| ##### |
| # Testing that govulncheck doesn't mention calls when it doesn't have the relevant info |
| $ govulncheck -scan package -C ${moddir}/multientry . --> FAIL 3 |
| Scanning your code and P packages across M dependent modules for known vulnerabilities... |
| |
| === Package Results === |
| |
| Vulnerability #1: GO-2021-0113 |
| Due to improper index calculation, an incorrectly formatted language tag can |
| cause Parse to panic via an out of bounds read. If Parse is used to process |
| untrusted user inputs, this may be used as a vector for a denial of service |
| attack. |
| More info: https://pkg.go.dev/vuln/GO-2021-0113 |
| Module: golang.org/x/text |
| Found in: golang.org/x/text@v0.3.5 |
| Fixed in: golang.org/x/text@v0.3.7 |
| |
| Your code may be affected by 1 vulnerability. |
| This scan also found 0 vulnerabilities in modules you require. |
| Use '-scan symbol' for more fine grained vulnerability detection and '-show |
| verbose' for more details. |
| |
| ##### |
| # Test for package level scan with the -show verbose flag |
| $ govulncheck -show verbose -scan package -C ${moddir}/multientry . --> FAIL 3 |
| Scanning your code and P packages across M dependent modules for known vulnerabilities... |
| |
| === Package Results === |
| |
| Vulnerability #1: GO-2021-0113 |
| Due to improper index calculation, an incorrectly formatted language tag can |
| cause Parse to panic via an out of bounds read. If Parse is used to process |
| untrusted user inputs, this may be used as a vector for a denial of service |
| attack. |
| More info: https://pkg.go.dev/vuln/GO-2021-0113 |
| Module: golang.org/x/text |
| Found in: golang.org/x/text@v0.3.5 |
| Fixed in: golang.org/x/text@v0.3.7 |
| |
| === Module Results === |
| |
| No other vulnerabilities found. |
| |
| Your code may be affected by 1 vulnerability. |
| This scan also found 0 vulnerabilities in modules you require. |
| Use '-scan symbol' for more fine grained vulnerability detection. |