data/reports: fix GO-2021-0059.yaml

At vulnerable_at and fix symbol typo

Aliases: CVE-2020-35380, GHSA-w942-gw6m-p62c

Updates golang/vulndb#59

Change-Id: Id12343c5da5a8c110f9a258b4c7e4b6f1b35ac45
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/462140
Run-TryBot: Tatiana Bradley <tatiana@golang.org>
Reviewed-by: Tatiana Bradley <tatiana@golang.org>
Auto-Submit: Tatiana Bradley <tatiana@golang.org>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Damien Neil <dneil@google.com>
This commit is contained in:
Tatiana Bradley 2023-01-13 17:37:15 -05:00 коммит произвёл Gopher Robot
Родитель 24abae5629
Коммит a008e4e0cf
2 изменённых файлов: 20 добавлений и 2 удалений

Просмотреть файл

@ -34,7 +34,15 @@
{
"path": "github.com/tidwall/gjson",
"symbols": [
"sqaush"
"Get",
"GetBytes",
"GetMany",
"GetManyBytes",
"Result.Array",
"Result.Get",
"Result.Map",
"Result.Value",
"squash"
]
}
]

Просмотреть файл

@ -2,10 +2,20 @@ modules:
- module: github.com/tidwall/gjson
versions:
- fixed: 1.6.4
vulnerable_at: 1.6.3
packages:
- package: github.com/tidwall/gjson
symbols:
- sqaush
- squash
derived_symbols:
- Get
- GetBytes
- GetMany
- GetManyBytes
- Result.Array
- Result.Get
- Result.Map
- Result.Value
description: |
Due to improper bounds checking, maliciously crafted JSON objects
can cause an out-of-bounds panic. If parsing user input, this may