Skip to content

Commit bbf0d71

Browse files
committed
internal/report: attempt to auto-fix summaries
If there is no module path in a summary, simply add it to the end, i.e., "<summary> in <module>". This could result in non-grammatical phrases so it's meant as a convenience for a human to fix up. As a last resort, if there is no summary at all, add the summary '<[alias] | "Vulnerability"> in <module_path>' as a starting point. Change-Id: I64810c7c77980654d7973dc605b256e6053c0254 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/576998 LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Reviewed-by: Damien Neil <dneil@google.com>
1 parent 44a7c1a commit bbf0d71

30 files changed

+61
-57
lines changed

internal/genericosv/testdata/yaml/GHSA-28r2-q6m8-9hpx.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ modules:
1919
vulnerable_at: 2.0.2
2020
summary: |-
2121
HashiCorp go-getter unsafe downloads could lead to asymmetric resource
22-
exhaustion
22+
exhaustion in github.com/hashicorp/go-getter
2323
description: |-
2424
HashiCorp go-getter through 2.0.2 does not safely perform downloads. Asymmetric
2525
resource exhaustion could occur when go-getter processed malicious HTTP
@@ -39,4 +39,4 @@ references:
3939
- web: https://discuss.hashicorp.com/t/hcsec-2022-13-multiple-vulnerabilities-in-go-getter-library/39930
4040
- web: https://github.com/hashicorp/go-getter/releases
4141
notes:
42-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/hashicorp/go-getter")'
42+
- lint: 'summary: too long (found 115 characters, want <=100)'

internal/genericosv/testdata/yaml/GHSA-3hwm-922r-47hw.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ modules:
33
- module: atomys.codes/stud42
44
versions:
55
- fixed: 0.23.0
6-
summary: Stud42 vulnerable to denial of service
6+
summary: Stud42 vulnerable to denial of service in atomys.codes/stud42
77
description: |-
88
A security vulnerability has been identified in the GraphQL parser used by the
99
API of s42.app. An attacker can overload the parser and cause the API pod to
@@ -22,4 +22,3 @@ references:
2222
- web: https://github.com/42Atomys/stud42/commit/a70bfc72fba721917bf681d72a58093fb9deee17
2323
notes:
2424
- lint: 'modules[0] "atomys.codes/stud42": version 0.23.0 does not exist'
25-
- lint: 'summary: must contain an affected module or package path (e.g. "atomys.codes/stud42")'

internal/genericosv/testdata/yaml/GHSA-3wq5-3f56-v5xc.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ modules:
1212
versions:
1313
- introduced: 6.3.0
1414
fixed: 7.1.6
15-
summary: Mattermost vulnerable to information disclosure
15+
summary: Mattermost vulnerable to information disclosure in github.com/mattermost/mattermost-server
1616
description: |-
1717
Mattermost allows an attacker to request a preview of an existing message when
1818
creating a new message via the createPost API call, disclosing the contents of
@@ -27,4 +27,3 @@ references:
2727
notes:
2828
- lint: 'modules[0] "github.com/mattermost/mattermost-server": 6 versions do not exist: 7.1.0, 7.1.6, 7.7.0, 7.7.2, 7.8.0, 7.8.1'
2929
- lint: 'modules[1] "github.com/mattermost/mattermost-server/v6": version 7.1.6 does not exist'
30-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/mattermost/mattermost-server")'

internal/genericosv/testdata/yaml/GHSA-54q4-74p3-mgcw.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ modules:
66
unsupported_versions:
77
- version: 4.0.2
88
type: last_affected
9-
summary: rttys SQL Injection vulnerability
9+
summary: rttys SQL Injection vulnerability in github.com/zhaojh329/rttys
1010
description: |-
1111
SQL Injection vulnerability in rttys versions 4.0.0, 4.0.1, and 4.0.2 in api.go,
1212
allows attackers to execute arbitrary code.
@@ -21,4 +21,3 @@ notes:
2121
- lint: 'modules[0] "github.com/zhaojh329/rttys": unsupported_versions: found 1 (want none)'
2222
- lint: 'modules[0] "github.com/zhaojh329/rttys": version 4.0.0 does not exist'
2323
- lint: 'summary: must begin with a capital letter'
24-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/zhaojh329/rttys")'

internal/genericosv/testdata/yaml/GHSA-5m6c-jp6f-2vcv.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ modules:
44
versions:
55
- introduced: 5.1.1
66
fixed: 6.0.0
7-
summary: Open Redirect in OAuth2 Proxy
7+
summary: Open Redirect in OAuth2 Proxy in github.com/oauth2-proxy/oauth2-proxy
88
description: |-
99
### Impact As users can provide a redirect address for the proxy to send the
1010
authenticated user to at the end of the authentication flow. This is expected to
@@ -22,4 +22,3 @@ references:
2222
notes:
2323
- lint: 'description: possible markdown formatting (found ### )'
2424
- lint: 'modules[0] "github.com/oauth2-proxy/oauth2-proxy": 2 versions do not exist: 5.1.1, 6.0.0'
25-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/oauth2-proxy/oauth2-proxy")'

internal/genericosv/testdata/yaml/GHSA-627p-rr78-99rj.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ modules:
1414
fixed: 6.4.1
1515
summary: |-
1616
GitLab auth uses full name instead of username as user ID, allowing
17-
impersonation
17+
impersonation in github.com/concourse/concourse
1818
description: |-
1919
### Impact
2020
@@ -70,4 +70,4 @@ notes:
7070
- lint: 'description: possible markdown formatting (found `users`)'
7171
- lint: 'modules[0] "github.com/concourse/concourse": 4 versions do not exist: 6.3.0, 6.3.1, 6.4.0, 6.4.1'
7272
- lint: 'modules[1] "github.com/concourse/dex": 4 versions do not exist: 6.3.0, 6.3.1, 6.4.0, 6.4.1'
73-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/concourse/concourse")'
73+
- lint: 'summary: too long (found 115 characters, want <=100)'

internal/genericosv/testdata/yaml/GHSA-66p8-j459-rq63.yaml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ modules:
88
vulnerable_at: 1.11.3
99
summary: |-
1010
Pterodactyl Wings contains UNIX Symbolic Link (Symlink) Following resulting in
11-
deletion of files and directories on the host system
11+
deletion of files and directories on the host system in github.com/pterodactyl/wings
1212
description: |-
1313
### Impact
1414
@@ -45,5 +45,4 @@ notes:
4545
- lint: 'description: possible markdown formatting (found ### )'
4646
- lint: 'description: possible markdown formatting (found [`GHSA-p8r3-83r8-jwj5`](https://github.com/pterodactyl/wings/security/advisories/GHSA-p8r3-83r8-jwj5))'
4747
- lint: 'description: possible markdown formatting (found `GHSA-p8r3-83r8-jwj5`)'
48-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/pterodactyl/wings")'
49-
- lint: 'summary: too long (found 131 characters, want <=100)'
48+
- lint: 'summary: too long (found 163 characters, want <=100)'

internal/genericosv/testdata/yaml/GHSA-69v6-xc2j-r2jf.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ modules:
1010
- fixed: 1.19.7
1111
packages:
1212
- package: github.com/ethereum/go-ethereum/core/vm
13-
summary: Shallow copy bug in geth
13+
summary: Shallow copy bug in geth in github.com/ethereum/go-ethereum
1414
description: |-
1515
### Impact This is a Consensus vulnerability, which can be used to cause a
1616
chain-split where vulnerable nodes reject the canonical chain.
@@ -44,4 +44,3 @@ notes:
4444
- lint: 'description: possible markdown formatting (found `dataCopy` (at `0x00...04`)'
4545
- lint: 'modules[1] "github.com/ethereum/go-ethereum": packages[0] "github.com/ethereum/go-ethereum/core/vm": at least one of vulnerable_at and skip_fix must be set'
4646
- lint: 'modules[1] "github.com/ethereum/go-ethereum": version 1.19.7 does not exist'
47-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/ethereum/go-ethereum")'

internal/genericosv/testdata/yaml/GHSA-6qfg-8799-r575.yaml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ modules:
1616
vulnerable_at: 1.16.0-rc.2
1717
packages:
1818
- package: k8s.io/kubernetes/pkg/kubectl/cmd/cp
19-
summary: Symlink Attack
19+
summary: Symlink Attack in github.com/kubernetes/kubernetes
2020
description: |-
2121
The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to
2222
1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar
@@ -33,5 +33,3 @@ references:
3333
- report: https://github.com/kubernetes/kubernetes/issues/87773
3434
- fix: https://github.com/kubernetes/kubernetes/pull/82143
3535
- web: https://groups.google.com/d/msg/kubernetes-announce/YYtEFdFimZ4/nZnOezZuBgAJ
36-
notes:
37-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/kubernetes/kubernetes")'

internal/genericosv/testdata/yaml/GHSA-6rg3-8h8x-5xfv.yaml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ modules:
77
vulnerable_at: 1.2.0
88
summary: |-
99
Unchecked hostname resolution could allow access to local network resources by
10-
users outside the local network
10+
users outside the local network in github.com/pterodactyl/wings
1111
description: |-
1212
### Impact A newly implemented route allowing users to download files from
1313
remote endpoints was not properly verifying the destination hostname for user
@@ -29,5 +29,4 @@ references:
2929
- advisory: https://github.com/pterodactyl/wings/security/advisories/GHSA-6rg3-8h8x-5xfv
3030
notes:
3131
- lint: 'description: possible markdown formatting (found ### )'
32-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/pterodactyl/wings")'
33-
- lint: 'summary: too long (found 110 characters, want <=100)'
32+
- lint: 'summary: too long (found 142 characters, want <=100)'

internal/genericosv/testdata/yaml/GHSA-7943-82jg-wmw5.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ modules:
1111
- introduced: 2.4.0
1212
fixed: 2.4.5
1313
vulnerable_at: 2.4.4
14-
summary: Argo CD certificate verification is skipped for connections to OIDC providers
14+
summary: Argo CD certificate verification is skipped for connections to OIDC providers in github.com/argoproj/argo-cd
1515
description: |-
1616
### Impact
1717
@@ -131,4 +131,4 @@ notes:
131131
- lint: 'description: possible markdown formatting (found [discussions](https://github.com/argoproj/argo-cd/discussions))'
132132
- lint: 'description: possible markdown formatting (found `--dex-server`)'
133133
- lint: 'modules[0] "github.com/argoproj/argo-cd": version 2.2.11 does not exist'
134-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/argoproj/argo-cd")'
134+
- lint: 'summary: too long (found 108 characters, want <=100)'

internal/genericosv/testdata/yaml/GHSA-7fxj-fr3v-r9gj.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ modules:
88
type: last_affected
99
- version: 6.4.0-alpha1
1010
type: last_affected
11-
summary: TiDB vulnerable to Use of Externally-Controlled Format String
11+
summary: TiDB vulnerable to Use of Externally-Controlled Format String in github.com/pingcap/tidb
1212
description: |-
1313
TiDB server (importer CLI tool) prior to version 6.4.0 & 6.1.3 is vulnerable to
1414
data source name injection. The database name for generating and inserting data
@@ -26,4 +26,3 @@ references:
2626
notes:
2727
- lint: 'modules[0] "github.com/pingcap/tidb": unsupported_versions: found 2 (want none)'
2828
- lint: 'modules[0] "github.com/pingcap/tidb": version 6.2.0 does not exist'
29-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/pingcap/tidb")'

internal/genericosv/testdata/yaml/GHSA-9689-rx4v-cqgc.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ modules:
99
fixed: 5.8.1
1010
packages:
1111
- package: github.com/concourse/concourse/skymarshal/skyserver
12-
summary: Open Redirect
12+
summary: Open Redirect in github.com/concourse/concourse
1313
description: |-
1414
Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows
1515
redirects to untrusted websites. A remote unauthenticated attacker could
@@ -27,4 +27,3 @@ references:
2727
notes:
2828
- lint: 'modules[0] "github.com/concourse/concourse": 5 versions do not exist: 5.2.8, 5.3.0, 5.5.10, 5.6.0, 5.8.1'
2929
- lint: 'modules[0] "github.com/concourse/concourse": packages[0] "github.com/concourse/concourse/skymarshal/skyserver": at least one of vulnerable_at and skip_fix must be set'
30-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/concourse/concourse")'

internal/genericosv/testdata/yaml/GHSA-cf7g-cm7q-rq7f.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ modules:
33
- module: github.com/drakkan/sftpgo
44
versions:
55
- fixed: 2.3.5
6-
summary: SFTPGo WebClient vulnerable to Cross-site Scripting
6+
summary: SFTPGo WebClient vulnerable to Cross-site Scripting in github.com/drakkan/sftpgo
77
description: |-
88
### Impact Cross-site scripting (XSS) vulnerabilities have been reported to
99
affect SFTPGo WebClient. If exploited, this vulnerability allows remote
@@ -20,4 +20,3 @@ references:
2020
notes:
2121
- lint: 'description: possible markdown formatting (found ### )'
2222
- lint: 'modules[0] "github.com/drakkan/sftpgo": version 2.3.5 does not exist'
23-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/drakkan/sftpgo")'

internal/genericosv/testdata/yaml/GHSA-g5gj-9ggf-9vmq.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ modules:
66
vulnerable_at: 1.3.0
77
packages:
88
- package: github.com/cloudflare/cfrpki/cmd/octorpki
9-
summary: Infinite certificate chain depth results in OctoRPKI running forever
9+
summary: Infinite certificate chain depth results in OctoRPKI running forever in github.com/cloudflare/cfrpki
1010
description: |-
1111
OctoRPKI does not limit the depth of a certificate chain, allowing for a CA to
1212
create children in an ad-hoc fashion, thereby making tree traversal never end.
@@ -25,4 +25,3 @@ references:
2525
- web: https://www.debian.org/security/2022/dsa-5041
2626
notes:
2727
- lint: 'description: possible markdown formatting (found ## )'
28-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/cloudflare/cfrpki")'

internal/genericosv/testdata/yaml/GHSA-g9wh-3vrx-r7hg.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ modules:
44
versions:
55
- fixed: 1.4.0
66
vulnerable_at: 1.3.0
7-
summary: OctoRPKI crashes when processing GZIP bomb returned via malicious repository
7+
summary: OctoRPKI crashes when processing GZIP bomb returned via malicious repository in github.com/cloudflare/cfrpki
88
description: |-
99
OctoRPKI tries to load the entire contents of a repository in memory, and in the
1010
case of a GZIP bomb, unzip it in memory, making it possible to create a
@@ -24,4 +24,4 @@ references:
2424
- web: https://www.debian.org/security/2022/dsa-5041
2525
notes:
2626
- lint: 'description: possible markdown formatting (found ## )'
27-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/cloudflare/cfrpki")'
27+
- lint: 'summary: too long (found 108 characters, want <=100)'

internal/genericosv/testdata/yaml/GHSA-hjv9-hm2f-rpcj.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ modules:
88
fixed: 9.2.13
99
- introduced: 9.3.0
1010
fixed: 9.3.8
11-
summary: Grafana vulnerable to Cross-site Scripting
11+
summary: Grafana vulnerable to Cross-site Scripting in github.com/grafana/grafana
1212
description: |-
1313
Grafana is an open-source platform for monitoring and observability. Starting
1414
with the 8.1 branch, Grafana had a stored XSS vulnerability affecting the core
@@ -31,4 +31,3 @@ references:
3131
- web: https://security.netapp.com/advisory/ntap-20230413-0001/
3232
notes:
3333
- lint: 'modules[0] "github.com/grafana/grafana": 6 versions do not exist: 8.1.0, 8.5.21, 9.0.0, 9.2.13, 9.3.0, 9.3.8'
34-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/grafana/grafana")'

internal/genericosv/testdata/yaml/GHSA-hv53-vf5m-8q94.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ modules:
33
- module: github.com/personnummer/go
44
versions:
55
- fixed: 3.0.1
6-
summary: personnummer/go vulnerable to Improper Input Validation
6+
summary: personnummer/go vulnerable to Improper Input Validation in github.com/personnummer/go
77
description: |-
88
This vulnerability was reported to the personnummer team in June 2020. The slow
99
response was due to locked ownership of some of the affected packages, which
@@ -57,4 +57,3 @@ notes:
5757
- lint: 'description: possible markdown formatting (found [C#](https://github.com/advisories/GHSA-qv8q-v995-72gr))'
5858
- lint: 'modules[0] "github.com/personnummer/go": version 3.0.1 does not exist'
5959
- lint: 'summary: must begin with a capital letter'
60-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/personnummer/go")'

internal/genericosv/testdata/yaml/GHSA-jh36-q97c-9928.yaml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ modules:
1111
- introduced: 1.25.0
1212
fixed: 1.25.4
1313
vulnerable_at: 1.25.4-rc.0
14-
summary: Kubernetes vulnerable to validation bypass
14+
summary: Kubernetes vulnerable to validation bypass in k8s.io/kubernetes
1515
description: |-
1616
Users may have access to secure endpoints in the control plane network.
1717
Kubernetes clusters are only affected if an untrusted user can modify Node
@@ -31,5 +31,3 @@ references:
3131
- web: https://github.com/kubernetes/kubernetes/issues/113757
3232
- web: https://groups.google.com/g/kubernetes-security-announce/c/VyPOxF7CIbA
3333
- web: https://security.netapp.com/advisory/ntap-20230505-0007/
34-
notes:
35-
- lint: 'summary: must contain an affected module or package path (e.g. "k8s.io/kubernetes")'

internal/genericosv/testdata/yaml/GHSA-jmp2-wc4p-wfh2.yaml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ modules:
1212
vulnerable_at: 0.17.0
1313
summary: |-
1414
Mutagen list and monitor operations do not neutralize control characters in text
15-
controlled by remote endpoints
15+
controlled by remote endpoints in github.com/mutagen-io/mutagen
1616
description: |-
1717
### Impact
1818
@@ -61,5 +61,4 @@ notes:
6161
- lint: 'description: possible markdown formatting (found ### )'
6262
- lint: 'description: possible markdown formatting (found [CVE-2003-0069](https://nvd.nist.gov/vuln/detail/CVE-2003-0069))'
6363
- lint: 'description: possible markdown formatting (found `list`)'
64-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/mutagen-io/mutagen")'
65-
- lint: 'summary: too long (found 111 characters, want <=100)'
64+
- lint: 'summary: too long (found 144 characters, want <=100)'

internal/genericosv/testdata/yaml/GHSA-pg5p-wwp8-97g8.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ modules:
1313
- version: 1.10.0
1414
type: last_affected
1515
vulnerable_at: 1.13.1
16-
summary: Debug mode leaks confidential data in Cilium
16+
summary: Debug mode leaks confidential data in Cilium in github.com/cilium/cilium
1717
description: |-
1818
### Impact
1919
@@ -64,4 +64,3 @@ notes:
6464
- lint: 'description: possible markdown formatting (found [Slack](https://docs.cilium.io/en/latest/community/community/#slack))'
6565
- lint: 'modules[0] "github.com/cilium/cilium": unsupported_versions: found 1 (want none)'
6666
- lint: 'modules[0] "github.com/cilium/cilium": versions: introduced and fixed versions must alternate'
67-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/cilium/cilium")'

internal/genericosv/testdata/yaml/GHSA-pmfr-63c2-jr5c.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ modules:
44
versions:
55
- introduced: 3.0.0+incompatible
66
fixed: 3.6.0
7-
summary: Execution Control List (ECL) Is Insecure in Singularity
7+
summary: Execution Control List (ECL) Is Insecure in Singularity in github.com/sylabs/singularity
88
description: |-
99
### Impact
1010
@@ -71,4 +71,3 @@ notes:
7171
- lint: 'description: possible markdown formatting (found [Singularity Slack Channel](https://bit.ly/2m0g3lX))'
7272
- lint: 'description: possible markdown formatting (found `legacyinsecure`)'
7373
- lint: 'modules[0] "github.com/sylabs/singularity": version 3.6.0 does not exist'
74-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/sylabs/singularity")'

internal/genericosv/testdata/yaml/GHSA-vp35-85q5-9f25.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ modules:
44
versions:
55
- fixed: 20.10.20+incompatible
66
vulnerable_at: 20.10.19+incompatible
7-
summary: Container build can leak any path on the host into the container
7+
summary: Container build can leak any path on the host into the container in github.com/moby/moby
88
description: |-
99
### Description
1010
@@ -112,4 +112,3 @@ notes:
112112
- lint: 'description: possible markdown formatting (found ### )'
113113
- lint: 'description: possible markdown formatting (found [Open an issue](https://github.com/moby/moby/issues/new))'
114114
- lint: 'description: possible markdown formatting (found `git+<protocol>://...`)'
115-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/moby/moby")'

internal/genericosv/testdata/yaml/GHSA-w4xh-w33p-4v29.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ modules:
88
- fixed: 2.1.1-0.20170519163204-f913f5f9c7c6
99
packages:
1010
- package: github.com/git-lfs/git-lfs/lfsapi
11-
summary: GitHub Git LFS Improper Input Validation vulnerability
11+
summary: GitHub Git LFS Improper Input Validation vulnerability in github.com/git-lfs/git-lfs
1212
description: |-
1313
GitHub Git LFS before 2.1.1 allows remote attackers to execute arbitrary
1414
commands via an ssh URL with an initial dash character in the hostname, located
@@ -32,4 +32,3 @@ notes:
3232
- lint: 'modules[0] "github.com/git-lfs/git-lfs": version 2.1.1-0.20170519163204-f913f5f9c7c6 does not exist'
3333
- lint: 'modules[1] "github.com/git-lfs/git-lfs": packages[0] "github.com/git-lfs/git-lfs/lfsapi": at least one of vulnerable_at and skip_fix must be set'
3434
- lint: 'modules[1] "github.com/git-lfs/git-lfs": version 2.1.1-0.20170519163204-f913f5f9c7c6 does not exist'
35-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/git-lfs/git-lfs")'

internal/genericosv/testdata/yaml/GHSA-xmg8-99r8-jc2j.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ modules:
1212
- introduced: 2.3.0
1313
fixed: 2.3.4
1414
vulnerable_at: 2.3.3
15-
summary: Login screen allows message spoofing if SSO is enabled
15+
summary: Login screen allows message spoofing if SSO is enabled in github.com/argoproj/argo-cd
1616
description: |-
1717
### Impact
1818
@@ -74,4 +74,3 @@ notes:
7474
- lint: 'description: possible markdown formatting (found ### )'
7575
- lint: 'description: possible markdown formatting (found [discussions](https://github.com/argoproj/argo-cd/discussions))'
7676
- lint: 'modules[0] "github.com/argoproj/argo-cd": version 2.1.15 does not exist'
77-
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/argoproj/argo-cd")'

0 commit comments

Comments
 (0)