data/reports: add vulnerable_at to GO-2020-0007.yaml

Aliases: CVE-2017-18367, GHSA-58v3-j75h-xr49

Updates golang/vulndb#7

Change-Id: I566617e7fd9df18d0fe377847b02d8cbd5ce6ac0
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/465176
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Damien Neil <dneil@google.com>
Run-TryBot: Tatiana Bradley <tatianabradley@google.com>
Reviewed-by: Tim King <taking@google.com>
This commit is contained in:
Tatiana Bradley 2023-02-02 20:40:11 +00:00
Родитель b76345a101
Коммит f0441fd318
1 изменённых файлов: 1 добавлений и 1 удалений

Просмотреть файл

@ -2,6 +2,7 @@ modules:
- module: github.com/seccomp/libseccomp-golang
versions:
- fixed: 0.9.1-0.20170424173420-06e7a29f36a3
vulnerable_at: 0.9.1-0.20170424173400-fc0298087f32
packages:
- package: github.com/seccomp/libseccomp-golang
symbols:
@ -11,7 +12,6 @@ modules:
- ScmpFilter.AddRuleConditional
- ScmpFilter.AddRuleConditionalExact
- ScmpFilter.AddRuleExact
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
description: |
Filters containing rules with multiple syscall arguments are improperly
constructed, such that all arguments are required to match rather than