data/reports: add vulnerable_at to GO-2021-0078.yaml
Aliases: CVE-2018-17075
Updates golang/vulndb#78
Change-Id: I9ebe78fc9cb8e9ab29251d6e915a9503e7d3cac2
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/462621
Auto-Submit: Tatiana Bradley <tatiana@golang.org>
Run-TryBot: Tatiana Bradley <tatiana@golang.org>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Damien Neil <dneil@google.com>
Reviewed-by: Tatiana Bradley <tatiana@golang.org>
diff --git a/data/osv/GO-2021-0078.json b/data/osv/GO-2021-0078.json
index 232d977..1ec8756 100644
--- a/data/osv/GO-2021-0078.json
+++ b/data/osv/GO-2021-0078.json
@@ -33,6 +33,8 @@
{
"path": "golang.org/x/net/html",
"symbols": [
+ "Parse",
+ "ParseFragment",
"inBodyIM",
"inFramesetIM"
]
diff --git a/data/reports/GO-2021-0078.yaml b/data/reports/GO-2021-0078.yaml
index 4032c67..345d8fd 100644
--- a/data/reports/GO-2021-0078.yaml
+++ b/data/reports/GO-2021-0078.yaml
@@ -2,11 +2,15 @@
- module: golang.org/x/net
versions:
- fixed: 0.0.0-20180816102801-aaf60122140d
+ vulnerable_at: 0.0.0-20180811021610-c39426892332
packages:
- package: golang.org/x/net/html
symbols:
- inBodyIM
- inFramesetIM
+ derived_symbols:
+ - Parse
+ - ParseFragment
description: |
The HTML parser does not properly handle "in frameset" insertion mode, and can be made
to panic when operating on malformed HTML that contains <template> tags. If operating