_content/security: update PRIVATE track examples

Updates PRIVATE track description in the security policy
to include newer examples that follow the current process.

For golang/go#56485

Change-Id: Ie4a7a16535b5496dc472d4094ac945c569c4506d
Reviewed-on: https://go-review.googlesource.com/c/website/+/460055
Auto-Submit: Tatiana Bradley <tatiana@golang.org>
Reviewed-by: Julie Qiu <julieqiu@google.com>
Run-TryBot: Tatiana Bradley <tatiana@golang.org>
Reviewed-by: Tatiana Bradley <tatiana@golang.org>
TryBot-Result: Gopher Robot <gobot@golang.org>
This commit is contained in:
Tatiana Bradley 2022-12-29 14:57:40 -05:00 коммит произвёл Gopher Robot
Родитель 7a2ed92457
Коммит fc66a3dae1
1 изменённых файлов: 4 добавлений и 6 удалений

Просмотреть файл

@ -74,12 +74,10 @@ both (but not disclosing any more details).
Some examples of past PRIVATE issues include:
- [#42552](/issue/42552): math/big: panic during recursive division of very large numbers
- [#34902](/issue/34902): net/http: Expect 100-continue panics in httputil.ReverseProxy
- [#39360](/issue/39360): crypto/x509: Certificate.Verify method seemingly ignoring EKU requirements on Windows
- [#34960](/issue/34960): crypto/dsa: invalid public key causes panic in dsa.Verify
- [#34540](/issue/34540): net/http: invalid headers are normalized, allowing request smuggling
- [#29098](/issue/29098): net/url: URL.Parse Multiple Parsing Issues
- [#53416](/issue/53416): path/filepath: stack exhaustion in Glob
- [#53616](/issue/53616): go/parser: stack exhaustion in all Parse* functions
- [#54658](/issue/54658): net/http: handle server errors after sending GOAWAY
- [#56284](/issue/56284): syscall, os/exec: unsanitized NUL in environment variables
### URGENT