Skip to content

Commit 3cd20f4

Browse files
reports: add remaining triaged CVEs
And add the false-positives to the triaged-cve-list. Change-Id: I64188841372d99d6b91bb1dc602f6312c9b6b5ce Reviewed-on: https://team-review.git.corp.google.com/c/golang/vulndb/+/1054739 Reviewed-by: Roland Shoemaker <bracewell@google.com>
1 parent 087c061 commit 3cd20f4

File tree

5 files changed

+645
-7
lines changed

5 files changed

+645
-7
lines changed

reports/GO-2020-0005.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ cve = "CVE-2020-15106"
1111

1212
credit = "Trail of Bits"
1313

14-
symbols = ["WAL.ReadAll"]
14+
symbols = ["WAL.ReadAll", "decoder.decodeRecord"]
1515

1616
[[versions]]
1717
fixed = "v0.5.0-alpha.5.0.20200423152442-f4b650b51dc4"

reports/GO-2021-0097.toml

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
module = "github.com/dhowden/tag"
2+
3+
description = """
4+
Due to improper bounds checking a number of methods can trigger a panic due to attempted
5+
out-of-bounds reads. If the package is used to parse user supplied input this may be
6+
used as a vector for a denial of service attack.
7+
"""
8+
9+
cve = "CVE-2020-29242"
10+
11+
credit = "@Jayl1n"
12+
13+
symbols = [
14+
"readPICFrame",
15+
"readAPICFrame",
16+
"readTextWithDescrFrame",
17+
"readAtomData"
18+
]
19+
20+
[[versions]]
21+
fixed = "v0.0.0-20201120070457-d52dcb253c63"
22+
23+
[links]
24+
commit = "https://github.com/dhowden/tag/commit/d52dcb253c63a153632bfee5f269dd411dcd8e96"
25+
context = [
26+
"https://github.com/dhowden/tag/commit/a92213460e4838490ce3066ef11dc823cdc1740e",
27+
"https://github.com/dhowden/tag/commit/4b595ed4fac79f467594aa92f8953f90f817116e",
28+
"https://github.com/dhowden/tag/commit/6b18201aa5c5535511802ddfb4e4117686b4866d"
29+
]

reports/GO-2021-0098.toml

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
module = "github.com/git-lfs/git-lfs"
2+
package = "github.com/git-lfs/git-lfs/commands"
3+
4+
description = """
5+
Due to the standard library behavior of exec.LookPath on Windows a number of methods may
6+
result in arbitary code execution when cloning or operating on untrusted Git repositories.
7+
"""
8+
9+
os = ["windows"]
10+
11+
cve = "CVE-2021-21237"
12+
13+
credit = "@Ry0taK"
14+
15+
symbols = ["PipeCommand"]
16+
17+
[[versions]]
18+
fixed = "v1.5.1-0.20210113180018-fc664697ed2c"
19+
20+
[[additional_packages]]
21+
module = "github.com/git-lfs/git-lfs"
22+
package = "github.com/git-lfs/git-lfs/creds"
23+
symbols = ["AskPassCredentialHelper.getFromProgram", "commandCredentialHelper.Approve"]
24+
[[additional_packages.versions]]
25+
fixed = "v1.5.1-0.20210113180018-fc664697ed2c"
26+
27+
[[additional_packages]]
28+
module = "github.com/git-lfs/git-lfs"
29+
package = "github.com/git-lfs/git-lfs/lfs"
30+
symbols = ["pipeExtensions"]
31+
[[additional_packages.versions]]
32+
fixed = "v1.5.1-0.20210113180018-fc664697ed2c"
33+
34+
[[additional_packages]]
35+
module = "github.com/git-lfs/git-lfs"
36+
package = "github.com/git-lfs/git-lfs/lfshttp"
37+
symbols = ["sshAuthClient.Resolve"]
38+
[[additional_packages.versions]]
39+
fixed = "v1.5.1-0.20210113180018-fc664697ed2c"
40+
41+
[links]
42+
commit = "https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a"
43+
context = ["https://github.com/git-lfs/git-lfs/security/advisories/GHSA-cx3w-xqmc-84g5"]

reports/GO-2021-0099.toml

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
module = "github.com/deislabs/oras"
2+
package = "github.com/deislabs/oras/pkg/content"
3+
4+
description = """
5+
Due to improper path validation, using the github.com/deislabs/oras/pkg/content.FileStore
6+
content store may result in directory traversal during archive extraction, allowing a
7+
malicious archive to write paths to arbitary paths that the process can write to.
8+
"""
9+
10+
cve = "CVE-2021-21272"
11+
12+
credit = "Chris Smowton"
13+
14+
symbols = ["extractTarDirectory"]
15+
16+
[[versions]]
17+
fixed = "v0.9.0"
18+
19+
[links]
20+
commit = "https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e"
21+
context = ["https://github.com/deislabs/oras/security/advisories/GHSA-g5v4-5x39-vwhx"]

0 commit comments

Comments
 (0)