reports: reformat
Run `vulnreport format` on all reports.
Change-Id: I442d0a3b12bf9a6e2e6b5c3ff5e201313d3929a1
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/382515
Trust: Jonathan Amsterdam <jba@google.com>
Run-TryBot: Jonathan Amsterdam <jba@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Julie Qiu <julie@golang.org>
diff --git a/reports/GO-2020-0012.yaml b/reports/GO-2020-0012.yaml
index 162228d..1753588 100644
--- a/reports/GO-2020-0012.yaml
+++ b/reports/GO-2020-0012.yaml
@@ -3,10 +3,10 @@
versions:
- fixed: v0.0.0-20200220183623-bac4c82f6975
description: |
- An attacker can craft an ssh-ed25519 or sk-ssh-ed25519@openssh.com public
- key, such that the library will panic when trying to verify a signature
- with it. If verifying signatures using user supplied public keys, this
- may be used as a denial of service vector.
+ An attacker can craft an ssh-ed25519 or sk-ssh-ed25519@openssh.com public
+ key, such that the library will panic when trying to verify a signature
+ with it. If verifying signatures using user supplied public keys, this
+ may be used as a denial of service vector.
cves:
- CVE-2020-9283
credit: Alex Gaynor, Fish in a Barrel
@@ -17,7 +17,7 @@
- skEd25519PublicKey.Verify
- NewPublicKey
links:
- pr: https://go-review.googlesource.com/c/crypto/+/220357
- commit: https://go.googlesource.com/crypto/+/bac4c82f69751a6dd76e702d54b3ceb88adab236
- context:
- - https://groups.google.com/g/golang-announce/c/3L45YRc91SY
+ pr: https://go-review.googlesource.com/c/crypto/+/220357
+ commit: https://go.googlesource.com/crypto/+/bac4c82f69751a6dd76e702d54b3ceb88adab236
+ context:
+ - https://groups.google.com/g/golang-announce/c/3L45YRc91SY