Skip to content

Commit

Permalink
data/reports: add GHSA to GO-2022-0965.yaml
Browse files Browse the repository at this point in the history
Aliases: GHSA-74fp-r6jw-h4mp

Updates #965
Fixes #1538

Change-Id: I383dea54817354e002a0738dfb699cf2d351f577
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/467438
Reviewed-by: David Chase <drchase@google.com>
Reviewed-by: Damien Neil <dneil@google.com>
Run-TryBot: Tatiana Bradley <tatianabradley@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
  • Loading branch information
tatianab committed Feb 13, 2023
1 parent 0a8e819 commit dce001e
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 0 deletions.
3 changes: 3 additions & 0 deletions data/osv/GO-2022-0965.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,9 @@
"id": "GO-2022-0965",
"published": "2022-09-02T21:12:51Z",
"modified": "0001-01-01T00:00:00Z",
"aliases": [
"GHSA-74fp-r6jw-h4mp"
],
"details": "Unbounded recursion in JSON parsing allows malicious JSON input to cause excessive memory consumption or panics.",
"affected": [
{
Expand Down
2 changes: 2 additions & 0 deletions data/reports/GO-2022-0965.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,8 @@ description: |-
Unbounded recursion in JSON parsing allows malicious JSON input to
cause excessive memory consumption or panics.
published: 2022-09-02T21:12:51Z
ghsas:
- GHSA-74fp-r6jw-h4mp
references:
- fix: https://github.com/kubernetes/kubernetes/pull/83261
- web: https://github.com/advisories/GHSA-pmqp-h87c-mr78
Expand Down

0 comments on commit dce001e

Please sign in to comment.