Skip to content

Commit 7c92a88

Browse files
committed
internal/report, data/reports: require summary field in YAML
Adds a lint check to require a non-empty summary field in YAML reports, and backfills summary field for all old reports with a TODO. (This TODO is OK because the summary field is not yet published to OSV.) For golang/go#56443 Change-Id: I368d48ceca35ed74a0461550d5386ae7ff85be1a Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/493595 Reviewed-by: Tim King <taking@google.com> Reviewed-by: Tatiana Bradley <tatianabradley@google.com> Run-TryBot: Tatiana Bradley <tatianabradley@google.com> TryBot-Result: Gopher Robot <gobot@golang.org>
1 parent 2e4c4f6 commit 7c92a88

File tree

331 files changed

+372
-1
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

331 files changed

+372
-1
lines changed

data/reports/GO-2020-0001.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ modules:
1212
- Logger
1313
- LoggerWithFormatter
1414
- LoggerWithWriter
15+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1516
description: |
1617
The default Formatter for the Logger middleware (LoggerConfig.Formatter),
1718
which is included in the Default engine, allows attackers to inject arbitrary

data/reports/GO-2020-0003.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ modules:
55
vulnerable_at: 0.21.0
66
packages:
77
- package: github.com/revel/revel
8+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
89
description: |
910
An attacker can cause an application that accepts slice parameters
1011
(https://revel.github.io/manual/parameters.html#slices) to allocate large

data/reports/GO-2020-0004.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ modules:
1313
derived_symbols:
1414
- ListenAndServe
1515
- ListenAndServeTLS
16+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1617
description: |
1718
If any of the ListenAndServe functions are called with an empty token,
1819
token authentication is disabled globally for all listeners.

data/reports/GO-2020-0005.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ modules:
1212
- Create
1313
- Repair
1414
- Verify
15+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1516
description: |
1617
Malformed WALs can be constructed such that WAL.ReadAll can cause attempted
1718
out of bounds reads, or creation of arbitrarily sized slices, which may be used as

data/reports/GO-2020-0006.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ modules:
1313
- ListenAndServeTLS
1414
- Server.ActivateAndServe
1515
- Server.ListenAndServe
16+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1617
description: |
1718
An attacker may prevent TCP connections to a Server by opening
1819
a connection and leaving it idle, until the connection is closed by

data/reports/GO-2020-0007.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ modules:
1212
- ScmpFilter.AddRuleConditional
1313
- ScmpFilter.AddRuleConditionalExact
1414
- ScmpFilter.AddRuleExact
15+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1516
description: |
1617
Filters containing rules with multiple syscall arguments are improperly
1718
constructed, such that all arguments are required to match rather than

data/reports/GO-2020-0008.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ modules:
1313
- Msg.SetNotify
1414
- Msg.SetQuestion
1515
- Msg.SetUpdate
16+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1617
description: |
1718
DNS message transaction IDs are generated using math/rand which
1819
makes them relatively predictable. This reduces the complexity

data/reports/GO-2020-0009.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@ modules:
4242
derived_symbols:
4343
- genericEncrypter.Encrypt
4444
- genericEncrypter.EncryptWithAuthData
45+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
4546
description: |
4647
On 32-bit platforms an attacker can manipulate a ciphertext encrypted with AES-CBC
4748
with HMAC such that they can control how large the input buffer is when computing

data/reports/GO-2020-0010.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ modules:
1414
- ecDecrypterSigner.decryptKey
1515
derived_symbols:
1616
- JsonWebKey.UnmarshalJSON
17+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1718
description: |
1819
When using ECDH-ES an attacker can mount an invalid curve attack during
1920
decryption as the supplied public key is not checked to be on the same

data/reports/GO-2020-0012.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@ modules:
2828
- ParsePublicKey
2929
- ParseRawPrivateKey
3030
- ParseRawPrivateKeyWithPassphrase
31+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
3132
description: |
3233
An attacker can craft an ssh-ed25519 or sk-ssh-ed25519@openssh.com public
3334
key, such that the library will panic when trying to verify a signature

data/reports/GO-2020-0013.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ modules:
99
- NewClientConn
1010
derived_symbols:
1111
- Dial
12+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1213
description: |
1314
By default host key verification is disabled which allows for
1415
man-in-the-middle attacks against SSH clients if

data/reports/GO-2020-0014.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ modules:
1111
derived_symbols:
1212
- Parse
1313
- ParseFragment
14+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1415
description: |
1516
html.Parse does not properly handle "select" tags, which can lead
1617
to an infinite loop. If parsing user supplied input, this may be used

data/reports/GO-2020-0015.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ modules:
1212
- package: golang.org/x/text/transform
1313
symbols:
1414
- String
15+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1516
description: |
1617
An attacker could provide a single byte to a UTF16 decoder instantiated with
1718
UseBOM or ExpectBOM to trigger an infinite loop if the String function on

data/reports/GO-2020-0016.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ modules:
1111
- Reader.Read
1212
- blockHeader.UnmarshalBinary
1313
- streamReader.Read
14+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1415
description: |
1516
An attacker can construct a series of bytes such that calling
1617
Reader.Read on the bytes could cause an infinite loop. If

data/reports/GO-2020-0017.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ modules:
1515
- package: github.com/dgrijalva/jwt-go/v4
1616
symbols:
1717
- MapClaims.VerifyAudience
18+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1819
description: |
1920
If a JWT contains an audience claim with an array of strings, rather
2021
than a single string, and MapClaims.VerifyAudience is called with

data/reports/GO-2020-0019.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ modules:
4040
- proxy_envOnce.Get
4141
- proxy_socks5.Dial
4242
- truncWriter.Write
43+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
4344
description: |
4445
An attacker can craft malicious WebSocket frames that cause an integer
4546
overflow in a variable which tracks the number of bytes remaining. This

data/reports/GO-2020-0020.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ modules:
77
- package: github.com/gorilla/handlers
88
symbols:
99
- cors.ServeHTTP
10+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1011
description: |
1112
Usage of the CORS handler may apply improper CORS headers, allowing
1213
the requester to explicitly control the value of the Access-Control-Allow-Origin

data/reports/GO-2020-0021.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ modules:
1010
- SearchRepositoryByName
1111
- SearchUserByName
1212
skip_fix: 'TODO: Revisit this reason (Some dependencies no longer exist)'
13+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1314
description: |
1415
Due to improper santization of user input, a number of methods are
1516
vulnerable to SQL injection if used with user input that has not

data/reports/GO-2020-0022.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ modules:
77
- package: github.com/cloudflare/golz4
88
symbols:
99
- Uncompress
10+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1011
description: |
1112
LZ4 bindings use a deprecated C API that is vulnerable to
1213
memory corruption, which could lead to arbitrary code execution

data/reports/GO-2020-0023.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ modules:
99
- Algorithm.validateSignature
1010
derived_symbols:
1111
- Algorithm.Validate
12+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1213
description: |
1314
Token validation methods are susceptible to a timing side-channel
1415
during HMAC comparison. With a large enough number of requests

data/reports/GO-2020-0024.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ modules:
1717
symbols:
1818
- proxiedConn.LocalAddr
1919
- proxiedConn.RemoteAddr
20+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
2021
description: |
2122
The RemoteAddr and LocalAddr methods on the returned net.Conn may
2223
call themselves, leading to an infinite loop which will crash the

data/reports/GO-2020-0025.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ modules:
1313
- tarExtractor.Extract
1414
- tgzExtractor.Extract
1515
- zipExtractor.Extract
16+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1617
description: |
1718
Due to improper path santization, archives containing relative file
1819
paths can cause files to be written (or overwritten) outside of the

data/reports/GO-2020-0026.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ modules:
1212
derived_symbols:
1313
- stiTar.ExtractTarStream
1414
- stiTar.ExtractTarStreamWithLogging
15+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1516
description: |
1617
Due to improper path santization, archives containing relative file
1718
paths can cause files to be written (or overwritten) outside of the

data/reports/GO-2020-0027.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ modules:
2020
- InsertKey
2121
- RemoveKey
2222
- UserKeyringID
23+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
2324
description: |
2425
After dropping and then elevating process privileges euid, guid, and groups
2526
are not properly restored to their original values, allowing an unprivileged

data/reports/GO-2020-0028.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ modules:
1111
- NewRR
1212
- ParseZone
1313
- ReadRR
14+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1415
description: |
1516
Due to a nil pointer dereference, parsing a malformed zone file
1617
containing TA records may cause a panic. If parsing user supplied

data/reports/GO-2020-0032.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ modules:
3232
- Controller.FileHandler
3333
skip_fix: 'TODO: revisit this reason (goa.design/goa/v3 appears to not be
3434
a package, but I could not locate the fix for this issue in v3)'
35+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
3536
description: |
3637
Due to improper santization of user input, Controller.FileHandler allows
3738
for directory traversal, allowing an attacker to read files outside of

data/reports/GO-2020-0033.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ modules:
1111
- Application.Run
1212
- Application.ServeHTTP
1313
- Application.Start
14+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1415
description: |
1516
Due to improper santization of user input, HTTPEngine.Handle allows
1617
for directory traversal, allowing an attacker to read files outside of

data/reports/GO-2020-0034.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ modules:
77
- package: github.com/artdarek/go-unzip
88
symbols:
99
- Unzip.Extract
10+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1011
description: |
1112
Due to improper path santization, archives containing relative file
1213
paths can cause files to be written (or overwritten) outside of the

data/reports/GO-2020-0035.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ modules:
77
- package: github.com/yi-ge/unzip
88
symbols:
99
- Unzip.Extract
10+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1011
description: |
1112
Due to improper path santization, archives containing relative file
1213
paths can cause files to be written (or overwritten) outside of the

data/reports/GO-2020-0036.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ modules:
3131
- Decoder.Decode
3232
- Unmarshal
3333
- UnmarshalStrict
34+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
3435
description: |
3536
Due to unbounded aliasing, a crafted YAML file can cause consumption
3637
of significant system resources. If parsing user supplied input, this

data/reports/GO-2020-0037.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ modules:
1010
derived_symbols:
1111
- NewJSONRPCClient
1212
- NewURIClient
13+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1314
description: |
1415
Due to support of Gzip compression in request bodies, as well
1516
as a lack of limiting response body sizes, a malicious server

data/reports/GO-2020-0038.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ modules:
1313
- Listener.Accept
1414
- Resume
1515
- Server
16+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1617
description: |
1718
Due to improper verification of packets, unencrypted packets containing
1819
application data are accepted after the initial handshake. This allows

data/reports/GO-2020-0039.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ modules:
1313
- Macaron.Run
1414
- Macaron.ServeHTTP
1515
- Router.ServeHTTP
16+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1617
description: |
1718
Due to improper request santization, a specifically crafted URL
1819
can cause the static file handler to redirect to an attacker chosen

data/reports/GO-2020-0040.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ modules:
33
vulnerable_at: 0.0.0-20201219151056-5a20f3199263
44
packages:
55
- package: github.com/shiyanhui/dht
6+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
67
description: |
78
Due to unchecked type assertions, maliciously crafted messages can
89
cause panics, which may be used as a denial of service vector.

data/reports/GO-2020-0041.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,7 @@ modules:
3030
- ZipArchive.Close
3131
- ZipArchive.ExtractTo
3232
- ZipArchive.Flush
33+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
3334
description: |
3435
Due to improper path santization, archives containing relative file
3536
paths can cause files to be written (or overwritten) outside of the

data/reports/GO-2020-0042.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ modules:
77
- package: github.com/sassoftware/go-rpmutils/cpio
88
symbols:
99
- Extract
10+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1011
description: |
1112
Due to improper path santization, RPMs containing relative file
1213
paths can cause files to be written (or overwritten) outside of the

data/reports/GO-2020-0043.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ modules:
1111
- assertConfigsCompatible
1212
skip_fix: 'TODO: revisit this reason. (cannot find module providing package
1313
github.com/lucas-clemente/quic-go/h2quic)'
14+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1415
description: |
1516
Due to improper TLS verification when serving traffic for multiple
1617
SNIs, an attacker may bypass TLS client authentication by indicating

data/reports/GO-2020-0045.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ modules:
1010
derived_symbols:
1111
- Context.Render
1212
- Context.RenderFromString
13+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1314
description: |
1415
CSRF tokens are generated using math/rand, which is not a cryptographically
1516
secure random number generator, allowing an attacker to predict values and

data/reports/GO-2020-0046.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ modules:
2222
- SAMLServiceProvider.ValidateEncodedLogoutRequestPOST
2323
- SAMLServiceProvider.ValidateEncodedLogoutResponsePOST
2424
- SAMLServiceProvider.ValidateEncodedResponse
25+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
2526
description: |
2627
Due to a nil pointer dereference, a malformed XML Digital Signature
2728
can cause a panic during validation. If user supplied signatures are

data/reports/GO-2020-0047.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ modules:
99
- NewSignedResponse
1010
derived_symbols:
1111
- ServiceProviderSettings.GetAuthnRequest
12+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1213
description: |
1314
XML Digital Signatures generated and validated using this package use
1415
SHA-1, which may allow an attacker to craft inputs which cause hash

data/reports/GO-2020-0048.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ modules:
77
- package: github.com/antchfx/xmlquery
88
symbols:
99
- LoadURL
10+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1011
description: |
1112
LoadURL does not check the Content-Type of loaded resources,
1213
which can cause a panic due to nil pointer deference if the loaded

data/reports/GO-2020-0049.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ modules:
1010
- verifyToken
1111
derived_symbols:
1212
- CSRFHandler.ServeHTTP
13+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1314
description: |
1415
Due to improper validation of caller input, validation is silently disabled
1516
if the provided expected token is malformed, causing any user supplied token

data/reports/GO-2020-0050.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ modules:
99
- ValidationContext.findSignature
1010
derived_symbols:
1111
- ValidationContext.Validate
12+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1213
description: |
1314
Due to the behavior of encoding/xml, a crafted XML document may cause
1415
XML Digital Signature validation to be entirely bypassed, causing an

data/reports/GO-2021-0051.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ modules:
1212
derived_symbols:
1313
- Echo.Static
1414
- Group.Static
15+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1516
description: |
1617
Due to improper sanitization of user input on Windows, the static file handler
1718
allows for directory traversal, allowing an attacker to read files outside of

data/reports/GO-2021-0052.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ modules:
1717
- Engine.RunTLS
1818
- Engine.RunUnix
1919
- Engine.ServeHTTP
20+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
2021
description: |
2122
Due to improper HTTP header santization, a malicious user can spoof their
2223
source IP address by setting the X-Forwarded-For header. This may allow

data/reports/GO-2021-0053.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ modules:
88
symbols:
99
- unmarshal.field
1010
- unmarshal.Generate
11+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1112
description: |
1213
Due to improper bounds checking, maliciously crafted input to generated
1314
Unmarshal methods can cause an out-of-bounds panic. If parsing messages

data/reports/GO-2021-0054.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ modules:
99
- unwrap
1010
derived_symbols:
1111
- Result.ForEach
12+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1213
description: |
1314
Due to improper bounds checking, maliciously crafted JSON objects
1415
can cause an out-of-bounds panic. If parsing user input, this may

data/reports/GO-2021-0057.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@ modules:
2828
- GetUnsafeString
2929
- ObjectEach
3030
- Set
31+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
3132
description: |
3233
Due to improper bounds checking, maliciously crafted JSON objects
3334
can cause an out-of-bounds panic. If parsing user input, this may

data/reports/GO-2021-0058.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ modules:
2626
- FetchMetadata
2727
- Middleware.ServeHTTP
2828
- New
29+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
2930
description: |
3031
Due to the behavior of encoding/xml, a crafted XML document may cause
3132
XML Digital Signature validation to be entirely bypassed, causing an

data/reports/GO-2021-0059.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ modules:
1616
- Result.Get
1717
- Result.Map
1818
- Result.Value
19+
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
1920
description: |
2021
Due to improper bounds checking, maliciously crafted JSON objects
2122
can cause an out-of-bounds panic. If parsing user input, this may

0 commit comments

Comments
 (0)