From dce001efde88e34f52cd1793fa6dd3d8d5dd437c Mon Sep 17 00:00:00 2001 From: Tatiana Bradley Date: Fri, 10 Feb 2023 15:37:46 -0500 Subject: [PATCH] data/reports: add GHSA to GO-2022-0965.yaml Aliases: GHSA-74fp-r6jw-h4mp Updates golang/vulndb#965 Fixes golang/vulndb#1538 Change-Id: I383dea54817354e002a0738dfb699cf2d351f577 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/467438 Reviewed-by: David Chase Reviewed-by: Damien Neil Run-TryBot: Tatiana Bradley TryBot-Result: Gopher Robot --- data/osv/GO-2022-0965.json | 3 +++ data/reports/GO-2022-0965.yaml | 2 ++ 2 files changed, 5 insertions(+) diff --git a/data/osv/GO-2022-0965.json b/data/osv/GO-2022-0965.json index 73fadd9e..a854112e 100644 --- a/data/osv/GO-2022-0965.json +++ b/data/osv/GO-2022-0965.json @@ -2,6 +2,9 @@ "id": "GO-2022-0965", "published": "2022-09-02T21:12:51Z", "modified": "0001-01-01T00:00:00Z", + "aliases": [ + "GHSA-74fp-r6jw-h4mp" + ], "details": "Unbounded recursion in JSON parsing allows malicious JSON input to cause excessive memory consumption or panics.", "affected": [ { diff --git a/data/reports/GO-2022-0965.yaml b/data/reports/GO-2022-0965.yaml index 58436ce0..cfcf60c2 100644 --- a/data/reports/GO-2022-0965.yaml +++ b/data/reports/GO-2022-0965.yaml @@ -17,6 +17,8 @@ description: |- Unbounded recursion in JSON parsing allows malicious JSON input to cause excessive memory consumption or panics. published: 2022-09-02T21:12:51Z +ghsas: + - GHSA-74fp-r6jw-h4mp references: - fix: https://github.com/kubernetes/kubernetes/pull/83261 - web: https://github.com/advisories/GHSA-pmqp-h87c-mr78