Skip to content

Commit ac22c9b

Browse files
tatianabTatiana Bradley
authored andcommitted
data/reports: add alias for GO-2020-0037.yaml
Aliases: CVE-2019-25072, GHSA-3fm3-m23v-5r46 Updates #37 Fixes #1230 Change-Id: I19b0690c527949101aded2cbc8eb86111e222c57 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/461441 TryBot-Result: Gopher Robot <gobot@golang.org> Run-TryBot: Tatiana Bradley <tatiana@golang.org> Reviewed-by: Tatiana Bradley <tatiana@golang.org> Reviewed-by: Damien Neil <dneil@google.com>
1 parent 95d35de commit ac22c9b

File tree

2 files changed

+4
-1
lines changed

2 files changed

+4
-1
lines changed

data/osv/GO-2020-0037.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,8 @@
33
"published": "2021-04-14T20:04:52Z",
44
"modified": "0001-01-01T00:00:00Z",
55
"aliases": [
6-
"CVE-2019-25072"
6+
"CVE-2019-25072",
7+
"GHSA-3fm3-m23v-5r46"
78
],
89
"details": "Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service vector.",
910
"affected": [

data/reports/GO-2020-0037.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,8 @@ description: |
1212
can cause a client to consume a significant amount of system
1313
resources, which may be used as a denial of service vector.
1414
published: 2021-04-14T20:04:52Z
15+
ghsas:
16+
- GHSA-3fm3-m23v-5r46
1517
credit: '@guagualvcha'
1618
references:
1719
- fix: https://github.com/tendermint/tendermint/pull/3430

0 commit comments

Comments
 (0)