data/reports: add alias for GO-2022-0979.yaml
Aliases: CVE-2022-3346, GHSA-87mm-qxm5-cp3f
Updates golang/vulndb#979
Fixes golang/vulndb#1273
Change-Id: Ia84913135828239a8fd2417d0fbf34b05ff58143
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/461475
Run-TryBot: Tatiana Bradley <tatiana@golang.org>
Reviewed-by: Damien Neil <dneil@google.com>
Reviewed-by: Tatiana Bradley <tatiana@golang.org>
TryBot-Result: Gopher Robot <gobot@golang.org>
diff --git a/data/osv/GO-2022-0979.json b/data/osv/GO-2022-0979.json
index b95b5f2..78b419c 100644
--- a/data/osv/GO-2022-0979.json
+++ b/data/osv/GO-2022-0979.json
@@ -3,7 +3,8 @@
"published": "0001-01-01T00:00:00Z",
"modified": "0001-01-01T00:00:00Z",
"aliases": [
- "CVE-2022-3346"
+ "CVE-2022-3346",
+ "GHSA-87mm-qxm5-cp3f"
],
"details": "DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records.\n\nThe owner name of RRSIG RRs is not validated, permitting an attacker to present the RRSIG for an attacker-controlled domain in a response for any other domain.",
"affected": [
diff --git a/data/reports/GO-2022-0979.yaml b/data/reports/GO-2022-0979.yaml
index d754395..595fb62 100644
--- a/data/reports/GO-2022-0979.yaml
+++ b/data/reports/GO-2022-0979.yaml
@@ -11,6 +11,8 @@
The owner name of RRSIG RRs is not validated, permitting an attacker
to present the RRSIG for an attacker-controlled domain in a response
for any other domain.
+ghsas:
+ - GHSA-87mm-qxm5-cp3f
references:
- report: https://github.com/peterzen/goresolver/issues/5
cve_metadata: