Skip to content

Commit 660e6a5

Browse files
tatianabgopherbot
authored andcommitted
data/reports: update GO-2025-3372 (add GHSA)
- data/reports/GO-2025-3372.yaml Fixes #3425 Fixes #3372 Change-Id: Ifc802e0b7e3f14533b35b39c08851a9c936ffdba Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/645139 LUCI-TryBot-Result: Go LUCI <[email protected]> Reviewed-by: Damien Neil <[email protected]> Auto-Submit: Tatiana Bradley <[email protected]>
1 parent 29bc14e commit 660e6a5

File tree

2 files changed

+4
-1
lines changed

2 files changed

+4
-1
lines changed

data/osv/GO-2025-3372.json

+2-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@
44
"modified": "0001-01-01T00:00:00Z",
55
"published": "0001-01-01T00:00:00Z",
66
"aliases": [
7-
"CVE-2024-45339"
7+
"CVE-2024-45339",
8+
"GHSA-6wxm-mpqj-6jpf"
89
],
910
"summary": "Vulnerability when creating log files in github.com/golang/glog",
1011
"details": "When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists.",

data/reports/GO-2025-3372.yaml

+2
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,8 @@ description: |-
7474
privileged process runs, it will follow the planted symlink and overwrite that
7575
sensitive file. To fix that, glog now causes the program to exit (with status
7676
code 2) when it finds that the configured log file already exists.
77+
ghsas:
78+
- GHSA-6wxm-mpqj-6jpf
7779
credits:
7880
- Josh McSavaney
7981
- Günther Noack

0 commit comments

Comments
 (0)