Skip to content

Commit f06b8a7

Browse files
tatianabTatiana Bradley
authored andcommitted
data/reports: add alias for GO-2022-0391.yaml
Aliases: CVE-2022-2582, GHSA-76wf-9vgp-pj7w, GHSA-6jvc-q2x7-pchv Updates #391 Fixes #1223 Change-Id: I1b7eaf8a3559d3a95fec83083a66d6d67018c25b Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/461440 Run-TryBot: Tatiana Bradley <tatiana@golang.org> Reviewed-by: Damien Neil <dneil@google.com> Reviewed-by: Tatiana Bradley <tatiana@golang.org> TryBot-Result: Gopher Robot <gobot@golang.org>
1 parent b5fd950 commit f06b8a7

File tree

2 files changed

+3
-1
lines changed

2 files changed

+3
-1
lines changed

data/osv/GO-2022-0391.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@
44
"modified": "0001-01-01T00:00:00Z",
55
"aliases": [
66
"CVE-2022-2582",
7-
"GHSA-76wf-9vgp-pj7w"
7+
"GHSA-76wf-9vgp-pj7w",
8+
"GHSA-6jvc-q2x7-pchv"
89
],
910
"details": "The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker.\n\nAWS now blocks this metadata field, but older SDK versions still send it.",
1011
"affected": [

data/reports/GO-2022-0391.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@ description: |
2828
published: 2022-07-01T20:10:56Z
2929
ghsas:
3030
- GHSA-76wf-9vgp-pj7w
31+
- GHSA-6jvc-q2x7-pchv
3132
references:
3233
- fix: https://github.com/aws/aws-sdk-go/commit/35fa6ddf45c061e0f08d3a3b5119f8f4da38f6d1
3334
cve_metadata:

0 commit comments

Comments
 (0)