-
Notifications
You must be signed in to change notification settings - Fork 18k
x/exp/cmd/govulncheck: exclude (fixed) vulnerability info from the own project #48079
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
cc @zpavlinovic |
Thanks for reporting this! We were actually wondering what to do with such findings. We decided to be very conservative for such cases and report them or issue a warning. Would not reporting anything for such findings be the best option? Is that what would you expect? |
This is new, so I don't know the right answer. An ideal scenario is to detect whether the fix is already in the main module by inspecting the commit history. But I am not sure how feasible and how practically useful it will be. If that's not possible, I think hiding them |
Agreed with @hyangah, if we had a way to determine the precise version of the main module, I would still not be sure vulnerabilities in it should be reported, but without version information they should absolutely be ignored. We can't show an ever-growing set of false positives to developers for their own module. |
Change https://golang.org/cl/346609 mentions this issue: |
Change https://go.dev/cl/391914 mentions this issue: |
When a module version is unknown (""), the current implementation assumes that any vulnerability version range applies to it. This can lead to false alarms, the most prominent example being when audit is run on a top-level module (which will have "" version) that has known vulnerabilities. This CL makes sure no vulnerabilities apply for a module with an unavailable version. Fixes golang/go#48079 Change-Id: Idd9f080f9037d105d86311b62de77f29ef4664a2 Reviewed-on: https://go-review.googlesource.com/c/exp/+/346609 Run-TryBot: Zvonimir Pavlinovic <[email protected]> TryBot-Result: Go Bot <[email protected]> Reviewed-by: Roland Shoemaker <[email protected]> Trust: Zvonimir Pavlinovic <[email protected]>
govulncheck version: v0.0.0-20210830180030-b6ec30af783f
From the x/crypto repo checked out (commit: 32db794688a5a24a23a43f2a984cecd5b3d8da5), run govulncheck and see the old vulnerabilities are printed.
cc @FiloSottile @rolandshoemaker
The text was updated successfully, but these errors were encountered: