commit | b5cb765df41202f54bfedaa2e8cbda9e1ffbee58 | [log] [tgz] |
---|---|---|
author | Damien Neil <dneil@google.com> | Thu Aug 18 15:09:12 2022 -0700 |
committer | Damien Neil <dneil@google.com> | Fri Aug 19 16:42:58 2022 +0000 |
tree | 2d3a2b9a5d0c10c4d7a18abf5bb0e27579626d42 | |
parent | 703236d8e94eeb3dbc7521f7bd113b9c0d1df43a [diff] [blame] |
data: update reports for OSV schema changes Change-Id: I381c0225514627719d103395580f3b2d8d8efc2d Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/424899 Reviewed-by: Julie Qiu <julieqiu@google.com>
diff --git a/data/reports/GO-2022-0213.yaml b/data/reports/GO-2022-0213.yaml index 900a27f..53b78be 100644 --- a/data/reports/GO-2022-0213.yaml +++ b/data/reports/GO-2022-0213.yaml
@@ -1,12 +1,13 @@ -packages: +modules: - module: std - package: crypto/dsa - symbols: - - Verify versions: - fixed: 1.12.11 - introduced: 1.13.0 fixed: 1.13.2 + packages: + - package: crypto/dsa + symbols: + - Verify description: | Invalid DSA public keys can cause a panic in dsa.Verify. In particular, using crypto/x509.Verify on a crafted X.509 certificate chain can lead to a