data/reports: add alias for GO-2020-0034.yaml

Aliases: CVE-2020-36560, GHSA-rmj9-q58g-9qgg

Updates golang/vulndb#34
Fixes golang/vulndb#1247

Change-Id: I8a84934afebaccec6b5e2b0db80065b6a9430c90
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/461477
Reviewed-by: Damien Neil <dneil@google.com>
Run-TryBot: Tatiana Bradley <tatiana@golang.org>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Tatiana Bradley <tatiana@golang.org>
diff --git a/data/osv/GO-2020-0034.json b/data/osv/GO-2020-0034.json
index 3e8625b..e709619 100644
--- a/data/osv/GO-2020-0034.json
+++ b/data/osv/GO-2020-0034.json
@@ -3,7 +3,8 @@
   "published": "2021-04-14T20:04:52Z",
   "modified": "0001-01-01T00:00:00Z",
   "aliases": [
-    "CVE-2020-36560"
+    "CVE-2020-36560",
+    "GHSA-rmj9-q58g-9qgg"
   ],
   "details": "Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.",
   "affected": [
diff --git a/data/reports/GO-2020-0034.yaml b/data/reports/GO-2020-0034.yaml
index dfba40f..1cf73f5 100644
--- a/data/reports/GO-2020-0034.yaml
+++ b/data/reports/GO-2020-0034.yaml
@@ -11,6 +11,8 @@
     paths can cause files to be written (or overwritten) outside of the
     target directory.
 published: 2021-04-14T20:04:52Z
+ghsas:
+  - GHSA-rmj9-q58g-9qgg
 references:
   - fix: https://github.com/artdarek/go-unzip/pull/2
   - fix: https://github.com/artdarek/go-unzip/commit/4975cbe0a719dc50b12da8585f1f207c82f7dfe0