github.com/wolfi-dev/wolfictl@v0.16.11/pkg/advisory/testdata/secdb/advisories/openssl.advisories.yaml (about)

     1  schema-version: "2"
     2  
     3  package:
     4    name: openssl
     5  
     6  advisories:
     7    - id: CVE-2022-3996
     8      events:
     9        - timestamp: 2022-12-22T17:26:45Z
    10          type: fixed
    11          data:
    12            fixed-version: 3.0.7-r1
    13  
    14    - id: CVE-2023-0286
    15      events:
    16        - timestamp: 2023-02-07T11:49:30.049397-05:00
    17          type: fixed
    18          data:
    19            fixed-version: 3.0.8-r0
    20  
    21    - id: CVE-2023-0215
    22      events:
    23        - timestamp: 2023-02-07T11:50:08.401769-05:00
    24          type: fixed
    25          data:
    26            fixed-version: 3.0.8-r0
    27  
    28    - id: CVE-2023-0216
    29      events:
    30        - timestamp: 2023-02-07T11:50:29.806824-05:00
    31          type: fixed
    32          data:
    33            fixed-version: 3.0.8-r0
    34  
    35    - id: CVE-2023-0217
    36      events:
    37        - timestamp: 2023-02-07T11:50:39.207629-05:00
    38          type: fixed
    39          data:
    40            fixed-version: 3.0.8-r0
    41  
    42    - id: CVE-2022-3602
    43      events:
    44        - timestamp: 2022-11-01T16:49:56Z
    45          type: fixed
    46          data:
    47            fixed-version: 3.0.7-r0
    48  
    49    - id: CVE-2022-3786
    50      events:
    51        - timestamp: 2022-11-01T16:49:56Z
    52          type: fixed
    53          data:
    54            fixed-version: 3.0.7-r0
    55  
    56    - id: CVE-2022-4203
    57      events:
    58        - timestamp: 2023-02-07T11:50:00.020081-05:00
    59          type: fixed
    60          data:
    61            fixed-version: 3.0.8-r0
    62  
    63    - id: CVE-2022-4304
    64      events:
    65        - timestamp: 2023-02-07T11:49:50.211721-05:00
    66          type: fixed
    67          data:
    68            fixed-version: 3.0.8-r0
    69  
    70    - id: CVE-2022-4450
    71      events:
    72        - timestamp: 2023-02-07T11:50:17.798241-05:00
    73          type: fixed
    74          data:
    75            fixed-version: 3.0.8-r0
    76  
    77    - id: CVE-2023-0465
    78      events:
    79        - timestamp: 2023-03-28T07:54:27.093515-07:00
    80          type: fixed
    81          data:
    82            fixed-version: 3.1.0-r2
    83  
    84    - id: CVE-2023-0401
    85      events:
    86        - timestamp: 2023-02-07T11:50:53.191261-05:00
    87          type: fixed
    88          data:
    89            fixed-version: 3.0.8-r0
    90  
    91    - id: CVE-2022-3358
    92      events:
    93        - timestamp: 2022-11-01T16:49:56Z
    94          type: fixed
    95          data:
    96            fixed-version: 3.0.7-r0
    97  
    98    - id: CVE-2023-0464
    99      events:
   100        - timestamp: 2023-03-23T02:31:00.664255-07:00
   101          type: fixed
   102          data:
   103            fixed-version: 3.1.0-r1
   104  
   105    - id: CVE-2023-0466
   106      events:
   107        - timestamp: 2023-04-08T12:32:54.797413-04:00
   108          type: false-positive-determination
   109          data:
   110            type: vulnerability-record-analysis-contested
   111            note: This was a case of documentation not matching function behavior. The upstream maintainers decided to update the documentation rather than change the behavior. See https://www.openssl.org/news/secadv/20230328.txt
   112  
   113    - id: CVE-2023-1255
   114      events:
   115        - timestamp: 2023-04-20T09:29:24.558074-07:00
   116          type: fixed
   117          data:
   118            fixed-version: 3.1.0-r5