Skip to content

Commit 4191954

Browse files
committed
internal/report: sort references in Fix
Sort references by type, then alphabetically. Change-Id: Ia09085488f62829f5216c5cb90db680821afc1ea Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/585418 Reviewed-by: Damien Neil <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
1 parent 2122bde commit 4191954

36 files changed

+97
-90
lines changed

internal/cve4/testdata/cve/TestToReport/CVE-2020-9283.txtar

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,13 +20,13 @@ description: |-
2020
cves:
2121
- CVE-2020-9283
2222
references:
23-
- web: https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY
23+
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-9283
2424
- web: http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html
25+
- web: https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY
2526
- web: https://lists.debian.org/debian-lts-announce/2020/10/msg00014.html
2627
- web: https://lists.debian.org/debian-lts-announce/2020/11/msg00027.html
2728
- web: https://lists.debian.org/debian-lts-announce/2020/11/msg00031.html
2829
- web: https://lists.debian.org/debian-lts-announce/2023/06/msg00017.html
29-
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-9283
3030
source:
3131
id: CVE-2020-9283
3232
created: 1999-01-01T00:00:00Z

internal/cve4/testdata/cve/TestToReport/CVE-2021-27919.txtar

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,11 @@ description: |-
1818
cves:
1919
- CVE-2021-27919
2020
references:
21+
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-27919
2122
- web: https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
2223
- web: https://lists.fedoraproject.org/archives/list/[email protected]/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/
2324
- web: https://lists.fedoraproject.org/archives/list/[email protected]/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/
2425
- web: https://security.gentoo.org/glsa/202208-02
25-
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-27919
2626
notes:
2727
- fix: 'std: could not add vulnerable_at: not implemented for std/cmd'
2828
source:

internal/cve4/testdata/cve/TestToReport/CVE-2021-3115.txtar

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,12 @@ description: |-
1919
cves:
2020
- CVE-2021-3115
2121
references:
22-
- web: https://groups.google.com/g/golang-announce/c/mperVMGa98w
22+
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-3115
2323
- web: https://blog.go.dev/path-security
24+
- web: https://groups.google.com/g/golang-announce/c/mperVMGa98w
2425
- web: https://lists.fedoraproject.org/archives/list/[email protected]/message/YWAYJGXWC232SG3UR3TR574E6BP3OSQQ/
25-
- web: https://security.netapp.com/advisory/ntap-20210219-0001/
2626
- web: https://security.gentoo.org/glsa/202208-02
27-
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-3115
27+
- web: https://security.netapp.com/advisory/ntap-20210219-0001/
2828
notes:
2929
- fix: 'std: could not add vulnerable_at: not implemented for std/cmd'
3030
source:

internal/cve4/testdata/cve/TestToReport/CVE-2022-39213.txtar

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,10 +29,10 @@ description: |-
2929
cves:
3030
- CVE-2022-39213
3131
references:
32-
- web: https://github.com/pandatix/go-cvss/security/advisories/GHSA-xhmf-mmv2-4hhx
32+
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-39213
3333
- fix: https://github.com/pandatix/go-cvss/commit/d9d478ff0c13b8b09ace030db9262f3c2fe031f4
3434
- web: https://github.com/pandatix/go-cvss/blob/master/SECURITY.md
35-
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-39213
35+
- web: https://github.com/pandatix/go-cvss/security/advisories/GHSA-xhmf-mmv2-4hhx
3636
source:
3737
id: CVE-2022-39213
3838
created: 1999-01-01T00:00:00Z

internal/cve4/testdata/cve/TestToReport/CVE-2023-29407.txtar

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,13 +17,13 @@ description: |-
1717
tiled image with a height of 0 and a very large width can cause excessive CPU
1818
consumption, despite the image size (width * height) appearing to be zero.
1919
references:
20-
- report: https://go.dev/issue/61581
20+
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-29407
2121
- fix: https://go.dev/cl/514897
22-
- web: https://security.netapp.com/advisory/ntap-20230831-0009/
22+
- report: https://go.dev/issue/61581
2323
- web: https://lists.fedoraproject.org/archives/list/[email protected]/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/
2424
- web: https://lists.fedoraproject.org/archives/list/[email protected]/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/
2525
- web: https://lists.fedoraproject.org/archives/list/[email protected]/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/
26-
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-29407
26+
- web: https://security.netapp.com/advisory/ntap-20230831-0009/
2727
cve_metadata:
2828
id: CVE-2023-29407
2929
cwe: 'CWE-834: Excessive Iteration'

internal/cve4/testdata/cve/TestToReport/CVE-2023-44378.txtar

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,10 @@ description: |-
2424
cves:
2525
- CVE-2023-44378
2626
references:
27-
- web: https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg
28-
- report: https://github.com/zkopru-network/zkopru/issues/116
29-
- fix: https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f
3027
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-44378
28+
- fix: https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f
29+
- report: https://github.com/zkopru-network/zkopru/issues/116
30+
- web: https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg
3131
source:
3232
id: CVE-2023-44378
3333
created: 1999-01-01T00:00:00Z

internal/cve4/testdata/cve/TestToReport/CVE-2023-45141.txtar

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ description: |-
2626
cves:
2727
- CVE-2023-45141
2828
references:
29-
- web: https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p
3029
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-45141
30+
- web: https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p
3131
source:
3232
id: CVE-2023-45141
3333
created: 1999-01-01T00:00:00Z

internal/cve4/testdata/cve/TestToReport/CVE-2023-45283.txtar

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -27,14 +27,14 @@ description: |-
2727
in filepath.Clean(\?\c:) returning \?\c: rather than \?\c:\ (among other
2828
effects). The previous behavior has been restored.
2929
references:
30-
- report: https://go.dev/issue/63713
30+
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-45283
3131
- fix: https://go.dev/cl/540277
32-
- web: https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY
33-
- report: https://go.dev/issue/64028
3432
- fix: https://go.dev/cl/541175
35-
- web: https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ
33+
- report: https://go.dev/issue/63713
34+
- report: https://go.dev/issue/64028
3635
- web: http://www.openwall.com/lists/oss-security/2023/12/05/2
37-
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-45283
36+
- web: https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY
37+
- web: https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ
3838
cve_metadata:
3939
id: CVE-2023-45283
4040
cwe: 'CWE-41: Improper Resolution of Path Equivalence'

internal/cve4/testdata/cve/TestToReport/CVE-2023-45285.txtar

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,10 @@ description: |-
1818
module. This only affects users who are not using the module proxy and are
1919
fetching modules directly (i.e. GOPROXY=off).
2020
references:
21-
- web: https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ
22-
- report: https://go.dev/issue/63845
23-
- fix: https://go.dev/cl/540257
2421
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-45285
22+
- fix: https://go.dev/cl/540257
23+
- report: https://go.dev/issue/63845
24+
- web: https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ
2525
cve_metadata:
2626
id: CVE-2023-45285
2727
cwe: 'CWE-636: Not Failing Securely (''Failing Open'')'

internal/cve4/testdata/cve/TestToReport/CVE-2023-45286.txtar

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,10 @@ description: |-
2323
question is defined at package level scope, so a completely unrelated server
2424
could receive the request body.
2525
references:
26-
- report: https://github.com/go-resty/resty/issues/743
27-
- report: https://github.com/go-resty/resty/issues/739
28-
- fix: https://github.com/go-resty/resty/pull/745
2926
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-45286
27+
- fix: https://github.com/go-resty/resty/pull/745
28+
- report: https://github.com/go-resty/resty/issues/739
29+
- report: https://github.com/go-resty/resty/issues/743
3030
cve_metadata:
3131
id: CVE-2023-45286
3232
cwe: 'CWE-200: Exposure of Sensitive Information to an Unauthorized Actor'

internal/cve5/testdata/cve/TestToReport/CVE-2020-9283.txtar

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,13 +18,13 @@ description: |-
1818
cves:
1919
- CVE-2020-9283
2020
references:
21-
- web: https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY
21+
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-9283
2222
- web: http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html
23+
- web: https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY
2324
- web: https://lists.debian.org/debian-lts-announce/2020/10/msg00014.html
2425
- web: https://lists.debian.org/debian-lts-announce/2020/11/msg00027.html
2526
- web: https://lists.debian.org/debian-lts-announce/2020/11/msg00031.html
2627
- web: https://lists.debian.org/debian-lts-announce/2023/06/msg00017.html
27-
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-9283
2828
source:
2929
id: CVE-2020-9283
3030
created: 1999-01-01T00:00:00Z

internal/cve5/testdata/cve/TestToReport/CVE-2021-27919.txtar

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,11 @@ description: |-
1818
cves:
1919
- CVE-2021-27919
2020
references:
21+
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-27919
2122
- web: https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
2223
- web: https://lists.fedoraproject.org/archives/list/[email protected]/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/
2324
- web: https://lists.fedoraproject.org/archives/list/[email protected]/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/
2425
- web: https://security.gentoo.org/glsa/202208-02
25-
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-27919
2626
notes:
2727
- fix: 'std: could not add vulnerable_at: not implemented for std/cmd'
2828
source:

internal/cve5/testdata/cve/TestToReport/CVE-2021-3115.txtar

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,12 @@ description: |-
1919
cves:
2020
- CVE-2021-3115
2121
references:
22-
- web: https://groups.google.com/g/golang-announce/c/mperVMGa98w
22+
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-3115
2323
- web: https://blog.go.dev/path-security
24+
- web: https://groups.google.com/g/golang-announce/c/mperVMGa98w
2425
- web: https://lists.fedoraproject.org/archives/list/[email protected]/message/YWAYJGXWC232SG3UR3TR574E6BP3OSQQ/
25-
- web: https://security.netapp.com/advisory/ntap-20210219-0001/
2626
- web: https://security.gentoo.org/glsa/202208-02
27-
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-3115
27+
- web: https://security.netapp.com/advisory/ntap-20210219-0001/
2828
notes:
2929
- fix: 'cmd: could not add vulnerable_at: not implemented for std/cmd'
3030
source:

internal/cve5/testdata/cve/TestToReport/CVE-2022-39213.txtar

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,10 +30,10 @@ description: |-
3030
cves:
3131
- CVE-2022-39213
3232
references:
33-
- web: https://github.com/pandatix/go-cvss/security/advisories/GHSA-xhmf-mmv2-4hhx
33+
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-39213
3434
- fix: https://github.com/pandatix/go-cvss/commit/d9d478ff0c13b8b09ace030db9262f3c2fe031f4
3535
- web: https://github.com/pandatix/go-cvss/blob/master/SECURITY.md
36-
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-39213
36+
- web: https://github.com/pandatix/go-cvss/security/advisories/GHSA-xhmf-mmv2-4hhx
3737
source:
3838
id: CVE-2022-39213
3939
created: 1999-01-01T00:00:00Z

internal/cve5/testdata/cve/TestToReport/CVE-2023-29407.txtar

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,13 +27,13 @@ description: |-
2727
credits:
2828
- Philippe Antoine (Catena cyber)
2929
references:
30-
- report: https://go.dev/issue/61581
30+
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-29407
3131
- fix: https://go.dev/cl/514897
32-
- web: https://security.netapp.com/advisory/ntap-20230831-0009/
32+
- report: https://go.dev/issue/61581
3333
- web: https://lists.fedoraproject.org/archives/list/[email protected]/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/
3434
- web: https://lists.fedoraproject.org/archives/list/[email protected]/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/
3535
- web: https://lists.fedoraproject.org/archives/list/[email protected]/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/
36-
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-29407
36+
- web: https://security.netapp.com/advisory/ntap-20230831-0009/
3737
cve_metadata:
3838
id: CVE-2023-29407
3939
cwe: 'CWE-834: Excessive Iteration'

internal/cve5/testdata/cve/TestToReport/CVE-2023-44378.txtar

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,10 +26,10 @@ description: |-
2626
cves:
2727
- CVE-2023-44378
2828
references:
29-
- web: https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg
30-
- report: https://github.com/zkopru-network/zkopru/issues/116
31-
- fix: https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f
3229
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-44378
30+
- fix: https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f
31+
- report: https://github.com/zkopru-network/zkopru/issues/116
32+
- web: https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg
3333
source:
3434
id: CVE-2023-44378
3535
created: 1999-01-01T00:00:00Z

internal/cve5/testdata/cve/TestToReport/CVE-2023-45141.txtar

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ description: |-
2626
cves:
2727
- CVE-2023-45141
2828
references:
29-
- web: https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p
3029
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-45141
30+
- web: https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p
3131
source:
3232
id: CVE-2023-45141
3333
created: 1999-01-01T00:00:00Z

internal/cve5/testdata/cve/TestToReport/CVE-2023-45283.txtar

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -86,14 +86,14 @@ description: |-
8686
in filepath.Clean(\?\c:) returning \?\c: rather than \?\c:\ (among other
8787
effects). The previous behavior has been restored.
8888
references:
89-
- report: https://go.dev/issue/63713
89+
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-45283
9090
- fix: https://go.dev/cl/540277
91-
- web: https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY
92-
- report: https://go.dev/issue/64028
9391
- fix: https://go.dev/cl/541175
94-
- web: https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ
92+
- report: https://go.dev/issue/63713
93+
- report: https://go.dev/issue/64028
9594
- web: http://www.openwall.com/lists/oss-security/2023/12/05/2
96-
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-45283
95+
- web: https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY
96+
- web: https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ
9797
cve_metadata:
9898
id: CVE-2023-45283
9999
cwe: 'CWE-41: Improper Resolution of Path Equivalence'

internal/cve5/testdata/cve/TestToReport/CVE-2023-45285.txtar

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,10 @@ description: |-
2424
credits:
2525
- David Leadbeater
2626
references:
27-
- web: https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ
28-
- report: https://go.dev/issue/63845
29-
- fix: https://go.dev/cl/540257
3027
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-45285
28+
- fix: https://go.dev/cl/540257
29+
- report: https://go.dev/issue/63845
30+
- web: https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ
3131
cve_metadata:
3232
id: CVE-2023-45285
3333
cwe: 'CWE-636: Not Failing Securely (''Failing Open'')'

internal/cve5/testdata/cve/TestToReport/CVE-2023-45286.txtar

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,10 @@ description: |-
4040
credits:
4141
- Logan Attwood (@lattwood)
4242
references:
43-
- report: https://github.com/go-resty/resty/issues/743
44-
- report: https://github.com/go-resty/resty/issues/739
45-
- fix: https://github.com/go-resty/resty/pull/745
4643
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-45286
44+
- fix: https://github.com/go-resty/resty/pull/745
45+
- report: https://github.com/go-resty/resty/issues/739
46+
- report: https://github.com/go-resty/resty/issues/743
4747
cve_metadata:
4848
id: CVE-2023-45286
4949
cwe: 'CWE-200: Exposure of Sensitive Information to an Unauthorized Actor'

internal/genericosv/testdata/yaml/GHSA-28r2-q6m8-9hpx.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,16 +29,16 @@ cves:
2929
ghsas:
3030
- GHSA-28r2-q6m8-9hpx
3131
references:
32+
- advisory: https://github.com/advisories/GHSA-28r2-q6m8-9hpx
3233
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-30323
33-
- fix: https://github.com/hashicorp/go-getter/pull/359
34-
- fix: https://github.com/hashicorp/go-getter/pull/361
3534
- fix: https://github.com/hashicorp/go-getter/commit/38e97387488f5439616be60874979433a12edb48
3635
- fix: https://github.com/hashicorp/go-getter/commit/a2ebce998f8d4105bd4b78d6c99a12803ad97a45
36+
- fix: https://github.com/hashicorp/go-getter/pull/359
37+
- fix: https://github.com/hashicorp/go-getter/pull/361
3738
- web: https://discuss.hashicorp.com
3839
- web: https://discuss.hashicorp.com/t/hcsec-2022-13-multiple-vulnerabilities-in-go-getter-library/
3940
- web: https://discuss.hashicorp.com/t/hcsec-2022-13-multiple-vulnerabilities-in-go-getter-library/39930
4041
- web: https://github.com/hashicorp/go-getter/releases
41-
- advisory: https://github.com/advisories/GHSA-28r2-q6m8-9hpx
4242
source:
4343
id: GHSA-28r2-q6m8-9hpx
4444
created: 1999-01-01T00:00:00Z

internal/genericosv/testdata/yaml/GHSA-33m6-q9v5-62r7.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,9 +49,9 @@ ghsas:
4949
references:
5050
- advisory: https://github.com/hpcng/sif/security/advisories/GHSA-33m6-q9v5-62r7
5151
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-3538
52-
- report: https://github.com/satori/go.uuid/issues/73
53-
- fix: https://github.com/satori/go.uuid/pull/75
5452
- fix: https://github.com/satori/go.uuid/commit/75cca531ea763666bc46e531da3b4c3b95f64557
53+
- fix: https://github.com/satori/go.uuid/pull/75
54+
- report: https://github.com/satori/go.uuid/issues/73
5555
- web: https://bugzilla.redhat.com/show_bug.cgi?id=1954376
5656
- web: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSATORIGOUUID-72488
5757
notes:

internal/genericosv/testdata/yaml/GHSA-3hwm-922r-47hw.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,8 @@ ghsas:
1919
- GHSA-3hwm-922r-47hw
2020
references:
2121
- advisory: https://github.com/42Atomys/stud42/security/advisories/GHSA-3hwm-922r-47hw
22-
- web: https://github.com/42Atomys/stud42/issues/412
2322
- web: https://github.com/42Atomys/stud42/commit/a70bfc72fba721917bf681d72a58093fb9deee17
23+
- web: https://github.com/42Atomys/stud42/issues/412
2424
source:
2525
id: GHSA-3hwm-922r-47hw
2626
created: 1999-01-01T00:00:00Z

internal/genericosv/testdata/yaml/GHSA-3wq5-3f56-v5xc.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,9 +23,9 @@ cves:
2323
ghsas:
2424
- GHSA-3wq5-3f56-v5xc
2525
references:
26+
- advisory: https://github.com/advisories/GHSA-3wq5-3f56-v5xc
2627
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-1777
2728
- web: https://mattermost.com/security-updates/
28-
- advisory: https://github.com/advisories/GHSA-3wq5-3f56-v5xc
2929
notes:
3030
- fix: 'github.com/mattermost/mattermost-server/v6: could not add vulnerable_at: version 7.1.6 does not exist'
3131
- lint: 'modules[1] "github.com/mattermost/mattermost-server/v6": version 7.1.6 does not exist'

internal/genericosv/testdata/yaml/GHSA-54q4-74p3-mgcw.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ cves:
1616
ghsas:
1717
- GHSA-54q4-74p3-mgcw
1818
references:
19+
- advisory: https://github.com/advisories/GHSA-54q4-74p3-mgcw
1920
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-38867
2021
- report: https://github.com/zhaojh329/rttys/issues/117
21-
- advisory: https://github.com/advisories/GHSA-54q4-74p3-mgcw
2222
source:
2323
id: GHSA-54q4-74p3-mgcw
2424
created: 1999-01-01T00:00:00Z

internal/genericosv/testdata/yaml/GHSA-66p8-j459-rq63.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,9 +39,9 @@ ghsas:
3939
- GHSA-66p8-j459-rq63
4040
references:
4141
- advisory: https://github.com/pterodactyl/wings/security/advisories/GHSA-66p8-j459-rq63
42-
- web: https://github.com/pterodactyl/wings/security/advisories/GHSA-p8r3-83r8-jwj5
4342
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-25168
4443
- fix: https://github.com/pterodactyl/wings/commit/429ac62dba22997a278bc709df5ac00a5a25d83d
44+
- web: https://github.com/pterodactyl/wings/security/advisories/GHSA-p8r3-83r8-jwj5
4545
notes:
4646
- lint: 'description: possible markdown formatting (found ### )'
4747
- lint: 'description: possible markdown formatting (found [`GHSA-p8r3-83r8-jwj5`](https://github.com/pterodactyl/wings/security/advisories/GHSA-p8r3-83r8-jwj5))'

internal/genericosv/testdata/yaml/GHSA-6qfg-8799-r575.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,11 +29,11 @@ cves:
2929
ghsas:
3030
- GHSA-6qfg-8799-r575
3131
references:
32+
- advisory: https://github.com/advisories/GHSA-6qfg-8799-r575
3233
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2019-11251
33-
- report: https://github.com/kubernetes/kubernetes/issues/87773
3434
- fix: https://github.com/kubernetes/kubernetes/pull/82143
35+
- report: https://github.com/kubernetes/kubernetes/issues/87773
3536
- web: https://groups.google.com/d/msg/kubernetes-announce/YYtEFdFimZ4/nZnOezZuBgAJ
36-
- advisory: https://github.com/advisories/GHSA-6qfg-8799-r575
3737
source:
3838
id: GHSA-6qfg-8799-r575
3939
created: 1999-01-01T00:00:00Z

internal/genericosv/testdata/yaml/GHSA-7fxj-fr3v-r9gj.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,11 @@ cves:
2020
ghsas:
2121
- GHSA-7fxj-fr3v-r9gj
2222
references:
23+
- advisory: https://github.com/advisories/GHSA-7fxj-fr3v-r9gj
2324
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-3023
2425
- fix: https://github.com/pingcap/tidb/commit/d0376379d615cc8f263a0b17c031ce403c8dcbfb
2526
- web: https://advisory.dw1.io/45
2627
- web: https://huntr.dev/bounties/120f1346-e958-49d0-b66c-0f889a469540
27-
- advisory: https://github.com/advisories/GHSA-7fxj-fr3v-r9gj
2828
source:
2929
id: GHSA-7fxj-fr3v-r9gj
3030
created: 1999-01-01T00:00:00Z

0 commit comments

Comments
 (0)