Skip to content

Commit 3d42cf3

Browse files
tatianabgopherbot
authored andcommitted
data/reports: add GHSA to GO-2021-0094.yaml
Aliases: CVE-2020-29529, GHSA-2g5j-5x95-r6hr Updates #94 Change-Id: I87c8fec4db7e920b2335ffb56e9851b1f7bd9a34 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/466142 Reviewed-by: Tim King <[email protected]> Auto-Submit: Tatiana Bradley <[email protected]> Run-TryBot: Tatiana Bradley <[email protected]> TryBot-Result: Gopher Robot <[email protected]>
1 parent b4cc423 commit 3d42cf3

File tree

2 files changed

+4
-1
lines changed

2 files changed

+4
-1
lines changed

data/osv/GO-2021-0094.json

+2-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,8 @@
33
"published": "2021-04-14T20:04:52Z",
44
"modified": "0001-01-01T00:00:00Z",
55
"aliases": [
6-
"CVE-2020-29529"
6+
"CVE-2020-29529",
7+
"GHSA-2g5j-5x95-r6hr"
78
],
89
"details": "Protections against directory traversal during archive extraction can be bypassed by chaining multiple symbolic links within the archive. This allows a malicious attacker to cause files to be created outside of the target directory. Additionally if the attacker is able to read extracted files they may create symbolic links to arbitrary files on the system which the unpacker has permissions to read.",
910
"affected": [

data/reports/GO-2021-0094.yaml

+2
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,8 @@ description: |
1717
published: 2021-04-14T20:04:52Z
1818
cves:
1919
- CVE-2020-29529
20+
ghsas:
21+
- GHSA-2g5j-5x95-r6hr
2022
references:
2123
- fix: https://github.com/hashicorp/go-slug/pull/12
2224
- fix: https://github.com/hashicorp/go-slug/commit/28cafc59c8da6126a3ae94dfa84181df4073454f

0 commit comments

Comments
 (0)