data/reports: add GO-2024-2598.yaml

Aliases: CVE-2024-24783

Updates golang/vulndb#2598

Change-Id: Ib7d22f03c692fa185ecb9e738ca728604e705095
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/569415
Reviewed-by: Damien Neil <dneil@google.com>
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
diff --git a/data/cve/v5/GO-2024-2598.json b/data/cve/v5/GO-2024-2598.json
new file mode 100644
index 0000000..dc41498
--- /dev/null
+++ b/data/cve/v5/GO-2024-2598.json
@@ -0,0 +1,82 @@
+{
+  "dataType": "CVE_RECORD",
+  "dataVersion": "5.0",
+  "cveMetadata": {
+    "cveId": "CVE-2024-24783"
+  },
+  "containers": {
+    "cna": {
+      "providerMetadata": {
+        "orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
+      },
+      "title": "Verify panics on certificates with an unknown public key algorithm in crypto/x509",
+      "descriptions": [
+        {
+          "lang": "en",
+          "value": "Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates."
+        }
+      ],
+      "affected": [
+        {
+          "vendor": "Go standard library",
+          "product": "crypto/x509",
+          "collectionURL": "https://pkg.go.dev",
+          "packageName": "crypto/x509",
+          "versions": [
+            {
+              "version": "0",
+              "lessThan": "1.21.8",
+              "status": "affected",
+              "versionType": "semver"
+            },
+            {
+              "version": "1.22.0-0",
+              "lessThan": "1.22.1",
+              "status": "affected",
+              "versionType": "semver"
+            }
+          ],
+          "programRoutines": [
+            {
+              "name": "Certificate.buildChains"
+            },
+            {
+              "name": "Certificate.Verify"
+            }
+          ],
+          "defaultStatus": "unaffected"
+        }
+      ],
+      "problemTypes": [
+        {
+          "descriptions": [
+            {
+              "lang": "en",
+              "description": "CWE-476: NULL Pointer Dereference"
+            }
+          ]
+        }
+      ],
+      "references": [
+        {
+          "url": "https://go.dev/issue/65390"
+        },
+        {
+          "url": "https://go.dev/cl/569339"
+        },
+        {
+          "url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg"
+        },
+        {
+          "url": "https://pkg.go.dev/vuln/GO-2024-2598"
+        }
+      ],
+      "credits": [
+        {
+          "lang": "en",
+          "value": "John Howard (Google)"
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2024-2598.json b/data/osv/GO-2024-2598.json
new file mode 100644
index 0000000..e1711ee
--- /dev/null
+++ b/data/osv/GO-2024-2598.json
@@ -0,0 +1,71 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2024-2598",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "CVE-2024-24783"
+  ],
+  "summary": "Verify panics on certificates with an unknown public key algorithm in crypto/x509",
+  "details": "Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic.\n\nThis affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.",
+  "affected": [
+    {
+      "package": {
+        "name": "stdlib",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            },
+            {
+              "fixed": "1.21.8"
+            },
+            {
+              "introduced": "1.22.0-0"
+            },
+            {
+              "fixed": "1.22.1"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {
+        "imports": [
+          {
+            "path": "crypto/x509",
+            "symbols": [
+              "Certificate.Verify",
+              "Certificate.buildChains"
+            ]
+          }
+        ]
+      }
+    }
+  ],
+  "references": [
+    {
+      "type": "REPORT",
+      "url": "https://go.dev/issue/65390"
+    },
+    {
+      "type": "FIX",
+      "url": "https://go.dev/cl/569339"
+    },
+    {
+      "type": "WEB",
+      "url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg"
+    }
+  ],
+  "credits": [
+    {
+      "name": "John Howard (Google)"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2024-2598"
+  }
+}
\ No newline at end of file
diff --git a/data/reports/GO-2024-2598.yaml b/data/reports/GO-2024-2598.yaml
new file mode 100644
index 0000000..915b64e
--- /dev/null
+++ b/data/reports/GO-2024-2598.yaml
@@ -0,0 +1,33 @@
+id: GO-2024-2598
+modules:
+    - module: std
+      versions:
+        - fixed: 1.21.8
+        - introduced: 1.22.0-0
+          fixed: 1.22.1
+      vulnerable_at: 1.22.0
+      packages:
+        - package: crypto/x509
+          symbols:
+            - Certificate.buildChains
+          derived_symbols:
+            - Certificate.Verify
+summary: |-
+    Verify panics on certificates with an unknown public key algorithm in
+    crypto/x509
+description: |-
+    Verifying a certificate chain which contains a certificate with an unknown
+    public key algorithm will cause Certificate.Verify to panic.
+
+    This affects all crypto/tls clients, and servers that set Config.ClientAuth to
+    VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is
+    for TLS servers to not verify client certificates.
+credits:
+    - John Howard (Google)
+references:
+    - report: https://go.dev/issue/65390
+    - fix: https://go.dev/cl/569339
+    - web: https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg
+cve_metadata:
+    id: CVE-2024-24783
+    cwe: 'CWE-476: NULL Pointer Dereference'