Skip to content

Commit a674883

Browse files
committed
data/reports: update GO-2023-1840.yaml
Updates #1840 Change-Id: I26cf944bbf0f8f29dd2d413c3811e29088c40f43 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/501536 Reviewed-by: Damien Neil <[email protected]> Run-TryBot: Tatiana Bradley <[email protected]> TryBot-Result: Gopher Robot <[email protected]>
1 parent 7a88f6b commit a674883

File tree

3 files changed

+8
-8
lines changed

3 files changed

+8
-8
lines changed

data/cve/v5/GO-2023-1840.json

+3-3
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,10 @@
1717
],
1818
"affected": [
1919
{
20-
"vendor": "Go toolchain",
21-
"product": "cmd/go",
20+
"vendor": "Go standard library",
21+
"product": "runtime",
2222
"collectionURL": "https://pkg.go.dev",
23-
"packageName": "cmd/go",
23+
"packageName": "runtime",
2424
"versions": [
2525
{
2626
"version": "0",

data/osv/GO-2023-1840.json

+2-2
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
"affected": [
1111
{
1212
"package": {
13-
"name": "toolchain",
13+
"name": "stdlib",
1414
"ecosystem": "Go"
1515
},
1616
"ranges": [
@@ -35,7 +35,7 @@
3535
"ecosystem_specific": {
3636
"imports": [
3737
{
38-
"path": "cmd/go"
38+
"path": "runtime"
3939
}
4040
]
4141
}

data/reports/GO-2023-1840.yaml

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
id: GO-2023-1840
22
modules:
3-
- module: cmd
3+
- module: std
44
versions:
55
- fixed: 1.19.10
66
- introduced: 1.20.0-0
77
fixed: 1.20.5
88
vulnerable_at: 1.20.4
99
packages:
10-
- package: cmd/go
11-
summary: Unsafe behavior in setuid/setgid binaries in Go runtime
10+
- package: runtime
11+
summary: Unsafe behavior in setuid/setgid binaries in runtime
1212
description: |
1313
On Unix platforms, the Go runtime does not behave differently when a binary
1414
is run with the setuid/setgid bits. This can be dangerous in certain

0 commit comments

Comments
 (0)