blob: 1ac829eb339a940a7fa8d641d859a841d6193a6a [file] [log] [blame]
$ govulncheck -dir ${moddir}/manystacks -v . --> FAIL 3
govulncheck is an experimental tool. Share feedback at https://go.dev/s/govulncheck-feedback.
Scanning for dependencies with known vulnerabilities...
Your code is affected by 1 vulnerability from 1 module.
Vulnerability #1: GO-2020-0040
Due to unchecked type assertions, maliciously crafted messages
can cause panics, which may be used as a denial of service
vector.
More info: https://pkg.go.dev/vuln/GO-2020-0040
Module: github.com/shiyanhui/dht
Found in: github.com/shiyanhui/dht@v0.0.0-20201219151056-5a20f3199263
Fixed in: N/A
Call stacks in your code:
#1: for function DHT.GetPeers
example.com/manystacks.main
.../main.go:27:2
example.com/manystacks.main$2
.../main.go:30:28
example.com/manystacks/otherpkg.GetPeers
.../otherpkg.go:6:19
github.com/shiyanhui/dht.DHT.GetPeers
#2: for function DHT.Run
example.com/manystacks.main
.../main.go:44:7
github.com/shiyanhui/dht.DHT.Run
#3: for function New
example.com/manystacks.main
.../main.go:16:14
github.com/shiyanhui/dht.New
=== Informational ===
Found 1 vulnerability in packages that you import, but there are no call
stacks leading to the use of this vulnerability. You may not need to
take any action. See https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck
for details.
Vulnerability #1: GO-2022-0969
HTTP/2 server connections can hang forever waiting for a clean
shutdown that was preempted by a fatal error. This condition can
be exploited by a malicious client to cause a denial of service.
More info: https://pkg.go.dev/vuln/GO-2022-0969
Found in: net/http@go1.18
Fixed in: net/http@go1.19.1