Skip to content

Commit b0e70d0

Browse files
committed
data/reports: add vulnerable_at to GO-2021-0097.yaml
Aliases: CVE-2020-29242, CVE-2020-29243, CVE-2020-29244, CVE-2020-29245 Updates #97 Change-Id: I54ddcaae0d9e3be94eaa1998dce9c239a9746415 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/465797 TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Tim King <[email protected]> Run-TryBot: Tatiana Bradley <[email protected]>
1 parent 202a12d commit b0e70d0

File tree

2 files changed

+12
-3
lines changed

2 files changed

+12
-3
lines changed

data/osv/GO-2021-0097.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,8 +36,12 @@
3636
{
3737
"path": "github.com/dhowden/tag",
3838
"symbols": [
39+
"ReadAtoms",
40+
"ReadDSFTags",
41+
"ReadFrom",
42+
"ReadID3v2Tags",
43+
"metadataMP4.readAtomData",
3944
"readAPICFrame",
40-
"readAtomData",
4145
"readPICFrame",
4246
"readTextWithDescrFrame"
4347
]

data/reports/GO-2021-0097.yaml

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,19 @@ modules:
22
- module: github.com/dhowden/tag
33
versions:
44
- fixed: 0.0.0-20201120070457-d52dcb253c63
5+
vulnerable_at: 0.0.0-20201119192538-6b18201aa5c5
56
packages:
67
- package: github.com/dhowden/tag
78
symbols:
89
- readPICFrame
910
- readAPICFrame
1011
- readTextWithDescrFrame
11-
- readAtomData
12-
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
12+
- metadataMP4.readAtomData
13+
derived_symbols:
14+
- ReadAtoms
15+
- ReadDSFTags
16+
- ReadFrom
17+
- ReadID3v2Tags
1318
description: |
1419
Due to improper bounds checking, a number of methods can trigger a panic due to attempted
1520
out-of-bounds reads. If the package is used to parse user supplied input, this may be

0 commit comments

Comments
 (0)