Skip to content

Commit c6f7e64

Browse files
committed
data/reports: add missing GHSAs
Fixes #2691 Change-Id: I0d4429336840220bb1afb1b2c9622ae4802fb126 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/579355 LUCI-TryBot-Result: Go LUCI <[email protected]> Reviewed-by: Damien Neil <[email protected]>
1 parent efe4e2a commit c6f7e64

File tree

4 files changed

+15
-1
lines changed

4 files changed

+15
-1
lines changed

data/osv/GO-2024-2658.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,9 @@
77
"CVE-2024-1753",
88
"GHSA-pmf3-c36m-g5cf"
99
],
10+
"related": [
11+
"GHSA-874v-pj72-92f3"
12+
],
1013
"summary": "Container escape at build time in github.com/containers/buildah",
1114
"details": "A crafted container file can use a dummy image with a symbolic link to the host filesystem as a mount source and cause the mount operation to mount the host filesystem during a build-time RUN step. The commands inside the RUN step will then have read-write access to the host filesystem.",
1215
"affected": [

data/osv/GO-2024-2687.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@
44
"modified": "0001-01-01T00:00:00Z",
55
"published": "0001-01-01T00:00:00Z",
66
"aliases": [
7-
"CVE-2023-45288"
7+
"CVE-2023-45288",
8+
"GHSA-4v7x-pqxf-cx7m"
89
],
910
"summary": "HTTP/2 CONTINUATION flood in net/http",
1011
"details": "An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames.\n\nMaintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed.\n\nThis permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send.\n\nThe fix sets a limit on the amount of excess header frames we will process before closing a connection.",

data/reports/GO-2024-2658.yaml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,16 @@ cves:
2020
- CVE-2024-1753
2121
ghsas:
2222
- GHSA-pmf3-c36m-g5cf
23+
related:
24+
- GHSA-874v-pj72-92f3
2325
credits:
2426
- '@rmcnamara-snyk'
2527
references:
2628
- fix: https://github.com/containers/buildah/commit/9de9c20ff368beb84b84fe660773d352519dc1c5
2729
- report: https://bugzilla.redhat.com/show_bug.cgi?id=2265513
30+
notes:
31+
- |
32+
GHSA-874v-pj72-92f3 is a DEPENDENT_VULNERABILITY
33+
of this report, but the GHSA database considers it an
34+
alias of CVE-2024-1753. Adding the GHSA as "related"
35+
prevents our tooling from adding it to the aliases field.

data/reports/GO-2024-2687.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -297,6 +297,8 @@ description: |-
297297
298298
The fix sets a limit on the amount of excess header frames we will process
299299
before closing a connection.
300+
ghsas:
301+
- GHSA-4v7x-pqxf-cx7m
300302
credits:
301303
- Bartek Nowotarski (https://nowotarski.info/)
302304
references:

0 commit comments

Comments
 (0)