Skip to content

Commit dce001e

Browse files
committed
data/reports: add GHSA to GO-2022-0965.yaml
Aliases: GHSA-74fp-r6jw-h4mp Updates #965 Fixes #1538 Change-Id: I383dea54817354e002a0738dfb699cf2d351f577 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/467438 Reviewed-by: David Chase <[email protected]> Reviewed-by: Damien Neil <[email protected]> Run-TryBot: Tatiana Bradley <[email protected]> TryBot-Result: Gopher Robot <[email protected]>
1 parent 0a8e819 commit dce001e

File tree

2 files changed

+5
-0
lines changed

2 files changed

+5
-0
lines changed

data/osv/GO-2022-0965.json

+3
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,9 @@
22
"id": "GO-2022-0965",
33
"published": "2022-09-02T21:12:51Z",
44
"modified": "0001-01-01T00:00:00Z",
5+
"aliases": [
6+
"GHSA-74fp-r6jw-h4mp"
7+
],
58
"details": "Unbounded recursion in JSON parsing allows malicious JSON input to cause excessive memory consumption or panics.",
69
"affected": [
710
{

data/reports/GO-2022-0965.yaml

+2
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,8 @@ description: |-
1717
Unbounded recursion in JSON parsing allows malicious JSON input to
1818
cause excessive memory consumption or panics.
1919
published: 2022-09-02T21:12:51Z
20+
ghsas:
21+
- GHSA-74fp-r6jw-h4mp
2022
references:
2123
- fix: https://github.com/kubernetes/kubernetes/pull/83261
2224
- web: https://github.com/advisories/GHSA-pmqp-h87c-mr78

0 commit comments

Comments
 (0)