Skip to content

Commit 202a12d

Browse files
committed
data/reports: add vulnerable_at to GO-2021-0094.yaml
Aliases: CVE-2020-29529 Updates #94 Change-Id: I065e04bfa1434500f74c644e900439099266e06c Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/465796 Run-TryBot: Tatiana Bradley <[email protected]> Reviewed-by: Tim King <[email protected]> TryBot-Result: Gopher Robot <[email protected]>
1 parent 790329a commit 202a12d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

data/reports/GO-2021-0094.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@ modules:
22
- module: github.com/hashicorp/go-slug
33
versions:
44
- fixed: 0.5.0
5+
vulnerable_at: 0.4.3
56
packages:
67
- package: github.com/hashicorp/go-slug
78
symbols:
89
- Unpack
9-
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
1010
description: |
1111
Protections against directory traversal during archive extraction can be
1212
bypassed by chaining multiple symbolic links within the archive. This allows

0 commit comments

Comments
 (0)