data/reports: fix GO-2021-0076.yaml
Add vulnerable_at and incompatible versions
Aliases: CVE-2018-14632
Updates golang/vulndb#76
Change-Id: I30d6ba338b1560080b374fc3c8062fa2ff7bf275
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/462620
Reviewed-by: Tatiana Bradley <tatiana@golang.org>
Reviewed-by: Damien Neil <dneil@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Run-TryBot: Tatiana Bradley <tatiana@golang.org>
Auto-Submit: Tatiana Bradley <tatiana@golang.org>
diff --git a/data/osv/GO-2021-0076.json b/data/osv/GO-2021-0076.json
index 6dc4f70..015df8c 100644
--- a/data/osv/GO-2021-0076.json
+++ b/data/osv/GO-2021-0076.json
@@ -21,6 +21,12 @@
},
{
"fixed": "0.5.2"
+ },
+ {
+ "introduced": "3.0.0"
+ },
+ {
+ "fixed": "3.0.1-0.20180525145409-4c9aadca8f89"
}
]
}
@@ -33,6 +39,8 @@
{
"path": "github.com/evanphx/json-patch",
"symbols": [
+ "Patch.Apply",
+ "Patch.ApplyIndent",
"partialArray.add"
]
}
diff --git a/data/reports/GO-2021-0076.yaml b/data/reports/GO-2021-0076.yaml
index 21f283d..731be81 100644
--- a/data/reports/GO-2021-0076.yaml
+++ b/data/reports/GO-2021-0076.yaml
@@ -2,10 +2,16 @@
- module: github.com/evanphx/json-patch
versions:
- fixed: 0.5.2
+ - introduced: 3.0.0+incompatible
+ fixed: 3.0.1-0.20180525145409-4c9aadca8f89+incompatible
+ vulnerable_at: 3.0.1-0.20180510154552-9f095e073247+incompatible
packages:
- package: github.com/evanphx/json-patch
symbols:
- partialArray.add
+ derived_symbols:
+ - Patch.Apply
+ - Patch.ApplyIndent
description: |
A malicious JSON patch can cause a panic due to an out-of-bounds
write attempt. This can be used as a denial of service vector if