data/reports: add vulnerable_at to GO-2021-0083.yaml
Aliases: CVE-2019-12496
Updates golang/vulndb#83
Change-Id: I37939aee2d68b200f4d9641f63517f782b5469a3
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/462776
TryBot-Result: Gopher Robot <gobot@golang.org>
Run-TryBot: Tatiana Bradley <tatianabradley@google.com>
Reviewed-by: Tatiana Bradley <tatianabradley@google.com>
Reviewed-by: Damien Neil <dneil@google.com>
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
diff --git a/data/osv/GO-2021-0083.json b/data/osv/GO-2021-0083.json
index 0143643..29ae659 100644
--- a/data/osv/GO-2021-0083.json
+++ b/data/osv/GO-2021-0083.json
@@ -33,6 +33,7 @@
{
"path": "github.com/hybridgroup/gobot/platforms/mqtt",
"symbols": [
+ "Adaptor.Connect",
"Adaptor.newTLSConfig"
]
}
diff --git a/data/reports/GO-2021-0083.yaml b/data/reports/GO-2021-0083.yaml
index af77633..d7c2dfd 100644
--- a/data/reports/GO-2021-0083.yaml
+++ b/data/reports/GO-2021-0083.yaml
@@ -2,10 +2,13 @@
- module: github.com/hybridgroup/gobot
versions:
- fixed: 1.12.1-0.20190521122906-c1aa4f867846
+ vulnerable_at: 1.12.1-0.20190521122836-07d9e09b1ea5
packages:
- package: github.com/hybridgroup/gobot/platforms/mqtt
symbols:
- Adaptor.newTLSConfig
+ derived_symbols:
+ - Adaptor.Connect
description: |
TLS certificate verification is skipped when connecting to a MQTT server.
This allows an attacker who can MITM the connection to read, or forge,