data/reports: update GO-2022-0220.yaml

Remove symbols for runtime package.

Aliases: CVE-2019-9634

Updates golang/vulndb#220

Change-Id: Ia886ab9842646bcb647f7ad3ef963b0773775d04
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/569795
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Reviewed-by: Zvonimir Pavlinovic <zpavlinovic@google.com>
diff --git a/data/osv/GO-2022-0220.json b/data/osv/GO-2022-0220.json
index 14f1596..824dcad 100644
--- a/data/osv/GO-2022-0220.json
+++ b/data/osv/GO-2022-0220.json
@@ -39,11 +39,6 @@
             "path": "runtime",
             "goos": [
               "windows"
-            ],
-            "symbols": [
-              "loadOptionalSyscalls",
-              "osinit",
-              "syscall_loadsystemlibrary"
             ]
           },
           {
diff --git a/data/reports/GO-2022-0220.yaml b/data/reports/GO-2022-0220.yaml
index 375db80..c0c06a9 100644
--- a/data/reports/GO-2022-0220.yaml
+++ b/data/reports/GO-2022-0220.yaml
@@ -10,17 +10,11 @@
         - package: runtime
           goos:
             - windows
-          symbols:
-            - loadOptionalSyscalls
-            - osinit
-            - syscall_loadsystemlibrary
-          skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
         - package: syscall
           goos:
             - windows
           symbols:
             - LoadDLL
-          skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
 summary: DLL injection on Windows in runtime and syscall
 description: |-
     Go on Windows misused certain LoadLibrary functionality, leading to DLL