зеркало из https://github.com/golang/vulndb.git
data/reports: add vulnerable_at to GO-2020-0007.yaml
Aliases: CVE-2017-18367, GHSA-58v3-j75h-xr49 Updates golang/vulndb#7 Change-Id: I566617e7fd9df18d0fe377847b02d8cbd5ce6ac0 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/465176 TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Damien Neil <dneil@google.com> Run-TryBot: Tatiana Bradley <tatianabradley@google.com> Reviewed-by: Tim King <taking@google.com>
This commit is contained in:
Родитель
b76345a101
Коммит
f0441fd318
|
@ -2,6 +2,7 @@ modules:
|
|||
- module: github.com/seccomp/libseccomp-golang
|
||||
versions:
|
||||
- fixed: 0.9.1-0.20170424173420-06e7a29f36a3
|
||||
vulnerable_at: 0.9.1-0.20170424173400-fc0298087f32
|
||||
packages:
|
||||
- package: github.com/seccomp/libseccomp-golang
|
||||
symbols:
|
||||
|
@ -11,7 +12,6 @@ modules:
|
|||
- ScmpFilter.AddRuleConditional
|
||||
- ScmpFilter.AddRuleConditionalExact
|
||||
- ScmpFilter.AddRuleExact
|
||||
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
|
||||
description: |
|
||||
Filters containing rules with multiple syscall arguments are improperly
|
||||
constructed, such that all arguments are required to match rather than
|
||||
|
|
Загрузка…
Ссылка в новой задаче