@@ -25,12 +25,21 @@ Vulnerability #2: GO-2021-0113
25
25
Example traces found:
26
26
#1: .../vuln.go:13:16: vuln.main calls language.Parse
27
27
28
+ Vulnerability #3: GO-2021-0054
29
+ Due to improper bounds checking, maliciously crafted JSON objects can cause
30
+ an out-of-bounds panic. If parsing user input, this may be used as a denial
31
+ of service vector.
32
+ More info: https://pkg.go.dev/vuln/GO-2021-0054
33
+ Module: github.com/tidwall/gjson
34
+ Found in: github.com/tidwall/gjson@v1.6.5
35
+ Fixed in: github.com/tidwall/gjson@v1.6.6
36
+ Example traces found:
37
+ #1: .../vuln.go:14:20: vuln.main calls gjson.Result.Get, which eventually calls gjson.Result.ForEach
38
+
28
39
=== Informational ===
29
40
30
- Found 1 vulnerability in packages that you import, but there are no
31
- call stacks leading to the use of this vulnerability. There are also 2
32
- vulnerabilities in modules that you require that are neither imported
33
- nor called. You may not need to take any action.
41
+ There are 2 vulnerabilities in modules that you require that are
42
+ neither imported nor called. You may not need to take any action.
34
43
See https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck for details.
35
44
36
45
Vulnerability #1: GO-2022-0969
@@ -42,16 +51,7 @@ Vulnerability #1: GO-2022-0969
42
51
Found in: net/http@go1.18
43
52
Fixed in: net/http@go1.18.6
44
53
45
- Vulnerability #2: GO-2021-0054
46
- Due to improper bounds checking, maliciously crafted JSON objects can cause
47
- an out-of-bounds panic. If parsing user input, this may be used as a denial
48
- of service vector.
49
- More info: https://pkg.go.dev/vuln/GO-2021-0054
50
- Module: github.com/tidwall/gjson
51
- Found in: github.com/tidwall/gjson@v1.6.5
52
- Fixed in: github.com/tidwall/gjson@v1.6.6
53
-
54
- Vulnerability #3: GO-2020-0015
54
+ Vulnerability #2: GO-2020-0015
55
55
An attacker could provide a single byte to a UTF16 decoder instantiated with
56
56
UseBOM or ExpectBOM to trigger an infinite loop if the String function on
57
57
the Decoder is called, or the Decoder is passed to transform.String. If used
@@ -62,7 +62,7 @@ Vulnerability #3: GO-2020-0015
62
62
Found in: golang.org/x/text@v0.3.0
63
63
Fixed in: golang.org/x/text@v0.3.3
64
64
65
- Your code is affected by 2 vulnerabilities from 2 modules.
65
+ Your code is affected by 3 vulnerabilities from 2 modules.
66
66
67
67
Share feedback at https://go.dev/s/govulncheck-feedback.
68
68
@@ -97,12 +97,27 @@ Vulnerability #2: GO-2021-0113
97
97
.../vuln.go:13:16: golang.org/vuln.main
98
98
golang.org/x/text/language.Parse
99
99
100
+ Vulnerability #3: GO-2021-0054
101
+ Due to improper bounds checking, maliciously crafted JSON objects can cause
102
+ an out-of-bounds panic. If parsing user input, this may be used as a denial
103
+ of service vector.
104
+ More info: https://pkg.go.dev/vuln/GO-2021-0054
105
+ Module: github.com/tidwall/gjson
106
+ Found in: github.com/tidwall/gjson@v1.6.5
107
+ Fixed in: github.com/tidwall/gjson@v1.6.6
108
+ Example traces found:
109
+ #1: for function github.com/tidwall/gjson.Result.ForEach
110
+ .../vuln.go:14:20: golang.org/vuln.main
111
+ .../gjson.go:297:12: github.com/tidwall/gjson.Result.Get
112
+ .../gjson.go:1881:36: github.com/tidwall/gjson.Get
113
+ .../gjson.go:2587:21: github.com/tidwall/gjson.execModifier
114
+ .../gjson.go:2631:21: github.com/tidwall/gjson.modPretty
115
+ github.com/tidwall/gjson.Result.ForEach
116
+
100
117
=== Informational ===
101
118
102
- Found 1 vulnerability in packages that you import, but there are no
103
- call stacks leading to the use of this vulnerability. There are also 2
104
- vulnerabilities in modules that you require that are neither imported
105
- nor called. You may not need to take any action.
119
+ There are 2 vulnerabilities in modules that you require that are
120
+ neither imported nor called. You may not need to take any action.
106
121
See https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck for details.
107
122
108
123
Vulnerability #1: GO-2022-0969
@@ -114,16 +129,7 @@ Vulnerability #1: GO-2022-0969
114
129
Found in: net/http@go1.18
115
130
Fixed in: net/http@go1.18.6
116
131
117
- Vulnerability #2: GO-2021-0054
118
- Due to improper bounds checking, maliciously crafted JSON objects can cause
119
- an out-of-bounds panic. If parsing user input, this may be used as a denial
120
- of service vector.
121
- More info: https://pkg.go.dev/vuln/GO-2021-0054
122
- Module: github.com/tidwall/gjson
123
- Found in: github.com/tidwall/gjson@v1.6.5
124
- Fixed in: github.com/tidwall/gjson@v1.6.6
125
-
126
- Vulnerability #3: GO-2020-0015
132
+ Vulnerability #2: GO-2020-0015
127
133
An attacker could provide a single byte to a UTF16 decoder instantiated with
128
134
UseBOM or ExpectBOM to trigger an infinite loop if the String function on
129
135
the Decoder is called, or the Decoder is passed to transform.String. If used
@@ -134,6 +140,6 @@ Vulnerability #3: GO-2020-0015
134
140
Found in: golang.org/x/text@v0.3.0
135
141
Fixed in: golang.org/x/text@v0.3.3
136
142
137
- Your code is affected by 2 vulnerabilities from 2 modules.
143
+ Your code is affected by 3 vulnerabilities from 2 modules.
138
144
139
145
Share feedback at https://go.dev/s/govulncheck-feedback.
0 commit comments