Skip to content

Commit 9d185d8

Browse files
tatianabTatiana Bradley
authored andcommitted
data/reports: add alias for GO-2020-0023.yaml
Aliases: CVE-2015-10004, GHSA-5vw4-v588-pgv8 Updates #23 Fixes #1232 Change-Id: I9b8be39445992ee26ace360ac5b5d9db2ccb7b40 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/461482 Reviewed-by: Damien Neil <dneil@google.com> Run-TryBot: Tatiana Bradley <tatiana@golang.org> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Tatiana Bradley <tatiana@golang.org>
1 parent 3f24797 commit 9d185d8

File tree

2 files changed

+4
-1
lines changed

2 files changed

+4
-1
lines changed

data/osv/GO-2020-0023.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,8 @@
33
"published": "2021-04-14T20:04:52Z",
44
"modified": "0001-01-01T00:00:00Z",
55
"aliases": [
6-
"CVE-2015-10004"
6+
"CVE-2015-10004",
7+
"GHSA-5vw4-v588-pgv8"
78
],
89
"details": "Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC.",
910
"affected": [

data/reports/GO-2020-0023.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,8 @@ description: |
1212
over a low latency connection, an attacker may use this to determine
1313
the expected HMAC.
1414
published: 2021-04-14T20:04:52Z
15+
ghsas:
16+
- GHSA-5vw4-v588-pgv8
1517
references:
1618
- fix: https://github.com/robbert229/jwt/commit/ca1404ee6e83fcbafb66b09ed0d543850a15b654
1719
- web: https://github.com/robbert229/jwt/issues/12

0 commit comments

Comments
 (0)