Tatiana Bradley submitted this change.
data/reports: add GHSA to GO-2022-0965.yaml
Aliases: GHSA-74fp-r6jw-h4mp
Updates golang/vulndb#965
Fixes golang/vulndb#1538
Change-Id: I383dea54817354e002a0738dfb699cf2d351f577
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/467438
Reviewed-by: David Chase <drc...@google.com>
Reviewed-by: Damien Neil <dn...@google.com>
Run-TryBot: Tatiana Bradley <tatiana...@google.com>
TryBot-Result: Gopher Robot <go...@golang.org>
---
M data/osv/GO-2022-0965.json
M data/reports/GO-2022-0965.yaml
2 files changed, 24 insertions(+), 0 deletions(-)
diff --git a/data/osv/GO-2022-0965.json b/data/osv/GO-2022-0965.json
index 73fadd9..a854112 100644
--- a/data/osv/GO-2022-0965.json
+++ b/data/osv/GO-2022-0965.json
@@ -2,6 +2,9 @@
"id": "GO-2022-0965",
"published": "2022-09-02T21:12:51Z",
"modified": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "GHSA-74fp-r6jw-h4mp"
+ ],
"details": "Unbounded recursion in JSON parsing allows malicious JSON input to cause excessive memory consumption or panics.",
"affected": [
{
diff --git a/data/reports/GO-2022-0965.yaml b/data/reports/GO-2022-0965.yaml
index 58436ce..cfcf60c 100644
--- a/data/reports/GO-2022-0965.yaml
+++ b/data/reports/GO-2022-0965.yaml
@@ -17,6 +17,8 @@
Unbounded recursion in JSON parsing allows malicious JSON input to
cause excessive memory consumption or panics.
published: 2022-09-02T21:12:51Z
+ghsas:
+ - GHSA-74fp-r6jw-h4mp
references:
- fix: https://github.com/kubernetes/kubernetes/pull/83261
- web: https://github.com/advisories/GHSA-pmqp-h87c-mr78
To view, visit change 467438. To unsubscribe, or for help writing mail filters, visit settings.