Skip to content

Commit a7f50fe

Browse files
committed
data/reports: fix GO-2021-0085.yaml
Add vulnerable_at, symbols, and fix packages Aliases: CVE-2019-16884, GHSA-fgv8-vj5c-2ppq Updates #85 Change-Id: I38fafcb65c74a36cde3add37858ea3fbd606ae51 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/463682 Reviewed-by: Tatiana Bradley <[email protected]> Run-TryBot: Tatiana Bradley <[email protected]> Auto-Submit: Tatiana Bradley <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Tim King <[email protected]>
1 parent 1a1bb5a commit a7f50fe

File tree

2 files changed

+30
-3
lines changed

2 files changed

+30
-3
lines changed

data/osv/GO-2021-0085.json

+19-2
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,16 @@
3232
"ecosystem_specific": {
3333
"imports": [
3434
{
35-
"path": "github.com/opencontainers/runc/libcontainer"
35+
"path": "github.com/opencontainers/runc/libcontainer/apparmor",
36+
"symbols": [
37+
"ApplyProfile"
38+
]
39+
},
40+
{
41+
"path": "github.com/opencontainers/runc/libcontainer/utils",
42+
"symbols": [
43+
"CloseExecFrom"
44+
]
3645
}
3746
]
3847
}
@@ -61,7 +70,11 @@
6170
"ecosystem_specific": {
6271
"imports": [
6372
{
64-
"path": "github.com/opencontainers/selinux/go-selinux"
73+
"path": "github.com/opencontainers/selinux/go-selinux",
74+
"symbols": [
75+
"readCon",
76+
"writeCon"
77+
]
6578
}
6679
]
6780
}
@@ -76,6 +89,10 @@
7689
"type": "FIX",
7790
"url": "https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4"
7891
},
92+
{
93+
"type": "FIX",
94+
"url": "https://github.com/opencontainers/selinux/commit/03b517dc4fd57245b1cf506e8ba7b817b6d309da"
95+
},
7996
{
8097
"type": "WEB",
8198
"url": "https://github.com/opencontainers/runc/issues/2128"

data/reports/GO-2021-0085.yaml

+11-1
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,22 @@ modules:
22
- module: github.com/opencontainers/runc
33
versions:
44
- fixed: 1.0.0-rc8.0.20190930145003-cad42f6e0932
5+
vulnerable_at: 1.0.0-rc8
56
packages:
6-
- package: github.com/opencontainers/runc/libcontainer
7+
- package: github.com/opencontainers/runc/libcontainer/apparmor
8+
symbols:
9+
- ApplyProfile
10+
- package: github.com/opencontainers/runc/libcontainer/utils
11+
symbols:
12+
- CloseExecFrom
713
- module: github.com/opencontainers/selinux
814
versions:
915
- fixed: 1.3.1-0.20190929122143-5215b1806f52
1016
packages:
1117
- package: github.com/opencontainers/selinux/go-selinux
18+
symbols:
19+
- readCon
20+
- writeCon
1221
description: |
1322
AppArmor restrictions may be bypassed due to improper validation of mount
1423
targets, allowing a malicious image to mount volumes over e.g. /proc.
@@ -21,4 +30,5 @@ credit: Leopold Schabel
2130
references:
2231
- fix: https://github.com/opencontainers/runc/pull/2130
2332
- fix: https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4
33+
- fix: https://github.com/opencontainers/selinux/commit/03b517dc4fd57245b1cf506e8ba7b817b6d309da
2434
- web: https://github.com/opencontainers/runc/issues/2128

0 commit comments

Comments
 (0)