commit | af59454a8a0a42ff9d84df1a73c4248f60a5d9b6 | [log] [tgz] |
---|---|---|
author | Zvonimir Pavlinovic <zpavlinovic@google.com> | Mon Dec 12 09:44:17 2022 -0800 |
committer | Zvonimir Pavlinovic <zpavlinovic@google.com> | Mon Dec 12 18:28:31 2022 +0000 |
tree | a3f522ed5117f02debbcd37030a7f5a65d9e643c | |
parent | 42b5c9d0c6c92325e234a7c6119a6d8c9d6577d9 [diff] |
cmd/govulncheck/integration: change expectations due to db changes Adds "http2serverConn.canonicalHeader" as a vulnerable symbol that should be detected in scanner binary. This symbol has been added in GO-2022-1144. See https://go-review.git.corp.google.com/c/vulndb/+/456057. Change-Id: If62c1b4fbfe1a2b10d0b7327355d5ce00b7ff701 Reviewed-on: https://go-review.googlesource.com/c/vuln/+/456895 TryBot-Result: Gopher Robot <gobot@golang.org> Run-TryBot: Zvonimir Pavlinovic <zpavlinovic@google.com> Reviewed-by: Julie Qiu <julieqiu@google.com> Reviewed-by: Jonathan Amsterdam <jba@google.com>
This repository contains packages for accessing and analyzing data from the Go Vulnerability Database. It contains the following:
Check out https://go.dev/security/vuln for more information about the Go vulnerability management system.
The privacy policy for govulncheck
can be found at https://vuln.go.dev/privacy.
Unless otherwise noted, the Go source files are distributed under the BSD-style license found in the LICENSE file.
Database entries available at https://vuln.go.dev are distributed under the terms of the CC-BY 4.0 license.