File tree 2 files changed +12
-3
lines changed
2 files changed +12
-3
lines changed Original file line number Diff line number Diff line change 36
36
{
37
37
"path" : " github.com/dhowden/tag" ,
38
38
"symbols" : [
39
+ " ReadAtoms" ,
40
+ " ReadDSFTags" ,
41
+ " ReadFrom" ,
42
+ " ReadID3v2Tags" ,
43
+ " metadataMP4.readAtomData" ,
39
44
" readAPICFrame" ,
40
- " readAtomData" ,
41
45
" readPICFrame" ,
42
46
" readTextWithDescrFrame"
43
47
]
Original file line number Diff line number Diff line change @@ -2,14 +2,19 @@ modules:
2
2
- module : github.com/dhowden/tag
3
3
versions :
4
4
- fixed : 0.0.0-20201120070457-d52dcb253c63
5
+ vulnerable_at : 0.0.0-20201119192538-6b18201aa5c5
5
6
packages :
6
7
- package : github.com/dhowden/tag
7
8
symbols :
8
9
- readPICFrame
9
10
- readAPICFrame
10
11
- readTextWithDescrFrame
11
- - readAtomData
12
- skip_fix : ' TODO: fill this out [or set vulnerable_at to derive symbols]'
12
+ - metadataMP4.readAtomData
13
+ derived_symbols :
14
+ - ReadAtoms
15
+ - ReadDSFTags
16
+ - ReadFrom
17
+ - ReadID3v2Tags
13
18
description : |
14
19
Due to improper bounds checking, a number of methods can trigger a panic due to attempted
15
20
out-of-bounds reads. If the package is used to parse user supplied input, this may be
You can’t perform that action at this time.
0 commit comments