Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: bump go #2253

Merged
merged 1 commit into from
Aug 3, 2023
Merged

chore: bump go #2253

merged 1 commit into from
Aug 3, 2023

Conversation

rahulguptajss
Copy link
Contributor

govulncheck ./...
govulncheck is an experimental tool. Share feedback at https://go.dev/s/govulncheck-feedback.

Using go1.20.6
and [email protected] with vulnerability data from https://vuln.go.dev (last modified 2023-08-02 20:33:39 +0000 UTC).

Scanning your code and 196 packages across 30 dependent modules for known vulnerabilities...

Vulnerability #1: GO-2023-1987
Large RSA keys can cause high CPU usage in crypto/tls
More info: https://pkg.go.dev/vuln/GO-2023-1987
Standard library
Found in: crypto/[email protected]
Fixed in: crypto/[email protected]
Example traces found:
#1: cmd/exporters/prometheus/httpd.go:51:34: prometheus.Prometheus.startHTTPD calls http.Server.ListenAndServe, which eventually calls tls.Conn.HandshakeContext
#2: cmd/collectors/collectorstest.go:48:18: collectors.JSONToGson calls io.Copy, which eventually calls tls.Conn.Read
#3: cmd/collectors/collectorstest.go:48:18: collectors.JSONToGson calls io.Copy, which eventually calls tls.Conn.Write
#4: cmd/tools/rest/client.go:260:43: rest.downloadSwagger calls httputil.DumpRequestOut, which eventually calls tls.Dialer.DialContext

Your code is affected by 1 vulnerability from the Go standard library.
make: *** [govulncheck] Error 3

@cgrinds cgrinds merged commit 7a57363 into main Aug 3, 2023
9 checks passed
@cgrinds cgrinds deleted the rg2-bum-go branch August 3, 2023 11:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants