Skip to content

Commit 2c69a3a

Browse files
tatianabgopherbot
authored andcommitted
data/reports: unexclude 20 reports (18)
- data/reports/GO-2022-0507.yaml - data/reports/GO-2022-0508.yaml - data/reports/GO-2022-0509.yaml - data/reports/GO-2022-0510.yaml - data/reports/GO-2022-0511.yaml - data/reports/GO-2022-0512.yaml - data/reports/GO-2022-0516.yaml - data/reports/GO-2022-0517.yaml - data/reports/GO-2022-0518.yaml - data/reports/GO-2022-0540.yaml - data/reports/GO-2022-0547.yaml - data/reports/GO-2022-0550.yaml - data/reports/GO-2022-0554.yaml - data/reports/GO-2022-0556.yaml - data/reports/GO-2022-0559.yaml - data/reports/GO-2022-0560.yaml - data/reports/GO-2022-0561.yaml - data/reports/GO-2022-0562.yaml - data/reports/GO-2022-0566.yaml - data/reports/GO-2022-0570.yaml Updates #507 Updates #508 Updates #509 Updates #510 Updates #511 Updates #512 Updates #516 Updates #517 Updates #518 Updates #540 Updates #547 Updates #550 Updates #554 Updates #556 Updates #559 Updates #560 Updates #561 Updates #562 Updates #566 Updates #570 Change-Id: I3197ea86e01d2ed4ae9e7f17dbd7a3e495c903e4 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/607220 Reviewed-by: Damien Neil <[email protected]> Auto-Submit: Tatiana Bradley <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
1 parent 41b516d commit 2c69a3a

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

60 files changed

+1914
-163
lines changed

data/excluded/GO-2022-0507.yaml

-8
This file was deleted.

data/excluded/GO-2022-0508.yaml

-8
This file was deleted.

data/excluded/GO-2022-0509.yaml

-8
This file was deleted.

data/excluded/GO-2022-0510.yaml

-8
This file was deleted.

data/excluded/GO-2022-0511.yaml

-8
This file was deleted.

data/excluded/GO-2022-0512.yaml

-8
This file was deleted.

data/excluded/GO-2022-0516.yaml

-11
This file was deleted.

data/excluded/GO-2022-0517.yaml

-8
This file was deleted.

data/excluded/GO-2022-0518.yaml

-8
This file was deleted.

data/excluded/GO-2022-0540.yaml

-8
This file was deleted.

data/excluded/GO-2022-0547.yaml

-8
This file was deleted.

data/excluded/GO-2022-0550.yaml

-8
This file was deleted.

data/excluded/GO-2022-0554.yaml

-8
This file was deleted.

data/excluded/GO-2022-0556.yaml

-8
This file was deleted.

data/excluded/GO-2022-0559.yaml

-8
This file was deleted.

data/excluded/GO-2022-0560.yaml

-8
This file was deleted.

data/excluded/GO-2022-0561.yaml

-8
This file was deleted.

data/excluded/GO-2022-0562.yaml

-8
This file was deleted.

data/excluded/GO-2022-0566.yaml

-8
This file was deleted.

data/excluded/GO-2022-0570.yaml

-8
This file was deleted.

data/osv/GO-2022-0507.json

+72
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2022-0507",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2022-31073",
8+
"GHSA-vwm6-qc77-v2rh"
9+
],
10+
"summary": "KubeEdge Edge ServiceBus module DoS in github.com/kubeedge/kubeedge",
11+
"details": "KubeEdge Edge ServiceBus module DoS in github.com/kubeedge/kubeedge",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/kubeedge/kubeedge",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "1.9.4"
27+
},
28+
{
29+
"introduced": "1.10.0"
30+
},
31+
{
32+
"fixed": "1.10.2"
33+
},
34+
{
35+
"introduced": "1.11.0"
36+
},
37+
{
38+
"fixed": "1.11.1"
39+
}
40+
]
41+
}
42+
],
43+
"ecosystem_specific": {}
44+
}
45+
],
46+
"references": [
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://github.com/kubeedge/kubeedge/security/advisories/GHSA-vwm6-qc77-v2rh"
50+
},
51+
{
52+
"type": "ADVISORY",
53+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31073"
54+
},
55+
{
56+
"type": "FIX",
57+
"url": "https://github.com/kubeedge/kubeedge/pull/4038"
58+
},
59+
{
60+
"type": "FIX",
61+
"url": "https://github.com/kubeedge/kubeedge/pull/4039"
62+
},
63+
{
64+
"type": "FIX",
65+
"url": "https://github.com/kubeedge/kubeedge/pull/4042"
66+
}
67+
],
68+
"database_specific": {
69+
"url": "https://pkg.go.dev/vuln/GO-2022-0507",
70+
"review_status": "UNREVIEWED"
71+
}
72+
}

data/osv/GO-2022-0508.json

+60
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2022-0508",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2022-31074",
8+
"GHSA-w52j-3457-q9wr"
9+
],
10+
"summary": "KubeEdge Cloud AdmissionController component DoS in github.com/kubeedge/kubeedge",
11+
"details": "KubeEdge Cloud AdmissionController component DoS in github.com/kubeedge/kubeedge",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/kubeedge/kubeedge",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "1.9.4"
27+
},
28+
{
29+
"introduced": "1.10.0"
30+
},
31+
{
32+
"fixed": "1.10.2"
33+
},
34+
{
35+
"introduced": "1.11.0"
36+
},
37+
{
38+
"fixed": "1.11.1"
39+
}
40+
]
41+
}
42+
],
43+
"ecosystem_specific": {}
44+
}
45+
],
46+
"references": [
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://github.com/kubeedge/kubeedge/security/advisories/GHSA-w52j-3457-q9wr"
50+
},
51+
{
52+
"type": "ADVISORY",
53+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31074"
54+
}
55+
],
56+
"database_specific": {
57+
"url": "https://pkg.go.dev/vuln/GO-2022-0508",
58+
"review_status": "UNREVIEWED"
59+
}
60+
}

data/osv/GO-2022-0509.json

+60
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2022-0509",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2022-31075",
8+
"GHSA-x3px-2p95-f6jr"
9+
],
10+
"summary": "KubeEdge DoS when signing the CSR from EdgeCore in github.com/kubeedge/kubeedge",
11+
"details": "KubeEdge DoS when signing the CSR from EdgeCore in github.com/kubeedge/kubeedge",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/kubeedge/kubeedge",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "1.9.4"
27+
},
28+
{
29+
"introduced": "1.10.0"
30+
},
31+
{
32+
"fixed": "1.10.2"
33+
},
34+
{
35+
"introduced": "1.11.0"
36+
},
37+
{
38+
"fixed": "1.11.1"
39+
}
40+
]
41+
}
42+
],
43+
"ecosystem_specific": {}
44+
}
45+
],
46+
"references": [
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://github.com/kubeedge/kubeedge/security/advisories/GHSA-x3px-2p95-f6jr"
50+
},
51+
{
52+
"type": "ADVISORY",
53+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31075"
54+
}
55+
],
56+
"database_specific": {
57+
"url": "https://pkg.go.dev/vuln/GO-2022-0509",
58+
"review_status": "UNREVIEWED"
59+
}
60+
}

0 commit comments

Comments
 (0)