You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We currently have a lint check that enforces that only one of cve and cve_metadata is populated. This is based on the assumption that if a CVE was already assigned to a vuln, then the Go CNA would not have assigned a CVE. However, it is possible for the Go CNA to assign a CVE and for a third party to later assign an (essentially duplicate) CVE to the same vuln. We haven't yet seen this happen, but if it does we should account for it.
The text was updated successfully, but these errors were encountered:
Allow YAML reports to populate both "cves" and "cve_metadata". This is
needed for GO-2023-2102.
For golang/go#61184
Change-Id: I920eb2a0cffc0007cca31a52bd1edfe8ee1dd40d
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/534239
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Reviewed-by: Damien Neil <dneil@google.com>
We currently have a lint check that enforces that only one of cve and cve_metadata is populated. This is based on the assumption that if a CVE was already assigned to a vuln, then the Go CNA would not have assigned a CVE. However, it is possible for the Go CNA to assign a CVE and for a third party to later assign an (essentially duplicate) CVE to the same vuln. We haven't yet seen this happen, but if it does we should account for it.
The text was updated successfully, but these errors were encountered: