reports: reformat

Run `vulnreport format` on all reports.

Change-Id: I442d0a3b12bf9a6e2e6b5c3ff5e201313d3929a1
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/382515
Trust: Jonathan Amsterdam <jba@google.com>
Run-TryBot: Jonathan Amsterdam <jba@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Julie Qiu <julie@golang.org>
diff --git a/reports/GO-2020-0012.yaml b/reports/GO-2020-0012.yaml
index 162228d..1753588 100644
--- a/reports/GO-2020-0012.yaml
+++ b/reports/GO-2020-0012.yaml
@@ -3,10 +3,10 @@
 versions:
   - fixed: v0.0.0-20200220183623-bac4c82f6975
 description: |
-  An attacker can craft an ssh-ed25519 or sk-ssh-ed25519@openssh.com public
-  key, such that the library will panic when trying to verify a signature
-  with it. If verifying signatures using user supplied public keys, this
-  may be used as a denial of service vector.
+    An attacker can craft an ssh-ed25519 or sk-ssh-ed25519@openssh.com public
+    key, such that the library will panic when trying to verify a signature
+    with it. If verifying signatures using user supplied public keys, this
+    may be used as a denial of service vector.
 cves:
   - CVE-2020-9283
 credit: Alex Gaynor, Fish in a Barrel
@@ -17,7 +17,7 @@
   - skEd25519PublicKey.Verify
   - NewPublicKey
 links:
-  pr: https://go-review.googlesource.com/c/crypto/+/220357
-  commit: https://go.googlesource.com/crypto/+/bac4c82f69751a6dd76e702d54b3ceb88adab236
-  context:
-    - https://groups.google.com/g/golang-announce/c/3L45YRc91SY
+    pr: https://go-review.googlesource.com/c/crypto/+/220357
+    commit: https://go.googlesource.com/crypto/+/bac4c82f69751a6dd76e702d54b3ceb88adab236
+    context:
+      - https://groups.google.com/g/golang-announce/c/3L45YRc91SY