| ##### |
| # Test of query mode with the standard library. |
| $ govulncheck -mode=query -json stdlib@go1.17 |
| { |
| "config": { |
| "protocol_version": "v1.0.0", |
| "scanner_name": "govulncheck", |
| "scanner_version": "v0.0.0-00000000000-20000101010101", |
| "db": "testdata/vulndb-v1", |
| "db_last_modified": "2023-04-03T15:57:51Z", |
| "scan_level": "symbol" |
| } |
| } |
| { |
| "progress": { |
| "message": "Looking up vulnerabilities in stdlib at go1.17..." |
| } |
| } |
| { |
| "osv": { |
| "schema_version": "1.3.1", |
| "id": "GO-2022-0969", |
| "modified": "2023-04-03T15:57:51Z", |
| "published": "2022-09-12T20:23:06Z", |
| "aliases": [ |
| "CVE-2022-27664", |
| "GHSA-69cg-p879-7622" |
| ], |
| "details": "HTTP/2 server connections can hang forever waiting for a clean shutdown that was preempted by a fatal error. This condition can be exploited by a malicious client to cause a denial of service.", |
| "affected": [ |
| { |
| "package": { |
| "name": "stdlib", |
| "ecosystem": "Go" |
| }, |
| "ranges": [ |
| { |
| "type": "SEMVER", |
| "events": [ |
| { |
| "introduced": "0" |
| }, |
| { |
| "fixed": "1.18.6" |
| }, |
| { |
| "introduced": "1.19.0" |
| }, |
| { |
| "fixed": "1.19.1" |
| } |
| ] |
| } |
| ], |
| "ecosystem_specific": { |
| "imports": [ |
| { |
| "path": "net/http", |
| "symbols": [ |
| "ListenAndServe", |
| "ListenAndServeTLS", |
| "Serve", |
| "ServeTLS", |
| "Server.ListenAndServe", |
| "Server.ListenAndServeTLS", |
| "Server.Serve", |
| "Server.ServeTLS", |
| "http2Server.ServeConn", |
| "http2serverConn.goAway" |
| ] |
| } |
| ] |
| } |
| }, |
| { |
| "package": { |
| "name": "golang.org/x/net", |
| "ecosystem": "Go" |
| }, |
| "ranges": [ |
| { |
| "type": "SEMVER", |
| "events": [ |
| { |
| "introduced": "0" |
| }, |
| { |
| "fixed": "0.0.0-20220906165146-f3363e06e74c" |
| } |
| ] |
| } |
| ], |
| "ecosystem_specific": { |
| "imports": [ |
| { |
| "path": "golang.org/x/net/http2", |
| "symbols": [ |
| "Server.ServeConn", |
| "serverConn.goAway" |
| ] |
| } |
| ] |
| } |
| } |
| ], |
| "references": [ |
| { |
| "type": "WEB", |
| "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s" |
| }, |
| { |
| "type": "REPORT", |
| "url": "https://go.dev/issue/54658" |
| }, |
| { |
| "type": "FIX", |
| "url": "https://go.dev/cl/428735" |
| } |
| ], |
| "credits": [ |
| { |
| "name": "Bahruz Jabiyev, Tommaso Innocenti, Anthony Gavazzi, Steven Sprecher, and Kaan Onarlioglu" |
| } |
| ], |
| "database_specific": { |
| "url": "https://pkg.go.dev/vuln/GO-2022-0969" |
| } |
| } |
| } |