diff --git a/data/osv/GO-2021-0059.json b/data/osv/GO-2021-0059.json index 766e1efd..4a284287 100644 --- a/data/osv/GO-2021-0059.json +++ b/data/osv/GO-2021-0059.json @@ -34,7 +34,15 @@ { "path": "github.com/tidwall/gjson", "symbols": [ - "sqaush" + "Get", + "GetBytes", + "GetMany", + "GetManyBytes", + "Result.Array", + "Result.Get", + "Result.Map", + "Result.Value", + "squash" ] } ] diff --git a/data/reports/GO-2021-0059.yaml b/data/reports/GO-2021-0059.yaml index bf8c1b17..c1f77e89 100644 --- a/data/reports/GO-2021-0059.yaml +++ b/data/reports/GO-2021-0059.yaml @@ -2,10 +2,20 @@ modules: - module: github.com/tidwall/gjson versions: - fixed: 1.6.4 + vulnerable_at: 1.6.3 packages: - package: github.com/tidwall/gjson symbols: - - sqaush + - squash + derived_symbols: + - Get + - GetBytes + - GetMany + - GetManyBytes + - Result.Array + - Result.Get + - Result.Map + - Result.Value description: | Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may