commit | 0c30e729e68a0572faed7805a1b6d100c8c8b73f | [log] [tgz] |
---|---|---|
author | Tatiana Bradley <tatianabradley@google.com> | Mon Dec 11 11:46:57 2023 -0500 |
committer | Tatiana Bradley <tatianabradley@google.com> | Mon Dec 11 21:16:41 2023 +0000 |
tree | 1d3c93e67b9330f4bb11d5d9a1d4d4e2cc4a3d8a | |
parent | 45849082aa7fca3ca5677bf886680e760ff319f5 [diff] |
data/reports: update GO-2022-0493.yaml Exclude symbol Access, which uses Faccessat in a non-vulnerable way. Aliases: CVE-2022-29526, GHSA-p782-xgp4-8hr8 Updates golang/vulndb#493 Change-Id: I7a7d11815607d02d307515f935481eaf5eae2a56 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/548836 Reviewed-by: Damien Neil <dneil@google.com> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
This repository contains the infrastructure and internal reports to create the Go Vulnerability Database.
Check out https://go.dev/security/vuln for more information about the Go vulnerability management system.
Click here to report a public vulnerability in the Go ecosystem, or give feedback about the project.
The privacy policy for govulncheck
can be found at https://vuln.go.dev/privacy.
Unless otherwise noted, the Go source files are distributed under the BSD-style license found in the LICENSE file.
Database entries are distributed under the terms of the CC-BY-4.0 license. See go.dev/security/vuln/database for information on how to access these entries.