tech-pkg archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Vulnerable Go packages
Hi!
There were a few vulnerabilities in basic Go modules recently, so I
thought I would run govulncheck on every Go package in pkgsrc.
For those that don't know, govulncheck is nice because it does static
analysis to find if the vulnerable bit of code is actually called, and
filters out the entries where it's not. The Go team at Google maintains
the actual vulnerability DB.
The results are ... not ideal, with 55 vulnerable packages identified.
I put the output at
https://www.netbsd.org/~bsiegert/go-pkg-vulnerabilies/2024-12-22.html
I manually removed the ones which were reported as having no
vulnerabilities, plus the ones where govulncheck errored out. This can
be improved a bit more in the future, but anyway:
What should we do with this information? Turn it into
pkg-vulnerabilities entries?
Would it make sense to run this regularly and report the status?
Fixing these usually means one of the following:
1. Package a newer upstream release.
2. Update the go.mod and go.sum files by running something like "go get
-u golang.org/x/net" or whatever the vulnerable module is, record the
patches, update checksums and make sure it still builds.
--
Benny
Home |
Main Index |
Thread Index |
Old Index