Skip to content

Commit 1de53ca

Browse files
tatianabgopherbot
authored andcommitted
data/reports: review GO-2024-3344
- data/reports/GO-2024-3344.yaml Fixes #3344 Fixes #3353 Change-Id: Icbebcb7607230d4a1bcb2bd8826a9f44897cbc97 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/637960 LUCI-TryBot-Result: Go LUCI <[email protected]> Auto-Submit: Tatiana Bradley <[email protected]> Reviewed-by: Damien Neil <[email protected]>
1 parent 035d5b8 commit 1de53ca

File tree

2 files changed

+55
-9
lines changed

2 files changed

+55
-9
lines changed

data/osv/GO-2024-3344.json

+32-5
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,11 @@
66
"aliases": [
77
"GHSA-32gq-x56h-299c"
88
],
9-
"summary": "age vulnerable to malicious plugin names, recipients, or identities causing arbitrary binary execution in filippo.io/age",
10-
"details": "age vulnerable to malicious plugin names, recipients, or identities causing arbitrary binary execution in filippo.io/age",
9+
"related": [
10+
"CVE-2024-56327"
11+
],
12+
"summary": "Malicious plugin names, recipients, or identities causing arbitrary binary execution in filippo.io/age",
13+
"details": "Malicious plugin names, recipients, or identities causing arbitrary binary execution in filippo.io/age",
1114
"affected": [
1215
{
1316
"package": {
@@ -27,7 +30,26 @@
2730
]
2831
}
2932
],
30-
"ecosystem_specific": {}
33+
"ecosystem_specific": {
34+
"imports": [
35+
{
36+
"path": "filippo.io/age/plugin",
37+
"symbols": [
38+
"EncodeIdentity",
39+
"EncodeRecipient",
40+
"Identity.Unwrap",
41+
"NewIdentity",
42+
"NewIdentityWithoutData",
43+
"NewRecipient",
44+
"ParseIdentity",
45+
"ParseRecipient",
46+
"Recipient.Wrap",
47+
"Recipient.WrapWithLabels",
48+
"openClientConnection"
49+
]
50+
}
51+
]
52+
}
3153
}
3254
],
3355
"references": [
@@ -36,12 +58,17 @@
3658
"url": "https://github.com/FiloSottile/age/security/advisories/GHSA-32gq-x56h-299c"
3759
},
3860
{
39-
"type": "WEB",
61+
"type": "FIX",
4062
"url": "https://github.com/FiloSottile/age/commit/482cf6fc9babd3ab06f6606762aac10447222201"
4163
}
4264
],
65+
"credits": [
66+
{
67+
"name": "⬡-49016"
68+
}
69+
],
4370
"database_specific": {
4471
"url": "https://pkg.go.dev/vuln/GO-2024-3344",
45-
"review_status": "UNREVIEWED"
72+
"review_status": "REVIEWED"
4673
}
4774
}

data/reports/GO-2024-3344.yaml

+23-4
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,34 @@ modules:
44
versions:
55
- fixed: 1.2.1
66
vulnerable_at: 1.2.0
7+
packages:
8+
- package: filippo.io/age/plugin
9+
symbols:
10+
- NewIdentityWithoutData
11+
- EncodeRecipient
12+
- EncodeIdentity
13+
- ParseRecipient
14+
- openClientConnection
15+
- ParseIdentity
16+
derived_symbols:
17+
- Identity.Unwrap
18+
- NewIdentity
19+
- NewRecipient
20+
- Recipient.Wrap
21+
- Recipient.WrapWithLabels
722
summary: |-
8-
age vulnerable to malicious plugin names, recipients, or identities causing
23+
Malicious plugin names, recipients, or identities causing
924
arbitrary binary execution in filippo.io/age
1025
ghsas:
1126
- GHSA-32gq-x56h-299c
27+
related:
28+
- CVE-2024-56327
29+
credits:
30+
- ⬡-49016
1231
references:
1332
- advisory: https://github.com/FiloSottile/age/security/advisories/GHSA-32gq-x56h-299c
14-
- web: https://github.com/FiloSottile/age/commit/482cf6fc9babd3ab06f6606762aac10447222201
33+
- fix: https://github.com/FiloSottile/age/commit/482cf6fc9babd3ab06f6606762aac10447222201
1534
source:
1635
id: GHSA-32gq-x56h-299c
17-
created: 2024-12-20T10:03:46.400782-10:00
18-
review_status: NEEDS_REVIEW
36+
created: 2024-12-20T10:15:12.556561-10:00
37+
review_status: REVIEWED

0 commit comments

Comments
 (0)