tech-pkg archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Vulnerable Go packages



Hi Benny!

On Sun, Dec 22, 2024 at 08:48:42PM +0100, Benny Siegert wrote:
> There were a few vulnerabilities in basic Go modules recently, so I thought
> I would run govulncheck on every Go package in pkgsrc.
> 
> For those that don't know, govulncheck is nice because it does static
> analysis to find if the vulnerable bit of code is actually called, and
> filters out the entries where it's not. The Go team at Google maintains the
> actual vulnerability DB.
> 
> The results are ... not ideal, with 55 vulnerable packages identified.
> 
> I put the output at
> 
> https://www.netbsd.org/~bsiegert/go-pkg-vulnerabilies/2024-12-22.html
> 
> I manually removed the ones which were reported as having no
> vulnerabilities, plus the ones where govulncheck errored out. This can be
> improved a bit more in the future, but anyway:

Two minor things that would be useful to have in the report:

- an overview listing all packages, so I don't have to scroll through
  the long vulnerability list report to see if one I care about is
  affected

- the version number of the package that was tested, since this will
  hopefully get outdated quickly :)

> What should we do with this information? Turn it into pkg-vulnerabilities
> entries?

That'd be great, yes!

> Would it make sense to run this regularly and report the status?
> 
> Fixing these usually means one of the following:
> 
> 1. Package a newer upstream release.
> 2. Update the go.mod and go.sum files by running something like "go get -u
> golang.org/x/net" or whatever the vulnerable module is, record the patches,
> update checksums and make sure it still builds.

3. report the problem upstream and let them make a new release, then 1.
(I just did that for restish.)

Thank you!
 Thomas


Home | Main Index | Thread Index | Old Index