Skip to content

Commit

Permalink
Update NVD Data and source
Browse files Browse the repository at this point in the history
  • Loading branch information
witchcraze committed Jun 16, 2023
1 parent 4372c5e commit a94a733
Show file tree
Hide file tree
Showing 5 changed files with 86 additions and 38 deletions.
71 changes: 44 additions & 27 deletions Go.json
Original file line number Diff line number Diff line change
Expand Up @@ -6195,41 +6195,55 @@
}
}
},
"CVE-2023-29405": {
"CVE-ID": "CVE-2023-29405",
"CVE-2023-29403": {
"CVE-ID": "CVE-2023-29403",
"NVD": {
"Descriptions": "The go command may execute arbitrary code at build time when using cgo. This may occur when running \"go get\" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a \"#cgo LDFLAGS\" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.",
"Descriptions": "On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.",
"Cvss2_BaseScore": 0,
"Cvss3_BaseScore": 0,
"Cvss3_BaseScore": 7.8,
"Cvss2_VectorString": "",
"Cvss3_VectorString": "",
"CPEs": []
"Cvss3_VectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CPEs": [
{
"URI": "cpe:/a:golang:go",
"FormattedString": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"VersionStartExcluding": "",
"VersionStartIncluding": "",
"VersionEndExcluding": "1.19.10",
"VersionEndIncluding": ""
},
{
"URI": "cpe:/a:golang:go",
"FormattedString": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"VersionStartExcluding": "",
"VersionStartIncluding": "1.20.0",
"VersionEndExcluding": "1.20.5",
"VersionEndIncluding": ""
}
]
},
"Official": {
"1.21": {
"source": {
"60306": "https://github.com/golang/go/issues/60306",
"60305": "https://github.com/golang/go/issues/60305"
"60272": "https://github.com/golang/go/issues/60272"
}
},
"1.20.5": {
"source": {
"60514": "https://github.com/golang/go/issues/60514",
"60512": "https://github.com/golang/go/issues/60512"
"60518": "https://github.com/golang/go/issues/60518"
}
},
"1.19.10": {
"source": {
"60513": "https://github.com/golang/go/issues/60513",
"60511": "https://github.com/golang/go/issues/60511"
"60517": "https://github.com/golang/go/issues/60517"
}
}
}
},
"CVE-2023-29404": {
"CVE-ID": "CVE-2023-29404",
"CVE-2023-29405": {
"CVE-ID": "CVE-2023-29405",
"NVD": {
"Descriptions": "The go command may execute arbitrary code at build time when using cgo. This may occur when running \"go get\" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a \"#cgo LDFLAGS\" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.",
"Descriptions": "The go command may execute arbitrary code at build time when using cgo. This may occur when running \"go get\" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a \"#cgo LDFLAGS\" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.",
"Cvss2_BaseScore": 0,
"Cvss3_BaseScore": 0,
"Cvss2_VectorString": "",
Expand All @@ -6239,28 +6253,28 @@
"Official": {
"1.21": {
"source": {
"60305": "https://github.com/golang/go/issues/60305",
"60306": "https://github.com/golang/go/issues/60306"
"60306": "https://github.com/golang/go/issues/60306",
"60305": "https://github.com/golang/go/issues/60305"
}
},
"1.20.5": {
"source": {
"60512": "https://github.com/golang/go/issues/60512",
"60514": "https://github.com/golang/go/issues/60514"
"60514": "https://github.com/golang/go/issues/60514",
"60512": "https://github.com/golang/go/issues/60512"
}
},
"1.19.10": {
"source": {
"60511": "https://github.com/golang/go/issues/60511",
"60513": "https://github.com/golang/go/issues/60513"
"60513": "https://github.com/golang/go/issues/60513",
"60511": "https://github.com/golang/go/issues/60511"
}
}
}
},
"CVE-2023-29403": {
"CVE-ID": "CVE-2023-29403",
"CVE-2023-29404": {
"CVE-ID": "CVE-2023-29404",
"NVD": {
"Descriptions": "On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.",
"Descriptions": "The go command may execute arbitrary code at build time when using cgo. This may occur when running \"go get\" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a \"#cgo LDFLAGS\" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.",
"Cvss2_BaseScore": 0,
"Cvss3_BaseScore": 0,
"Cvss2_VectorString": "",
Expand All @@ -6270,17 +6284,20 @@
"Official": {
"1.21": {
"source": {
"60272": "https://github.com/golang/go/issues/60272"
"60305": "https://github.com/golang/go/issues/60305",
"60306": "https://github.com/golang/go/issues/60306"
}
},
"1.20.5": {
"source": {
"60518": "https://github.com/golang/go/issues/60518"
"60512": "https://github.com/golang/go/issues/60512",
"60514": "https://github.com/golang/go/issues/60514"
}
},
"1.19.10": {
"source": {
"60517": "https://github.com/golang/go/issues/60517"
"60511": "https://github.com/golang/go/issues/60511",
"60513": "https://github.com/golang/go/issues/60513"
}
}
}
Expand Down
23 changes: 20 additions & 3 deletions Go/CVE-2023-29403.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,27 @@
"NVD": {
"Descriptions": "On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.",
"Cvss2_BaseScore": 0,
"Cvss3_BaseScore": 0,
"Cvss3_BaseScore": 7.8,
"Cvss2_VectorString": "",
"Cvss3_VectorString": "",
"CPEs": []
"Cvss3_VectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CPEs": [
{
"URI": "cpe:/a:golang:go",
"FormattedString": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"VersionStartExcluding": "",
"VersionStartIncluding": "",
"VersionEndExcluding": "1.19.10",
"VersionEndIncluding": ""
},
{
"URI": "cpe:/a:golang:go",
"FormattedString": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"VersionStartExcluding": "",
"VersionStartIncluding": "1.20.0",
"VersionEndExcluding": "1.20.5",
"VersionEndIncluding": ""
}
]
},
"Official": {
"1.21": {
Expand Down
15 changes: 11 additions & 4 deletions kernel.json
Original file line number Diff line number Diff line change
Expand Up @@ -170271,7 +170271,14 @@
"source": "https://github.com/torvalds/linux/commit/b8c75e4a1b325ea0a9433fa8834be97b5836b946",
"version": "-",
"upstream_commit": "",
"fixed": []
"fixed": [
{
"fixed_commit": "1da177e4c3f4",
"fixed_commit_source": "https://www.kernel.org/pub//linux/kernel/v2.6/ChangeLog-2.6.12",
"fixed_commit_version": "2.6.12",
"fixed_commit_upstream_commit": []
}
]
},
{
"description": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()",
Expand Down Expand Up @@ -1177855,9 +1177862,9 @@
"upstream_commit": "",
"fixed": [
{
"fixed_commit": "1da177e4c3f4",
"fixed_commit_source": "https://www.kernel.org/pub//linux/kernel/v2.6/ChangeLog-2.6.12",
"fixed_commit_version": "2.6.12",
"fixed_commit": "5d4f98a28c7d",
"fixed_commit_source": "https://github.com/torvalds/linux/commit/5d4f98a28c7d",
"fixed_commit_version": "-",
"fixed_commit_upstream_commit": []
}
]
Expand Down
9 changes: 8 additions & 1 deletion kernel/CVE-2023-31084.json
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,14 @@
"source": "https://github.com/torvalds/linux/commit/b8c75e4a1b325ea0a9433fa8834be97b5836b946",
"version": "-",
"upstream_commit": "",
"fixed": []
"fixed": [
{
"fixed_commit": "1da177e4c3f4",
"fixed_commit_source": "https://www.kernel.org/pub//linux/kernel/v2.6/ChangeLog-2.6.12",
"fixed_commit_version": "2.6.12",
"fixed_commit_upstream_commit": []
}
]
},
{
"description": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()",
Expand Down
6 changes: 3 additions & 3 deletions kernel/CVE-2023-3111.json
Original file line number Diff line number Diff line change
Expand Up @@ -119,9 +119,9 @@
"upstream_commit": "",
"fixed": [
{
"fixed_commit": "1da177e4c3f4",
"fixed_commit_source": "https://www.kernel.org/pub//linux/kernel/v2.6/ChangeLog-2.6.12",
"fixed_commit_version": "2.6.12",
"fixed_commit": "5d4f98a28c7d",
"fixed_commit_source": "https://github.com/torvalds/linux/commit/5d4f98a28c7d",
"fixed_commit_version": "-",
"fixed_commit_upstream_commit": []
}
]
Expand Down

0 comments on commit a94a733

Please sign in to comment.