Skip to content

Commit 3859e52

Browse files
committed
data/reports: add GO-2022-0965.yaml
Fixes #965 Change-Id: I9264290c514657fb559301bb1d34c57b4a597945 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/428038 Run-TryBot: Damien Neil <dneil@google.com> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Tatiana Bradley <tatiana@golang.org>
1 parent 9abc6be commit 3859e52

File tree

1 file changed

+22
-0
lines changed

1 file changed

+22
-0
lines changed

data/reports/GO-2022-0965.yaml

+22
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
modules:
2+
- module: k8s.io/apimachinery
3+
versions:
4+
- fixed: 0.0.0-20190927203648-9ce6eca90e73
5+
vulnerable_at: 0.0.0-20190925125216-3ddb1b485b38
6+
packages:
7+
- package: k8s.io/apimachinery/pkg/runtime/serializer/json
8+
symbols:
9+
- customNumberDecoder.Decode
10+
derived_symbols:
11+
- Serializer.Decode
12+
- Serializer.Encode
13+
- package: k8s.io/apimachinery/pkg/util/json
14+
symbols:
15+
- Unmarshal
16+
description: |-
17+
Unbounded recursion in JSON parsing allows malicious JSON input to
18+
cause excessive memory consumption or panics.
19+
references:
20+
- fix: https://github.com/kubernetes/kubernetes/pull/83261
21+
- web: https://github.com/advisories/GHSA-pmqp-h87c-mr78
22+
- web: https://nvd.nist.gov/vuln/detail/CVE-2019-11253

0 commit comments

Comments
 (0)