tech-pkg archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Vulnerable Go packages



Hi!

There were a few vulnerabilities in basic Go modules recently, so I thought I would run govulncheck on every Go package in pkgsrc.

For those that don't know, govulncheck is nice because it does static analysis to find if the vulnerable bit of code is actually called, and filters out the entries where it's not. The Go team at Google maintains the actual vulnerability DB.

The results are ... not ideal, with 55 vulnerable packages identified.

I put the output at

https://www.netbsd.org/~bsiegert/go-pkg-vulnerabilies/2024-12-22.html

I manually removed the ones which were reported as having no vulnerabilities, plus the ones where govulncheck errored out. This can be improved a bit more in the future, but anyway:

What should we do with this information? Turn it into pkg-vulnerabilities entries?

Would it make sense to run this regularly and report the status?

Fixing these usually means one of the following:

1. Package a newer upstream release.
2. Update the go.mod and go.sum files by running something like "go get -u golang.org/x/net" or whatever the vulnerable module is, record the patches, update checksums and make sure it still builds.

--
Benny


Home | Main Index | Thread Index | Old Index