-
Notifications
You must be signed in to change notification settings - Fork 17.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x/vulndb: check product data for module paths #49461
Labels
NeedsInvestigation
Someone must examine and confirm this is a valid issue and not a duplicate of an existing one.
vulncheck or vulndb
Issues for the x/vuln or x/vulndb repo
Milestone
Comments
Change https://golang.org/cl/369745 mentions this issue: |
Change https://golang.org/cl/369746 mentions this issue: |
gopherbot
pushed a commit
to golang/vuln
that referenced
this issue
Dec 14, 2021
The CVE triage logic now uses snyk.io Go URLs as a heuristics for determining if a CVE is a Go vulnerability. For golang/go#49461 Change-Id: I308023bddb744947f53311bbce31340c9dd6886d Reviewed-on: https://go-review.googlesource.com/c/vuln/+/369746 Trust: Julie Qiu <julie@golang.org> Run-TryBot: Julie Qiu <julie@golang.org> Reviewed-by: Jonathan Amsterdam <jba@google.com> TryBot-Result: Gopher Robot <gobot@golang.org>
softdev050
added a commit
to softdev050/Golangvuln
that referenced
this issue
Apr 5, 2023
The CVE triage logic now uses snyk.io Go URLs as a heuristics for determining if a CVE is a Go vulnerability. For golang/go#49461 Change-Id: I308023bddb744947f53311bbce31340c9dd6886d Reviewed-on: https://go-review.googlesource.com/c/vuln/+/369746 Trust: Julie Qiu <julie@golang.org> Run-TryBot: Julie Qiu <julie@golang.org> Reviewed-by: Jonathan Amsterdam <jba@google.com> TryBot-Result: Gopher Robot <gobot@golang.org>
sayjun0505
added a commit
to sayjun0505/Golangvuln
that referenced
this issue
Apr 8, 2023
The CVE triage logic now uses snyk.io Go URLs as a heuristics for determining if a CVE is a Go vulnerability. For golang/go#49461 Change-Id: I308023bddb744947f53311bbce31340c9dd6886d Reviewed-on: https://go-review.googlesource.com/c/vuln/+/369746 Trust: Julie Qiu <julie@golang.org> Run-TryBot: Julie Qiu <julie@golang.org> Reviewed-by: Jonathan Amsterdam <jba@google.com> TryBot-Result: Gopher Robot <gobot@golang.org>
stanislavkononiuk
added a commit
to stanislavkononiuk/Golangvuln
that referenced
this issue
Jun 26, 2023
The CVE triage logic now uses snyk.io Go URLs as a heuristics for determining if a CVE is a Go vulnerability. For golang/go#49461 Change-Id: I308023bddb744947f53311bbce31340c9dd6886d Reviewed-on: https://go-review.googlesource.com/c/vuln/+/369746 Trust: Julie Qiu <julie@golang.org> Run-TryBot: Julie Qiu <julie@golang.org> Reviewed-by: Jonathan Amsterdam <jba@google.com> TryBot-Result: Gopher Robot <gobot@golang.org>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
NeedsInvestigation
Someone must examine and confirm this is a valid issue and not a duplicate of an existing one.
vulncheck or vulndb
Issues for the x/vuln or x/vulndb repo
For example, https://github.com/CVEProject/cvelist/blob/master/2020/7xxx/CVE-2020-7668.json lists the module path in its product data. It is not listed in the references section.
Also if there is a synk URL, we should check for the term GOLANG.
The text was updated successfully, but these errors were encountered: