-
Notifications
You must be signed in to change notification settings - Fork 62
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
internal/vulncheck: add warning message for ancient binaries
We emit a warning message for Go binaries built with an ancient Go version. Change-Id: I9c7037cb1710181786a7c063ae2a253f880dc6ad Reviewed-on: https://go-review.googlesource.com/c/vuln/+/597516 LUCI-TryBot-Result: Go LUCI <[email protected]> Reviewed-by: Maceo Thompson <[email protected]>
- Loading branch information
1 parent
d9ad522
commit 1884dfa
Showing
4 changed files
with
73 additions
and
0 deletions.
There are no files selected for viewing
Binary file not shown.
44 changes: 44 additions & 0 deletions
44
cmd/govulncheck/testdata/stdlib/testfiles/binary/binary_old_go_text.ct
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,44 @@ | ||
##### | ||
# Test verbose scanning with text output for a binary built | ||
# with an ancient Go version | ||
$ govulncheck -mode binary -show verbose ${moddir}/stdlib/old_dont_run_me --> FAIL 3 | ||
Scanning your binary for known vulnerabilities... | ||
|
||
Fetching vulnerabilities from the database... | ||
|
||
Checking the binary against the vulnerabilities... | ||
|
||
warning: binary built with Go version go1.12.10, only standard library vulnerabilities will be checked | ||
|
||
warning: failed to extract build system specification GOOS: GOARCH: | ||
|
||
|
||
=== Symbol Results === | ||
|
||
Vulnerability #1: GO-2022-0969 | ||
HTTP/2 server connections can hang forever waiting for a clean shutdown that | ||
was preempted by a fatal error. This condition can be exploited by a | ||
malicious client to cause a denial of service. | ||
More info: https://pkg.go.dev/vuln/GO-2022-0969 | ||
Standard library | ||
Found in: net/[email protected] | ||
Fixed in: net/[email protected] | ||
Vulnerable symbols found: | ||
#1: http.ListenAndServe | ||
#2: http.ListenAndServeTLS | ||
#3: http.Serve | ||
#4: http.ServeTLS | ||
#5: http.Server.ListenAndServe | ||
Use '-show traces' to see the other 4 found symbols | ||
|
||
=== Package Results === | ||
|
||
No other vulnerabilities found. | ||
|
||
=== Module Results === | ||
|
||
No other vulnerabilities found. | ||
|
||
Your code is affected by 1 vulnerability from the Go standard library. | ||
This scan found no other vulnerabilities in packages you import or modules you | ||
require. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters