commit | f76caa26ae6a3a071997fe08e73a55a8ff2d31a4 | [log] [tgz] |
---|---|---|
author | Damien Neil <dneil@google.com> | Wed Jun 15 15:48:07 2022 -0700 |
committer | Damien Neil <dneil@google.com> | Wed Jun 15 23:30:48 2022 +0000 |
tree | 73c139035f5c56c3b17c54d4497491509eab17e2 | |
parent | 8a80fd9e7835802f59f79a69e53e79e01f45dfa5 [diff] |
cmd/vulnreport: check for presence of symbols in fix The "vulnreport fix" command now verifies that all symbols are present in the vulnerable package. The "vulnreport fix" command now only adds symbols to the derived_symbols field if they aren't already present in the symbols field. Change-Id: I1a1f1e44e92e66a4c3b141dbff9b8e8fea265870 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/412536 Run-TryBot: Damien Neil <dneil@google.com> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Julie Qiu <julieqiu@google.com>
This repository contains the reports for the Go Vulnerability Database.
If you are interested accessing data from the Go Vulnerability Database, see x/vuln for information. This repository is only used for adding new vulnerabilities.
We are not accepting new vulnerability reports at this time. We will update this README.md once we are ready to receive reports.
Unless otherwise noted, the Go source files are distributed under the BSD-style license found in the LICENSE file.
Database entries are distributed under the terms of the CC-BY 4.0 license. See x/vuln for information on how to access these entries.