Skip to content

Commit bfcb8f1

Browse files
tatianabTatiana Bradley
authored and
Tatiana Bradley
committed
data/reports: add alias and fix symbol in GO-2020-0004.yaml
Adds GHSA and fixes typo in symbol. Aliases: CVE-2020-36569, GHSA-hrm3-3xm6-x33h Updates #4 Fixes #1227 Updates #1282 Change-Id: I027596c711959a8704c674a7e377dcb0dca535e6 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/461235 Run-TryBot: Tatiana Bradley <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Damien Neil <[email protected]> Reviewed-by: Tatiana Bradley <[email protected]>
1 parent d4a57b5 commit bfcb8f1

File tree

3 files changed

+10
-6
lines changed

3 files changed

+10
-6
lines changed

data/cve/v5/GO-2020-0004.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@
3131
],
3232
"programRoutines": [
3333
{
34-
"name": "Auth.ServerHTTP"
34+
"name": "Auth.ServeHTTP"
3535
},
3636
{
3737
"name": "Auth.ListenAndServeTLS"

data/osv/GO-2020-0004.json

+4-3
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,10 @@
33
"published": "2021-04-14T20:04:52Z",
44
"modified": "0001-01-01T00:00:00Z",
55
"aliases": [
6-
"CVE-2020-36569"
6+
"CVE-2020-36569",
7+
"GHSA-hrm3-3xm6-x33h"
78
],
8-
"details": "If any of the ListenAndServe functions are called with an empty token, token authentication is disabled globally for all listeners.\n\nAlso, a minor timing side channel was present allowing attackers with very low latency and able to make a lot of requests to potentially recover the token.",
9+
"details": "If any of the ListenAndServe functions are called with an empty token, token authentication is disabled globally for all listeners.\n\nAlso, a minor timing side channel was present allowing attackers with very low latency and able to make many requests to potentially recover the token.",
910
"affected": [
1011
{
1112
"package": {
@@ -35,7 +36,7 @@
3536
"symbols": [
3637
"Auth.ListenAndServe",
3738
"Auth.ListenAndServeTLS",
38-
"Auth.ServerHTTP",
39+
"Auth.ServeHTTP",
3940
"ListenAndServe",
4041
"ListenAndServeTLS"
4142
]

data/reports/GO-2020-0004.yaml

+5-2
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,11 @@ modules:
33
versions:
44
- introduced: 0.0.0-20160722212129-ac0cc4484ad4
55
fixed: 0.0.0-20200131131040-063a3fb69896
6+
vulnerable_at: 0.0.0-20190311151057-c2ebbac481bb
67
packages:
78
- package: github.com/nanobox-io/golang-nanoauth
89
symbols:
9-
- Auth.ServerHTTP
10+
- Auth.ServeHTTP
1011
- Auth.ListenAndServeTLS
1112
- Auth.ListenAndServe
1213
derived_symbols:
@@ -17,9 +18,11 @@ description: |
1718
token authentication is disabled globally for all listeners.
1819
1920
Also, a minor timing side channel was present allowing attackers with
20-
very low latency and able to make a lot of requests to potentially
21+
very low latency and able to make many requests to potentially
2122
recover the token.
2223
published: 2021-04-14T20:04:52Z
24+
ghsas:
25+
- GHSA-hrm3-3xm6-x33h
2326
credit: '@bouk'
2427
references:
2528
- fix: https://github.com/nanobox-io/golang-nanoauth/pull/5

0 commit comments

Comments
 (0)