Skip to content

Commit 01c368b

Browse files
committed
data/reports: review GO-2024-2521
- data/reports/GO-2024-2521.yaml Fixes #2521 Change-Id: I6346e5e1772c27aef34dc9124b28dbd1d867a385 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/598315 LUCI-TryBot-Result: Go LUCI <[email protected]> Reviewed-by: Zvonimir Pavlinovic <[email protected]>
1 parent 825527a commit 01c368b

File tree

2 files changed

+72
-38
lines changed

2 files changed

+72
-38
lines changed

data/osv/GO-2024-2521.json

Lines changed: 50 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,48 @@
77
"CVE-2019-14271",
88
"GHSA-v2cv-wwxq-qq97"
99
],
10-
"summary": "Moby Docker cp broken with debian containers in github.com/moby/moby",
11-
"details": "Moby Docker cp broken with debian containers in github.com/moby/moby.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/moby/moby from v19.03.0 before v19.03.1.",
10+
"summary": "Moby Docker cp broken with debian containers in github.com/docker/docker",
11+
"details": "In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.",
1212
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/docker/docker",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "20.10.0-beta1+incompatible"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {
32+
"imports": [
33+
{
34+
"path": "github.com/docker/docker/pkg/chrootarchive"
35+
}
36+
],
37+
"custom_ranges": [
38+
{
39+
"type": "ECOSYSTEM",
40+
"events": [
41+
{
42+
"introduced": "19.03.0"
43+
},
44+
{
45+
"fixed": "19.03.1"
46+
}
47+
]
48+
}
49+
]
50+
}
51+
},
1352
{
1453
"package": {
1554
"name": "github.com/moby/moby",
@@ -21,11 +60,19 @@
2160
"events": [
2261
{
2362
"introduced": "0"
63+
},
64+
{
65+
"fixed": "20.10.0-beta1+incompatible"
2466
}
2567
]
2668
}
2769
],
2870
"ecosystem_specific": {
71+
"imports": [
72+
{
73+
"path": "github.com/moby/moby/pkg/chrootarchive"
74+
}
75+
],
2976
"custom_ranges": [
3077
{
3178
"type": "ECOSYSTEM",
@@ -47,10 +94,6 @@
4794
"type": "ADVISORY",
4895
"url": "https://github.com/advisories/GHSA-v2cv-wwxq-qq97"
4996
},
50-
{
51-
"type": "ADVISORY",
52-
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14271"
53-
},
5497
{
5598
"type": "FIX",
5699
"url": "https://github.com/moby/moby/commit/11e48badcb67554b3d795241855028f28d244545"
@@ -66,30 +109,10 @@
66109
{
67110
"type": "REPORT",
68111
"url": "https://github.com/moby/moby/issues/39449"
69-
},
70-
{
71-
"type": "WEB",
72-
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html"
73-
},
74-
{
75-
"type": "WEB",
76-
"url": "https://docs.docker.com/engine/release-notes"
77-
},
78-
{
79-
"type": "WEB",
80-
"url": "https://seclists.org/bugtraq/2019/Sep/21"
81-
},
82-
{
83-
"type": "WEB",
84-
"url": "https://security.netapp.com/advisory/ntap-20190828-0003"
85-
},
86-
{
87-
"type": "WEB",
88-
"url": "https://www.debian.org/security/2019/dsa-4521"
89112
}
90113
],
91114
"database_specific": {
92115
"url": "https://pkg.go.dev/vuln/GO-2024-2521",
93-
"review_status": "UNREVIEWED"
116+
"review_status": "REVIEWED"
94117
}
95118
}

data/reports/GO-2024-2521.yaml

Lines changed: 22 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,40 @@
11
id: GO-2024-2521
22
modules:
3+
- module: github.com/docker/docker
4+
versions:
5+
- fixed: 20.10.0-beta1+incompatible
6+
non_go_versions:
7+
- introduced: 19.03.0
8+
- fixed: 19.03.1
9+
packages:
10+
- package: github.com/docker/docker/pkg/chrootarchive
11+
skip_fix: fix does not work with incompatible versions
312
- module: github.com/moby/moby
13+
versions:
14+
- fixed: 20.10.0-beta1+incompatible
415
non_go_versions:
516
- introduced: 19.03.0
6-
fixed: 19.03.1
7-
vulnerable_at: 26.1.4+incompatible
8-
summary: Moby Docker cp broken with debian containers in github.com/moby/moby
17+
- fixed: 19.03.1
18+
packages:
19+
- package: github.com/moby/moby/pkg/chrootarchive
20+
skip_fix: fix does not work with incompatible versions
21+
summary: Moby Docker cp broken with debian containers in github.com/docker/docker
22+
description: |-
23+
In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc),
24+
code injection can occur when the nsswitch facility dynamically loads a library
25+
inside a chroot that contains the contents of the container.
926
cves:
1027
- CVE-2019-14271
1128
ghsas:
1229
- GHSA-v2cv-wwxq-qq97
1330
references:
1431
- advisory: https://github.com/advisories/GHSA-v2cv-wwxq-qq97
15-
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2019-14271
1632
- fix: https://github.com/moby/moby/commit/11e48badcb67554b3d795241855028f28d244545
1733
- fix: https://github.com/moby/moby/commit/fa8dd90ceb7bcb9d554d27e0b9087ab83e54bd2b
1834
- fix: https://github.com/moby/moby/pull/39612
1935
- report: https://github.com/moby/moby/issues/39449
20-
- web: http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html
21-
- web: https://docs.docker.com/engine/release-notes
22-
- web: https://seclists.org/bugtraq/2019/Sep/21
23-
- web: https://security.netapp.com/advisory/ntap-20190828-0003
24-
- web: https://www.debian.org/security/2019/dsa-4521
2536
source:
2637
id: GHSA-v2cv-wwxq-qq97
27-
created: 2024-06-14T11:40:02.184106-04:00
28-
review_status: UNREVIEWED
38+
created: 2024-07-15T12:29:37.368794-04:00
39+
review_status: REVIEWED
2940
unexcluded: EFFECTIVELY_PRIVATE

0 commit comments

Comments
 (0)