Skip to content

Commit f63fe31

Browse files
tatianabTatiana Bradley
authored andcommitted
data/reports: add alias for GO-2021-0107.yaml
Aliases: CVE-2021-4236, GHSA-5gjg-jgh4-gppm, GHSA-jpgg-cp2x-qrw3 Updates #107 Fixes #1274 Change-Id: I38cce3acbddbe420449e9df7c804d0a1159b86ff Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/461444 Reviewed-by: Tatiana Bradley <tatiana@golang.org> Run-TryBot: Tatiana Bradley <tatiana@golang.org> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Damien Neil <dneil@google.com>
1 parent 1ba225d commit f63fe31

File tree

2 files changed

+3
-1
lines changed

2 files changed

+3
-1
lines changed

data/osv/GO-2021-0107.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@
44
"modified": "0001-01-01T00:00:00Z",
55
"aliases": [
66
"CVE-2021-4236",
7-
"GHSA-5gjg-jgh4-gppm"
7+
"GHSA-5gjg-jgh4-gppm",
8+
"GHSA-jpgg-cp2x-qrw3"
89
],
910
"details": "Web Sockets do not execute any AuthenticateMethod methods which may be set, leading to a nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or authentication bypass.\n\nThis issue only affects WebSockets with an AuthenticateMethod hook. Request handlers that do not explicitly use WebSockets are not vulnerable.",
1011
"affected": [

data/reports/GO-2021-0107.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ description: |
2121
published: 2021-07-28T18:08:05Z
2222
ghsas:
2323
- GHSA-5gjg-jgh4-gppm
24+
- GHSA-jpgg-cp2x-qrw3
2425
references:
2526
- fix: https://github.com/ecnepsnai/web/commit/5a78f8d5c41ce60dcf9f61aaf47a7a8dc3e0002f
2627
cve_metadata:

0 commit comments

Comments
 (0)