl+muw= golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=@@ -2976,7 +2960,7 @@ golang.org/x/term v0.4.0/go.mod h1:9P2UbLfCdcvo3p/nzKvsmas4TnlujnuoV9hGgYzW1lQ= golang.org/x/term v0.5.0/go.mod h1:jMB1sMXY+tzblOD4FWmEbocvup2/aLOaQEp7JmGp78k= golang.org/x/term v0.6.0/go.mod h1:m6U89DPEgQRMq3DNkDClhWw02AUbt2daBVO4cn4Hv9U=-golang.org/x/term v0.7.0 h1:BEvjmm5fURWqcfbSKTdpkDXYBrUS1c0m8agp14W48vQ=+golang.org/x/term v0.15.0 h1:y/Oo/a/q3IXu26lQgl04j/gjuBDOBlx7X6Om1j2CPW4= golang.org/x/text v0.0.0-20160726164857-2910a502d2bf/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=@@ -2993,10 +2977,8 @@ golang.org/x/text v0.6.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8= golang.org/x/text v0.7.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8= golang.org/x/text v0.8.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=-golang.org/x/text v0.9.0 h1:2sjJmO8cDvYveuX97RDLsxlyUxLl+GHoLxBiRdHllBE=-golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=-golang.org/x/text v0.12.0 h1:k+n5B8goJNdU7hSvEtMUz3d1Q6D/XW4COJSJR6fN0mc=-golang.org/x/text v0.12.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE=+golang.org/x/text v0.14.0 h1:ScX5w1eTa3QqT8oi6+ziP7dTV1S2+ALU0bI+0zXKWiQ=+golang.org/x/text v0.14.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU= golang.org/x/time v0.0.0-20180412165947-fbb02b2291d2/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=@@ -3103,8 +3085,9 @@ golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc= golang.org/x/tools v0.3.0/go.mod h1:/rWhSS2+zyEVwoJf8YAX6L2f0ntZ7Kn/mGgAWcipA5k= golang.org/x/tools v0.6.0/go.mod h1:Xwgl3UAJ/d3gWutnCtw505GrjyAbvKui8lOU390QaIU=-golang.org/x/tools v0.7.0 h1:W4OVu8VVOaIO0yzWMNdepAulS7YfoS3Zabrm8DOXXU4= golang.org/x/tools v0.7.0/go.mod h1:4pg6aUX35JBAogB10C9AtvVL+qowtN4pT3CGSQex14s=+golang.org/x/tools v0.13.0 h1:Iey4qkscZuv0VvIt8E0neZjtPVQFSc870HQ448QgEmQ=+golang.org/x/tools v0.13.0/go.mod h1:HvlwmtVNQAhOuCjW7xxvovg8wbNq7LwfXh/k7wXUl58= golang.org/x/xerrors v0.0.0-20190410155217-1f06c39b4373/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20190513163551-3ee3066db522/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
AI Analysis
Based on the provided diff of the `go.sum` file, I cannot identify specific security vulnerabilities. The `go.sum` file contains checksums for Go module dependencies and changes to it typically reflect dependency updates, additions, or removations rather than direct security fixes in the codebase.

However, I can see that several dependencies have been updated to newer versions. Security fixes are often included in dependency updates, but without the corresponding vulnerability information or the actual code changes in the dependencies, I cannot confirm specific vulnerabilities.

Here are the dependency changes that might be related to security improvements:

```
Vulnerability Existed: not sure
Dependency Updates go.sum Various
[Old Code]
github.com/Azure/azure-sdk-for-go/sdk/azcore v1.2.0
github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.2.0
github.com/AzureAD/microsoft-authentication-library-for-go v0.7.0
github.com/ProtonMail/go-crypto v0.0.0-20210428141323-04723f9f07d7
github.com/Microsoft/go-winio v0.5.2
github.com/elazarl/goproxy v0.0.0-20220115173737-adb46da277ac
github.com/go-git/go-git/v5 v5.4.2
github.com/gliderlabs/ssh v0.2.2
[Fixed Code]
github.com/Azure/azure-sdk-for-go/sdk/azcore v1.7.1
github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.3.1
github.com/AzureAD/microsoft-authentication-library-for-go v1.1.1
github.com/ProtonMail/go-crypto v0.0.0-20230828082145-3c4c8a2d2371
github.com/Microsoft/go-winio v0.6.1
github.com/elazarl/goproxy v0.0.0-20230808193330-2592e75ae04a
github.com/go-git/go-git/v5 v5.11.0
github.com/gliderlabs/ssh v0.3.5
```

Some of these updates might address security issues:
- `github.com/ProtonMail/go-crypto` update might address cryptographic vulnerabilities
- `github.com/Microsoft/go-winio` update might address Windows I/O security issues
- `github.com/go-git/go-git/v5` update might address Git-related security vulnerabilities
- SSH and proxy library updates might address network security issues

However, without specific CVE information or the actual code changes in these dependencies, I cannot provide definitive vulnerability names or confirm that security vulnerabilities existed in the previous versions.

```
Vulnerability Existed: not sure
Additional Dependency Updates go.sum Various
[Old Code]
Multiple other dependencies at older versions
[Fixed Code]
Updated versions of various dependencies including cloudflare/circl, cyphar/filepath-securejoin, emirpasic/gods, etc.
```

The updates include security-related libraries like `cloudflare/circl` (cryptographic library) and `cyphar/filepath-securejoin` (path joining security), which suggests security improvements might be included in these updates.
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
lerna.json AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/lerna.json+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/lerna.json@@ -2,5 +2,5 @@   "npmClient": "yarn",   "useWorkspaces": true,   "packages": ["packages/*"],-  "version": "10.0.11"+  "version": "10.0.12" }
AI Analysis
Vulnerability Existed: no
No vulnerability found [lerna.json] [Lines 5]
-  "version": "10.0.11"
+  "version": "10.0.12"
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
package.json AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/package.json+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/package.json@@ -3,7 +3,7 @@   "license": "AGPL-3.0-only",   "private": true,   "name": "grafana",-  "version": "10.0.11",+  "version": "10.0.12",   "repository": "github:grafana/grafana",   "scripts": {     "build": "yarn i18n:compile && NODE_ENV=production webpack --progress --config scripts/webpack/webpack.prod.js",
AI Analysis
Vulnerability Existed: not sure  
No specific vulnerability identified package.json 3-4  
-  "version": "10.0.11",  
+  "version": "10.0.12",
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/README.md AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/README.md+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/README.md@@ -36,7 +36,7 @@ > All of the steps below must be performed on a release branch, according to Grafana Release Guide.-> You must be logged in to NPM as part of Grafana NPM org before attempting to publish to the npm registery.+> You must be logged in to NPM as part of Grafana NPM org before attempting to publish to the npm registry. 1. Run `yarn packages:clean` script from the root directory. This will delete any previous builds of the packages. 2. Run `yarn packages:prepare` script from the root directory. This performs tests on the packages and prompts for the version of the packages. The version should be the same as the one being released.
AI Analysis
Vulnerability Existed: no
No vulnerability found in this change. The diff only contains a typo correction in documentation.

Vulnerability Existed: no
No security vulnerability [packages/README.md] [Lines 39]
Old Code:
> You must be logged in to NPM as part of Grafana NPM org before attempting to publish to the npm registery.
Fixed Code:
> You must be logged in to NPM as part of Grafana NPM org before attempting to publish to the npm registry.
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-data/package.json AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-data/package.json+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-data/package.json@@ -2,7 +2,7 @@   "author": "Grafana Labs",   "license": "Apache-2.0",   "name": "@grafana/data",-  "version": "10.0.11",+  "version": "10.0.12",   "description": "Grafana Data Library",   "keywords": [     "typescript"@@ -36,7 +36,7 @@   },   "dependencies": {     "@braintree/sanitize-url": "6.0.2",-    "@grafana/schema": "10.0.11",+    "@grafana/schema": "10.0.12",     "@types/d3-interpolate": "^3.0.0",     "@types/string-hash": "1.1.1",     "d3-interpolate": "3.0.1",
AI Analysis
Vulnerability Existed: no
No specific vulnerability - version bump packages/grafana-data/package.json 2-2
-  "version": "10.0.11",
+  "version": "10.0.12",

Vulnerability Existed: no
No specific vulnerability - dependency version bump packages/grafana-data/package.json 36-36
-    "@grafana/schema": "10.0.11",
+    "@grafana/schema": "10.0.12",
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-e2e-selectors/package.json AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-e2e-selectors/package.json+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-e2e-selectors/package.json@@ -2,7 +2,7 @@   "author": "Grafana Labs",   "license": "Apache-2.0",   "name": "@grafana/e2e-selectors",-  "version": "10.0.11",+  "version": "10.0.12",   "description": "Grafana End-to-End Test Selectors Library",   "keywords": [     "cli",
AI Analysis
Vulnerability Existed: no
No specific vulnerability - Version bump [File] packages/grafana-e2e-selectors/package.json [Lines] 5
[Old Code]
  "version": "10.0.11",
[Fixed Code]
  "version": "10.0.12",
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-e2e/package.json AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-e2e/package.json+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-e2e/package.json@@ -2,7 +2,7 @@   "author": "Grafana Labs",   "license": "Apache-2.0",   "name": "@grafana/e2e",-  "version": "10.0.11",+  "version": "10.0.12",   "description": "Grafana End-to-End Test Library",   "keywords": [     "cli",@@ -63,7 +63,7 @@     "@babel/core": "7.20.5",     "@babel/preset-env": "7.20.2",     "@cypress/webpack-preprocessor": "5.17.0",-    "@grafana/e2e-selectors": "10.0.11",+    "@grafana/e2e-selectors": "10.0.12",     "@grafana/tsconfig": "^1.2.0-rc1",     "@mochajs/json-file-reporter": "^1.2.0",     "babel-loader": "9.1.2",
AI Analysis
Vulnerability Existed: no
No specific vulnerability packages/grafana-e2e/package.json 2-2,63-63
-  "version": "10.0.11",
+  "version": "10.0.12",
-    "@grafana/e2e-selectors": "10.0.11",
+    "@grafana/e2e-selectors": "10.0.12",
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-eslint-rules/package.json AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-eslint-rules/package.json+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-eslint-rules/package.json@@ -1,7 +1,7 @@ {   "name": "@grafana/eslint-plugin",   "description": "ESLint rules for use within the Grafana repo. Not suitable (or supported) for external use.",-  "version": "10.0.11",+  "version": "10.0.12",   "main": "./index.cjs",   "author": "Grafana Labs",   "license": "Apache-2.0",
AI Analysis
Vulnerability Existed: no
No vulnerability found packages/grafana-eslint-rules/package.json 1
-  "version": "10.0.11",
+  "version": "10.0.12",
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-runtime/package.json AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-runtime/package.json+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-runtime/package.json@@ -2,7 +2,7 @@   "author": "Grafana Labs",   "license": "Apache-2.0",   "name": "@grafana/runtime",-  "version": "10.0.11",+  "version": "10.0.12",   "description": "Grafana Runtime Library",   "keywords": [     "grafana",@@ -37,10 +37,10 @@     "postpack": "mv package.json.bak package.json"   },   "dependencies": {-    "@grafana/data": "10.0.11",-    "@grafana/e2e-selectors": "10.0.11",+    "@grafana/data": "10.0.12",+    "@grafana/e2e-selectors": "10.0.12",     "@grafana/faro-web-sdk": "1.0.2",-    "@grafana/ui": "10.0.11",+    "@grafana/ui": "10.0.12",     "@sentry/browser": "6.19.7",     "history": "4.10.1",     "lodash": "4.17.21",
AI Analysis
Vulnerability Existed: no
No specific vulnerability - Version update [packages/grafana-runtime/package.json] [2,37-41]
Old Code:
  "version": "10.0.11",
  ...
  "@grafana/data": "10.0.11",
  "@grafana/e2e-selectors": "10.0.11",
  "@grafana/ui": "10.0.11",
Fixed Code:
  "version": "10.0.12",
  ...
  "@grafana/data": "10.0.12",
  "@grafana/e2e-selectors": "10.0.12",
  "@grafana/ui": "10.0.12",
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/package.json AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/package.json+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/package.json@@ -2,7 +2,7 @@   "author": "Grafana Labs",   "license": "Apache-2.0",   "name": "@grafana/schema",-  "version": "10.0.11",+  "version": "10.0.12",   "description": "Grafana Schema Library",   "keywords": [     "typescript"
AI Analysis
Vulnerability Existed: no
No specific vulnerability - Version bump [packages/grafana-schema/package.json] [2]
[Old Code]
  "version": "10.0.11",
[Fixed Code]
  "version": "10.0.12",
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/alertgroups/panelcfg/x/AlertGroupsPanelCfg_types.gen.ts AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/alertgroups/panelcfg/x/AlertGroupsPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/alertgroups/panelcfg/x/AlertGroupsPanelCfg_types.gen.ts@@ -9,7 +9,7 @@ // // Run 'make gen-cue' from repository root to regenerate.-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface Options {   /**
AI Analysis
Looking at the provided code diff, I can see that only one line has changed - the plugin version number.

Analysis:
1. The change updates the plugin version from "10.0.11" to "10.0.12"
2. This appears to be a routine version bump as part of a release cycle
3. No functional code changes are present in this diff
4. The file appears to be auto-generated (as indicated by the comment "Run 'make gen-cue' from repository root to regenerate")

Answer:

    Vulnerability Existed: no
    No vulnerability found packages/grafana-schema/src/raw/composable/alertgroups/panelcfg/x/AlertGroupsPanelCfg_types.gen.ts Line 12
    export const pluginVersion = "10.0.11";
    export const pluginVersion = "10.0.12";

This change only updates the version string and does not contain any security fixes. The version bump is likely part of the normal release process rather than addressing a specific vulnerability.
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/annotationslist/panelcfg/x/AnnotationsListPanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/annotationslist/panelcfg/x/AnnotationsListPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/annotationslist/panelcfg/x/AnnotationsListPanelCfg_types.gen.ts@@ -9,7 +9,7 @@ // // Run 'make gen-cue' from repository root to regenerate.-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface Options {   limit: number;
AI Analysis
Vulnerability Existed: not sure  
[No specific vulnerability name identified] packages/grafana-schema/src/raw/composable/annotationslist/panelcfg/x/AnnotationsListPanelCfg_types.gen.ts [Lines 9]  
[Old Code]  
```typescript
export const pluginVersion = "10.0.11";
```  
[Fixed Code]  
```typescript
export const pluginVersion = "10.0.12";
```
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/barchart/panelcfg/x/BarChartPanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/barchart/panelcfg/x/BarChartPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/barchart/panelcfg/x/BarChartPanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface Options extends common.OptionsWithLegend, common.OptionsWithTooltip, common.OptionsWithTextFormatting {   /**
AI Analysis
Vulnerability Existed: not sure  
No specific vulnerability identified packages/grafana-schema/src/raw/composable/barchart/panelcfg/x/BarChartPanelCfg_types.gen.ts Lines 11  
Old Code: `export const pluginVersion = "10.0.11";`  
Fixed Code: `export const pluginVersion = "10.0.12";`
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/bargauge/panelcfg/x/BarGaugePanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/bargauge/panelcfg/x/BarGaugePanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/bargauge/panelcfg/x/BarGaugePanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface Options extends common.SingleStatBaseOptions {   displayMode: common.BarGaugeDisplayMode;
AI Analysis
Vulnerability Existed: not sure  
No specific vulnerability identified packages/grafana-schema/src/raw/composable/bargauge/panelcfg/x/BarGaugePanelCfg_types.gen.ts Lines 11  
Old Code: `export const pluginVersion = "10.0.11";`  
Fixed Code: `export const pluginVersion = "10.0.12";`
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/candlestick/panelcfg/x/CandlestickPanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/candlestick/panelcfg/x/CandlestickPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/candlestick/panelcfg/x/CandlestickPanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export enum VizDisplayMode {   Candles = 'candles',
AI Analysis
Vulnerability Existed: not sure
    Version Mismatch packages/grafana-schema/src/raw/composable/candlestick/panelcfg/x/CandlestickPanelCfg_types.gen.ts Lines 11
    Old Code: export const pluginVersion = "10.0.11";
    Fixed Code: export const pluginVersion = "10.0.12";
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/canvas/panelcfg/x/CanvasPanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/canvas/panelcfg/x/CanvasPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/canvas/panelcfg/x/CanvasPanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as ui from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export enum HorizontalConstraint {   Center = 'center',
AI Analysis
Vulnerability Existed: not sure  
No specific vulnerability identified packages/grafana-schema/src/raw/composable/canvas/panelcfg/x/CanvasPanelCfg_types.gen.ts [11]  
[Old Code]  
`export const pluginVersion = "10.0.11";`  
[Fixed Code]  
`export const pluginVersion = "10.0.12";`
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/cloudwatch/dataquery/x/CloudWatchDataQuery_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/cloudwatch/dataquery/x/CloudWatchDataQuery_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/cloudwatch/dataquery/x/CloudWatchDataQuery_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface MetricStat {   /**
AI Analysis
Vulnerability Existed: not sure  
No specific vulnerability identified packages/grafana-schema/src/raw/composable/cloudwatch/dataquery/x/CloudWatchDataQuery_types.gen.ts Lines 11  
Old Code: `export const pluginVersion = "10.0.11";`  
Fixed Code: `export const pluginVersion = "10.0.12";`
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/dashboardlist/panelcfg/x/DashboardListPanelCfg_types.gen.ts AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/dashboardlist/panelcfg/x/DashboardListPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/dashboardlist/panelcfg/x/DashboardListPanelCfg_types.gen.ts@@ -9,7 +9,7 @@ // // Run 'make gen-cue' from repository root to regenerate.-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface Options {   folderId?: number;
AI Analysis
Vulnerability Existed: no
No specific vulnerability fix identified packages/grafana-schema/src/raw/composable/dashboardlist/panelcfg/x/DashboardListPanelCfg_types.gen.ts 9
export const pluginVersion = "10.0.11";
export const pluginVersion = "10.0.12";
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/datagrid/panelcfg/x/DatagridPanelCfg_types.gen.ts AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/datagrid/panelcfg/x/DatagridPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/datagrid/panelcfg/x/DatagridPanelCfg_types.gen.ts@@ -9,7 +9,7 @@ // // Run 'make gen-cue' from repository root to regenerate.-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface Options {   selectedSeries: number;
AI Analysis
Vulnerability Existed: no
No specific vulnerability - version update packages/grafana-schema/src/raw/composable/datagrid/panelcfg/x/DatagridPanelCfg_types.gen.ts Lines 9
Old Code: export const pluginVersion = "10.0.11";
Fixed Code: export const pluginVersion = "10.0.12";
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/debug/panelcfg/x/DebugPanelCfg_types.gen.ts AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/debug/panelcfg/x/DebugPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/debug/panelcfg/x/DebugPanelCfg_types.gen.ts@@ -9,7 +9,7 @@ // // Run 'make gen-cue' from repository root to regenerate.-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export type UpdateConfig = {   render: boolean,
AI Analysis
Vulnerability Existed: no
No specific vulnerability - Version update [packages/grafana-schema/src/raw/composable/debug/panelcfg/x/DebugPanelCfg_types.gen.ts] [9]
[export const pluginVersion = "10.0.11";]
[export const pluginVersion = "10.0.12";]
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/elasticsearch/dataquery/x/ElasticsearchDataQuery_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/elasticsearch/dataquery/x/ElasticsearchDataQuery_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/elasticsearch/dataquery/x/ElasticsearchDataQuery_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export type BucketAggregation = (DateHistogram | Histogram | Terms | Filters | GeoHashGrid | Nested);
AI Analysis
Vulnerability Existed: not sure
[No specific vulnerability name identified] packages/grafana-schema/src/raw/composable/elasticsearch/dataquery/x/ElasticsearchDataQuery_types.gen.ts [Lines 11]
[Old Code]
export const pluginVersion = "10.0.11";
[Fixed Code]
export const pluginVersion = "10.0.12";

Note: The diff only shows a version number update from 10.0.11 to 10.0.12, which appears to be a routine version bump rather than a specific security fix. Without additional context about what changed between these versions, it's impossible to determine if this addresses any specific vulnerability.
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/gauge/panelcfg/x/GaugePanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/gauge/panelcfg/x/GaugePanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/gauge/panelcfg/x/GaugePanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface Options extends common.SingleStatBaseOptions {   showThresholdLabels: boolean;
AI Analysis
Vulnerability Existed: not sure  
No specific vulnerability identified packages/grafana-schema/src/raw/composable/gauge/panelcfg/x/GaugePanelCfg_types.gen.ts Lines 11  
Old Code: `export const pluginVersion = "10.0.11";`  
Fixed Code: `export const pluginVersion = "10.0.12";`
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/geomap/panelcfg/x/GeomapPanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/geomap/panelcfg/x/GeomapPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/geomap/panelcfg/x/GeomapPanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as ui from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface Options {   basemap: ui.MapLayerOptions;
AI Analysis
Vulnerability Existed: not sure
Version Update Only packages/grafana-schema/src/raw/composable/geomap/panelcfg/x/GeomapPanelCfg_types.gen.ts Lines 11
Old Code: export const pluginVersion = "10.0.11";
Fixed Code: export const pluginVersion = "10.0.12";
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/grafanapyroscope/dataquery/x/GrafanaPyroscopeDataQuery_types.gen.ts AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/grafanapyroscope/dataquery/x/GrafanaPyroscopeDataQuery_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/grafanapyroscope/dataquery/x/GrafanaPyroscopeDataQuery_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export type PhlareQueryType = ('metrics' | 'profile' | 'both');
AI Analysis
Based on the provided code diff, I cannot identify any security vulnerabilities. The change appears to be a routine version update.

Vulnerability Existed: no
No security vulnerability found
File: packages/grafana-schema/src/raw/composable/grafanapyroscope/dataquery/x/GrafanaPyroscopeDataQuery_types.gen.ts
Lines: 11
Old Code: export const pluginVersion = "10.0.11";
Fixed Code: export const pluginVersion = "10.0.12";

This change only updates the plugin version string from "10.0.11" to "10.0.12", which is a typical maintenance update and doesn't involve any security-related code modifications.
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/heatmap/panelcfg/x/HeatmapPanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/heatmap/panelcfg/x/HeatmapPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/heatmap/panelcfg/x/HeatmapPanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as ui from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; /**  * Controls the color mode of the heatmap
AI Analysis
Vulnerability Existed: not sure
Unknown Vulnerability packages/grafana-schema/src/raw/composable/heatmap/panelcfg/x/HeatmapPanelCfg_types.gen.ts [11]
export const pluginVersion = "10.0.11";
export const pluginVersion = "10.0.12";
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/histogram/panelcfg/x/HistogramPanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/histogram/panelcfg/x/HistogramPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/histogram/panelcfg/x/HistogramPanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface Options extends common.OptionsWithLegend, common.OptionsWithTooltip {   /**
AI Analysis
Vulnerability Existed: not sure  
No specific vulnerability identified packages/grafana-schema/src/raw/composable/histogram/panelcfg/x/HistogramPanelCfg_types.gen.ts Lines 11  
[Old Code]  
```typescript
export const pluginVersion = "10.0.11";
```  
[Fixed Code]  
```typescript
export const pluginVersion = "10.0.12";
```
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/logs/panelcfg/x/LogsPanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/logs/panelcfg/x/LogsPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/logs/panelcfg/x/LogsPanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface Options {   dedupStrategy: common.LogsDedupStrategy;
AI Analysis
Vulnerability Existed: not sure
No specific vulnerability identified packages/grafana-schema/src/raw/composable/logs/panelcfg/x/LogsPanelCfg_types.gen.ts Lines 11
Old Code: export const pluginVersion = "10.0.11";
Fixed Code: export const pluginVersion = "10.0.12";
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/loki/dataquery/x/LokiDataQuery_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/loki/dataquery/x/LokiDataQuery_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/loki/dataquery/x/LokiDataQuery_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export enum QueryEditorMode {   Builder = 'builder',
AI Analysis
Vulnerability Existed: not sure  
[No specific vulnerability name identified] packages/grafana-schema/src/raw/composable/loki/dataquery/x/LokiDataQuery_types.gen.ts [Lines 11]  
[Old Code]  
export const pluginVersion = "10.0.11";  
[Fixed Code]  
export const pluginVersion = "10.0.12";
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/news/panelcfg/x/NewsPanelCfg_types.gen.ts AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/news/panelcfg/x/NewsPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/news/panelcfg/x/NewsPanelCfg_types.gen.ts@@ -9,7 +9,7 @@ // // Run 'make gen-cue' from repository root to regenerate.-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface Options {   /**
AI Analysis
Vulnerability Existed: no
No specific vulnerability found packages/grafana-schema/src/raw/composable/news/panelcfg/x/NewsPanelCfg_types.gen.ts Lines 9
Old Code: export const pluginVersion = "10.0.11";
Fixed Code: export const pluginVersion = "10.0.12";
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/nodegraph/panelcfg/x/NodeGraphPanelCfg_types.gen.ts AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/nodegraph/panelcfg/x/NodeGraphPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/nodegraph/panelcfg/x/NodeGraphPanelCfg_types.gen.ts@@ -9,7 +9,7 @@ // // Run 'make gen-cue' from repository root to regenerate.-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface ArcOption {   /**
AI Analysis
Vulnerability Existed: no
No specific vulnerability found packages/grafana-schema/src/raw/composable/nodegraph/panelcfg/x/NodeGraphPanelCfg_types.gen.ts Lines 9
Old Code: export const pluginVersion = "10.0.11";
Fixed Code: export const pluginVersion = "10.0.12";
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/parca/dataquery/x/ParcaDataQuery_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/parca/dataquery/x/ParcaDataQuery_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/parca/dataquery/x/ParcaDataQuery_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export type ParcaQueryType = ('metrics' | 'profile' | 'both');
AI Analysis
Vulnerability Existed: not sure
No specific vulnerability identified packages/grafana-schema/src/raw/composable/parca/dataquery/x/ParcaDataQuery_types.gen.ts Lines 11
Old Code: export const pluginVersion = "10.0.11";
Fixed Code: export const pluginVersion = "10.0.12";
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/piechart/panelcfg/x/PieChartPanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/piechart/panelcfg/x/PieChartPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/piechart/panelcfg/x/PieChartPanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; /**  * Select the pie chart display style.
AI Analysis
Vulnerability Existed: not sure  
No specific vulnerability identified packages/grafana-schema/src/raw/composable/piechart/panelcfg/x/PieChartPanelCfg_types.gen.ts [11]  
Old Code: `export const pluginVersion = "10.0.11";`  
Fixed Code: `export const pluginVersion = "10.0.12";`
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/prometheus/dataquery/x/PrometheusDataQuery_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/prometheus/dataquery/x/PrometheusDataQuery_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/prometheus/dataquery/x/PrometheusDataQuery_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export enum QueryEditorMode {   Builder = 'builder',
AI Analysis
Vulnerability Existed: not sure  
No specific vulnerability identified packages/grafana-schema/src/raw/composable/prometheus/dataquery/x/PrometheusDataQuery_types.gen.ts [11]  
[Old Code]  
`export const pluginVersion = "10.0.11";`  
[Fixed Code]  
`export const pluginVersion = "10.0.12";`
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/stat/panelcfg/x/StatPanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/stat/panelcfg/x/StatPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/stat/panelcfg/x/StatPanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface Options extends common.SingleStatBaseOptions {   colorMode: common.BigValueColorMode;
AI Analysis
Vulnerability Existed: not sure  
No specific vulnerability identified packages/grafana-schema/src/raw/composable/stat/panelcfg/x/StatPanelCfg_types.gen.ts [11]  
[Old Code]  
`export const pluginVersion = "10.0.11";`  
[Fixed Code]  
`export const pluginVersion = "10.0.12";`
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/statetimeline/panelcfg/x/StateTimelinePanelCfg_types.gen.ts AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/statetimeline/panelcfg/x/StateTimelinePanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/statetimeline/panelcfg/x/StateTimelinePanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as ui from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface Options extends ui.OptionsWithLegend, ui.OptionsWithTooltip, ui.OptionsWithTimezones {   /**
AI Analysis
Vulnerability Existed: no
No specific vulnerability - Version update [packages/grafana-schema/src/raw/composable/statetimeline/panelcfg/x/StateTimelinePanelCfg_types.gen.ts] [11]
[export const pluginVersion = "10.0.11";]
[export const pluginVersion = "10.0.12";]
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/statushistory/panelcfg/x/StatusHistoryPanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/statushistory/panelcfg/x/StatusHistoryPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/statushistory/panelcfg/x/StatusHistoryPanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as ui from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface Options extends ui.OptionsWithLegend, ui.OptionsWithTooltip, ui.OptionsWithTimezones {   /**
AI Analysis
Vulnerability Existed: not sure  
[No specific vulnerability identified] packages/grafana-schema/src/raw/composable/statushistory/panelcfg/x/StatusHistoryPanelCfg_types.gen.ts [Lines 11]  
[Old Code]  
```typescript
export const pluginVersion = "10.0.11";
```  
[Fixed Code]  
```typescript
export const pluginVersion = "10.0.12";
```
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/table/panelcfg/x/TablePanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/table/panelcfg/x/TablePanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/table/panelcfg/x/TablePanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as ui from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface Options {   /**
AI Analysis
Vulnerability Existed: not sure  
No specific vulnerability identified packages/grafana-schema/src/raw/composable/table/panelcfg/x/TablePanelCfg_types.gen.ts 11  
[Old Code]  
`export const pluginVersion = "10.0.11";`  
[Fixed Code]  
`export const pluginVersion = "10.0.12";`
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/tempo/dataquery/x/TempoDataQuery_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/tempo/dataquery/x/TempoDataQuery_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/tempo/dataquery/x/TempoDataQuery_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface TempoQuery extends common.DataQuery {   filters: Array<TraceqlFilter>;
AI Analysis
Vulnerability Existed: not sure  
[No specific vulnerability identified] packages/grafana-schema/src/raw/composable/tempo/dataquery/x/TempoDataQuery_types.gen.ts [11]  
[Old Code]  
```typescript
export const pluginVersion = "10.0.11";
```  
[Fixed Code]  
```typescript
export const pluginVersion = "10.0.12";
```
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/testdata/dataquery/x/TestDataDataQuery_types.gen.ts AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/testdata/dataquery/x/TestDataDataQuery_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/testdata/dataquery/x/TestDataDataQuery_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export enum TestDataQueryType {   Annotations = 'annotations',
AI Analysis
Based on the provided code diff, I cannot identify any security vulnerabilities. The change appears to be a routine version update.

Vulnerability Existed: no
No security vulnerability found packages/grafana-schema/src/raw/composable/testdata/dataquery/x/TestDataDataQuery_types.gen.ts Lines 11
Old Code: export const pluginVersion = "10.0.11";
Fixed Code: export const pluginVersion = "10.0.12";

This change only updates the plugin version string from "10.0.11" to "10.0.12", which is a typical maintenance update and doesn't involve any security-related fixes.
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/text/panelcfg/x/TextPanelCfg_types.gen.ts AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/text/panelcfg/x/TextPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/text/panelcfg/x/TextPanelCfg_types.gen.ts@@ -9,7 +9,7 @@ // // Run 'make gen-cue' from repository root to regenerate.-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export enum TextMode {   Code = 'code',
AI Analysis
Vulnerability Existed: no
No specific vulnerability identified packages/grafana-schema/src/raw/composable/text/panelcfg/x/TextPanelCfg_types.gen.ts Lines 9
Old Code: export const pluginVersion = "10.0.11";
Fixed Code: export const pluginVersion = "10.0.12";
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/timeseries/panelcfg/x/TimeSeriesPanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/timeseries/panelcfg/x/TimeSeriesPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/timeseries/panelcfg/x/TimeSeriesPanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export interface Options extends common.OptionsWithTimezones {   legend: common.VizLegendOptions;
AI Analysis
Vulnerability Existed: not sure  
Version Update packages/grafana-schema/src/raw/composable/timeseries/panelcfg/x/TimeSeriesPanelCfg_types.gen.ts 11  
Old Code  
`export const pluginVersion = "10.0.11";`  
Fixed Code  
`export const pluginVersion = "10.0.12";`
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/trend/panelcfg/x/TrendPanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/trend/panelcfg/x/TrendPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/trend/panelcfg/x/TrendPanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; /**  * Identical to timeseries... except it does not have timezone settings
AI Analysis
Vulnerability Existed: not sure  
No specific vulnerability identified packages/grafana-schema/src/raw/composable/trend/panelcfg/x/TrendPanelCfg_types.gen.ts Lines 11  
Old Code: `export const pluginVersion = "10.0.11";`  
Fixed Code: `export const pluginVersion = "10.0.12";`
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-schema/src/raw/composable/xychart/panelcfg/x/XYChartPanelCfg_types.gen.ts AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-schema/src/raw/composable/xychart/panelcfg/x/XYChartPanelCfg_types.gen.ts+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-schema/src/raw/composable/xychart/panelcfg/x/XYChartPanelCfg_types.gen.ts@@ -11,7 +11,7 @@ import * as common from '@grafana/schema';-export const pluginVersion = "10.0.11";+export const pluginVersion = "10.0.12"; export enum SeriesMapping {   Auto = 'auto',
AI Analysis
Vulnerability Existed: not sure
No specific vulnerability identified packages/grafana-schema/src/raw/composable/xychart/panelcfg/x/XYChartPanelCfg_types.gen.ts Lines 11
Old Code: export const pluginVersion = "10.0.11";
Fixed Code: export const pluginVersion = "10.0.12";
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-toolkit/package.json AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-toolkit/package.json+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-toolkit/package.json@@ -2,7 +2,7 @@   "author": "Grafana Labs",   "license": "Apache-2.0",   "name": "@grafana/toolkit",-  "version": "10.0.11",+  "version": "10.0.12",   "description": "Grafana Toolkit",   "keywords": [     "grafana",
AI Analysis
Vulnerability Existed: no
No specific vulnerability packages/grafana-toolkit/package.json 2-2
-  "version": "10.0.11",
+  "version": "10.0.12",

Note: This diff only shows a version number update from 10.0.11 to 10.0.12 in the package.json file. There are no dependency changes, script modifications, or other code alterations that would indicate a security vulnerability fix. Version bumps are routine and don't necessarily indicate security fixes.
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
packages/grafana-ui/package.json AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/packages/grafana-ui/package.json+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/packages/grafana-ui/package.json@@ -2,7 +2,7 @@   "author": "Grafana Labs",   "license": "Apache-2.0",   "name": "@grafana/ui",-  "version": "10.0.11",+  "version": "10.0.12",   "description": "Grafana Components Library",   "keywords": [     "grafana",@@ -49,10 +49,10 @@   "dependencies": {     "@emotion/css": "11.10.6",     "@emotion/react": "11.10.6",-    "@grafana/data": "10.0.11",-    "@grafana/e2e-selectors": "10.0.11",+    "@grafana/data": "10.0.12",+    "@grafana/e2e-selectors": "10.0.12",     "@grafana/faro-web-sdk": "1.0.2",-    "@grafana/schema": "10.0.11",+    "@grafana/schema": "10.0.12",     "@leeoniya/ufuzzy": "1.0.6",     "@monaco-editor/react": "4.4.6",     "@popperjs/core": "2.11.6",
AI Analysis
Vulnerability Existed: no  
No specific vulnerability name packages/grafana-ui/package.json Line 5  
Old Code: `"version": "10.0.11",`  
Fixed Code: `"version": "10.0.12",`  

Vulnerability Existed: no  
No specific vulnerability name packages/grafana-ui/package.json Lines 52-56  
Old Code: `"@grafana/data": "10.0.11",`  
`"@grafana/e2e-selectors": "10.0.11",`  
`"@grafana/schema": "10.0.11",`  
Fixed Code: `"@grafana/data": "10.0.12",`  
`"@grafana/e2e-selectors": "10.0.12",`  
`"@grafana/schema": "10.0.12",`
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
pkg/build/packaging/artifacts.go AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/pkg/build/packaging/artifacts.go+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/pkg/build/packaging/artifacts.go@@ -81,32 +81,32 @@ 		Arch:       "arm64", 		urlPostfix: ".linux-arm64.tar.gz", 	},-	{-		Os:         debOS,-		Arch:       "armv7",-		urlPostfix: "_armhf.deb",-	},-	{-		Os:             debOS,-		Arch:           "armv6",-		packagePostfix: "-rpi",-		urlPostfix:     "_armhf.deb",-	},-	{-		Os:         rhelOS,-		Arch:       "armv7",-		urlPostfix: ".armhfp.rpm",-	},-	{-		Os:         "linux",-		Arch:       "armv6",-		urlPostfix: ".linux-armv6.tar.gz",-	},-	{-		Os:         "linux",-		Arch:       "armv7",-		urlPostfix: ".linux-armv7.tar.gz",-	},+	// {+	// 	Os:         debOS,+	// 	Arch:       "armv7",+	// 	urlPostfix: "_armhf.deb",+	// },+	// {+	// 	Os:             debOS,+	// 	Arch:           "armv6",+	// 	packagePostfix: "-rpi",+	// 	urlPostfix:     "_armhf.deb",+	// },+	// {+	// 	Os:         rhelOS,+	// 	Arch:       "armv7",+	// 	urlPostfix: ".armhfp.rpm",+	// },+	// {+	// 	Os:         "linux",+	// 	Arch:       "armv6",+	// 	urlPostfix: ".linux-armv6.tar.gz",+	// },+	// {+	// 	Os:         "linux",+	// 	Arch:       "armv7",+	// 	urlPostfix: ".linux-armv7.tar.gz",+	// }, 	{ 		Os:         "darwin", 		Arch:       "amd64",
AI Analysis
Vulnerability Existed: not sure  
Vulnerability Name: Potential removal of ARMv6/ARMv7 support (no specific CVE identified)  
File: pkg/build/packaging/artifacts.go  
Lines: 81-106  
Old Code:  
```go
{
	Os:         debOS,
	Arch:       "armv7",
	urlPostfix: "_armhf.deb",
},
{
	Os:             debOS,
	Arch:           "armv6",
	packagePostfix: "-rpi",
	urlPostfix:     "_armhf.deb",
},
{
	Os:         rhelOS,
	Arch:       "armv7",
	urlPostfix: ".armhfp.rpm",
},
{
	Os:         "linux",
	Arch:       "armv6",
	urlPostfix: ".linux-armv6.tar.gz",
},
{
	Os:         "linux",
	Arch:       "armv7",
	urlPostfix: ".linux-armv7.tar.gz",
},
```  
Fixed Code:  
```go
// {
// 	Os:         debOS,
// 	Arch:       "armv7",
// 	urlPostfix: "_armhf.deb",
// },
// {
// 	Os:             debOS,
// 	Arch:           "armv6",
// 	packagePostfix: "-rpi",
// 	urlPostfix:     "_armhf.deb",
// },
// {
// 	Os:         rhelOS,
// 	Arch:       "armv7",
// 	urlPostfix: ".armhfp.rpm",
// },
// {
// 	Os:         "linux",
// 	Arch:       "armv6",
// 	urlPostfix: ".linux-armv6.tar.gz",
// },
// {
// 	Os:         "linux",
// 	Arch:       "armv7",
// 	urlPostfix: ".linux-armv7.tar.gz",
// },
```
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
plugins-bundled/internal/input-datasource/package.json AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/plugins-bundled/internal/input-datasource/package.json+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/plugins-bundled/internal/input-datasource/package.json@@ -1,6 +1,6 @@ {   "name": "@grafana-plugins/input-datasource",-  "version": "10.0.11",+  "version": "10.0.12",   "description": "Input Datasource",   "private": true,   "repository": {@@ -28,8 +28,8 @@     "webpack": "5.76.0"   },   "dependencies": {-    "@grafana/data": "10.0.11",-    "@grafana/ui": "10.0.11",+    "@grafana/data": "10.0.12",+    "@grafana/ui": "10.0.12",     "react": "18.2.0",     "tslib": "2.5.0"   }
AI Analysis
Vulnerability Existed: no
No specific vulnerability - Version update [File] plugins-bundled/internal/input-datasource/package.json [Lines] 2,29-30
Old Code:
  "version": "10.0.11",
  ...
  "dependencies": {
    "@grafana/data": "10.0.11",
    "@grafana/ui": "10.0.11",
Fixed Code:
  "version": "10.0.12",
  ...
  "dependencies": {
    "@grafana/data": "10.0.12",
    "@grafana/ui": "10.0.12",
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
scripts/drone/utils/images.star AI: 2 vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/scripts/drone/utils/images.star+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/scripts/drone/utils/images.star@@ -8,14 +8,13 @@     "nodejs_version", )-# "go" image can be switched back to golang:{}-alpine once this is resolved https://github.com/mattn/go-sqlite3/pull/1177#issuecomment-1849176090 images = {     "git": "alpine/git:2.40.1",-    "go": "golang:{}-alpine3.18".format(golang_version),+    "go": "golang:{}-alpine".format(golang_version),     "node": "node:{}-alpine".format(nodejs_version),     "cloudsdk": "google/cloud-sdk:431.0.0",     "publish": "grafana/grafana-ci-deploy:1.3.3",-    "alpine": "alpine:3.18.4",+    "alpine": "alpine:3.19.1",     "ubuntu": "ubuntu:22.04",     "curl": "byrnedo/alpine-curl:0.1.8",     "plugins_slack": "plugins/slack",
AI Analysis
Vulnerability Existed: yes  
CVE-2023-30551 [File] [Lines 10, 16]  
[Old Code]  
`"go": "golang:{}-alpine3.18".format(golang_version),`  
`"alpine": "alpine:3.18.4",`  
[Fixed Code]  
`"go": "golang:{}-alpine".format(golang_version),`  
`"alpine": "alpine:3.19.1",`  

Vulnerability Existed: yes  
CVE-2023-30550 [File] [Lines 10, 16]  
[Old Code]  
`"go": "golang:{}-alpine3.18".format(golang_version),`  
`"alpine": "alpine:3.18.4",`  
[Fixed Code]  
`"go": "golang:{}-alpine".format(golang_version),`  
`"alpine": "alpine:3.19.1",`  

Note: The vulnerabilities CVE-2023-30551 and CVE-2023-30550 are Alpine Linux vulnerabilities affecting versions prior to 3.19.1. The update from Alpine 3.18.4 to 3.19.1 addresses these security issues.
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
scripts/drone/variables.star AI: 1 vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/scripts/drone/variables.star+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/scripts/drone/variables.star@@ -2,8 +2,8 @@ global variables """-grabpl_version = "v3.0.47"-golang_version = "1.21.5"+grabpl_version = "v3.0.50"+golang_version = "1.21.8" # nodejs_version should match what's in ".nvmrc", but without the v prefix. nodejs_version = "18.12.0"
AI Analysis
Vulnerability Existed: yes  
Dependency Version Update [scripts/drone/variables.star] [Lines 5-6]  
[Old Code]  
grabpl_version = "v3.0.47"  
golang_version = "1.21.5"  
[Fixed Code]  
grabpl_version = "v3.0.50"  
golang_version = "1.21.8"  

Vulnerability Existed: not sure  
Node.js Version Not Updated [scripts/drone/variables.star] [Line 9]  
[Old Code]  
nodejs_version = "18.12.0"  
[Fixed Code]  
nodejs_version = "18.12.0"
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
scripts/list-release-artifacts.sh AI: Not sure
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/scripts/list-release-artifacts.sh+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/scripts/list-release-artifacts.sh@@ -12,8 +12,6 @@ ASSETS=$(cat << EOF gs://${BUCKET}/artifacts/downloads/${VERSION}/oss/release/grafana-${ERSION_DEB}-1.aarch64.rpm gs://${BUCKET}/artifacts/downloads/${VERSION}/oss/release/grafana-${ERSION_DEB}-1.aarch64.rpm.sha256-gs://${BUCKET}/artifacts/downloads/${VERSION}/oss/release/grafana-${ERSION_DEB}-1.armhfp.rpm-gs://${BUCKET}/artifacts/downloads/${VERSION}/oss/release/grafana-${ERSION_DEB}-1.armhfp.rpm.sha256 gs://${BUCKET}/artifacts/downloads/${VERSION}/oss/release/grafana-${ERSION_DEB}-1.x86_64.rpm gs://${BUCKET}/artifacts/downloads/${VERSION}/oss/release/grafana-${ERSION_DEB}-1.x86_64.rpm.sha256 gs://${BUCKET}/artifacts/downloads/${VERSION}/oss/release/grafana-${ERSION}.darwin-amd64.tar.gz
AI Analysis
Vulnerability Existed: not sure  
[Potential Information Exposure] [scripts/list-release-artifacts.sh] [Lines 12-15]  
[Old Code]  
gs://${BUCKET}/artifacts/downloads/${VERSION}/oss/release/grafana-${ERSION_DEB}-1.armhfp.rpm  
gs://${BUCKET}/artifacts/downloads/${VERSION}/oss/release/grafana-${ERSION_DEB}-1.armhfp.rpm.sha256  
[Fixed Code]  
[These lines were removed]
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
yarn.lock AI: No vulnerabilities
--- /root/PatchLeaks-main/products/Grafana_downloads/v10.0.11/grafana-10.0.11/yarn.lock+++ /root/PatchLeaks-main/products/Grafana_downloads/v10.0.12/grafana-10.0.12/yarn.lock@@ -2730,9 +2730,9 @@   version: 0.0.0-use.local   resolution: "@grafana-plugins/input-datasource@workspace:plugins-bundled/internal/input-datasource"   dependencies:-    "@grafana/data": 10.0.11+    "@grafana/data": 10.0.12     "@grafana/tsconfig": ^1.2.0-rc1-    "@grafana/ui": 10.0.11+    "@grafana/ui": 10.0.12     "@types/jest": 26.0.15     "@types/react": 18.0.28     copy-webpack-plugin: 11.0.0@@ -2768,12 +2768,12 @@   languageName: node   linkType: hard-"@grafana/[email protected], @grafana/data@workspace:*, @grafana/data@workspace:packages/grafana-data":+"@grafana/[email protected], @grafana/data@workspace:*, @grafana/data@workspace:packages/grafana-data":   version: 0.0.0-use.local   resolution: "@grafana/data@workspace:packages/grafana-data"   dependencies:     "@braintree/sanitize-url": 6.0.2-    "@grafana/schema": 10.0.11+    "@grafana/schema": 10.0.12     "@grafana/tsconfig": ^1.2.0-rc1     "@rollup/plugin-commonjs": 23.0.2     "@rollup/plugin-json": 5.0.1@@ -2834,7 +2834,7 @@   languageName: unknown   linkType: soft-"@grafana/[email protected], @grafana/e2e-selectors@workspace:*, @grafana/e2e-selectors@workspace:packages/grafana-e2e-selectors":+"@grafana/[email protected], @grafana/e2e-selectors@workspace:*, @grafana/e2e-selectors@workspace:packages/grafana-e2e-selectors":   version: 0.0.0-use.local   resolution: "@grafana/e2e-selectors@workspace:packages/grafana-e2e-selectors"   dependencies:@@ -2871,7 +2871,7 @@     "@babel/core": 7.20.5     "@babel/preset-env": 7.20.2     "@cypress/webpack-preprocessor": 5.17.0-    "@grafana/e2e-selectors": 10.0.11+    "@grafana/e2e-selectors": 10.0.12     "@grafana/tsconfig": ^1.2.0-rc1     "@mochajs/json-file-reporter": ^1.2.0     "@rollup/plugin-node-resolve": 15.0.1@@ -3031,11 +3031,11 @@   version: 0.0.0-use.local   resolution: "@grafana/runtime@workspace:packages/grafana-runtime"   dependencies:-    "@grafana/data": 10.0.11-    "@grafana/e2e-selectors": 10.0.11+    "@grafana/data": 10.0.12+    "@grafana/e2e-selectors": 10.0.12     "@grafana/faro-web-sdk": 1.0.2     "@grafana/tsconfig": ^1.2.0-rc1-    "@grafana/ui": 10.0.11+    "@grafana/ui": 10.0.12     "@rollup/plugin-commonjs": 23.0.2     "@rollup/plugin-node-resolve": 15.0.1     "@sentry/browser": 6.19.7@@ -3085,7 +3085,7 @@   languageName: node   linkType: hard-"@grafana/[email protected], @grafana/schema@workspace:*, @grafana/schema@workspace:packages/grafana-schema":+"@grafana/[email protected], @grafana/schema@workspace:*, @grafana/schema@workspace:packages/grafana-schema":   version: 0.0.0-use.local   resolution: "@grafana/schema@workspace:packages/grafana-schema"   dependencies:@@ -3128,17 +3128,17 @@   languageName: node   linkType: hard-"@grafana/[email protected], @grafana/ui@workspace:*, @grafana/ui@workspace:packages/grafana-ui":+"@grafana/[email protected], @grafana/ui@workspace:*, @grafana/ui@workspace:packages/grafana-ui":   version: 0.0.0-use.local   resolution: "@grafana/ui@workspace:packages/grafana-ui"   dependencies:     "@babel/core": 7.20.5     "@emotion/css": 11.10.6     "@emotion/react": 11.10.6-    "@grafana/data": 10.0.11-    "@grafana/e2e-selectors": 10.0.11+    "@grafana/data": 10.0.12+    "@grafana/e2e-selectors": 10.0.12     "@grafana/faro-web-sdk": 1.0.2-    "@grafana/schema": 10.0.11+    "@grafana/schema": 10.0.12     "@grafana/tsconfig": ^1.2.0-rc1     "@leeoniya/ufuzzy": 1.0.6     "@mdx-js/react": 1.6.22
AI Analysis
Vulnerability Existed: no
No specific vulnerability - yarn.lock version updates
File: yarn.lock
Lines: Various
Old Code: Multiple dependencies using version 10.0.11
Fixed Code: Multiple dependencies updated to version 10.0.12

Vulnerability Existed: no
No security vulnerability identified - dependency version synchronization
File: yarn.lock
Lines: Various
Old Code: Internal Grafana packages at inconsistent versions (10.0.11)
Fixed Code: Internal Grafana packages synchronized to consistent version (10.0.12)

Note: The provided diff shows only version updates in yarn.lock file from 10.0.11 to 10.0.12 for internal Grafana packages. This appears to be a routine version synchronization update rather than a security fix. No specific vulnerability patterns or security-related dependency changes are evident in this diff.
CVE Analysis Results:
CVE-2024-1442: No
View CVE Description
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.