-
Notifications
You must be signed in to change notification settings - Fork 17.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x/vuln: false positive for GO-2025-3408 #71484
Comments
How is this a false negative? Perhaps you mean a false positive? |
You're totally correct. I properly named my repository and then messed up in the issue. 🤦♂️ My bad! |
govulncheck does not check just the modules you directly use. It also analyzes transitive dependencies. This is absolutely necessary as such dependencies can also be vulnerable and if your code eventually exercises them, your code is also vulnerable.
It could be that your code indeed does not call |
I believe this is the same as #69446 (closed without resolution). The trace is as below, which can't be right (the standard library won't call an external dependency).
|
@seankhliao thank you for posting the trace. It is exactly why I opened this issue, as that shouldn't happen. |
We currently don't have immediate plans on improving the precision of govulncheck. (Due to the nature of the problem, this can in principle be done indefinitely). We are instead focusing on providing supression mechanisms. |
govulncheck version
Go: go1.23.5
Scanner: [email protected]
DB: https://vuln.go.dev
DB updated: 2025-01-29 20:18:58 +0000 UTC
Does this issue reproduce at the latest version of golang.org/x/vuln?
Yes
Output of
go env
in your module/workspace:What did you do?
Using
github.com/mattermost/mattermost/server/public/model
in my project, which has a dependency ongithub.com/hashicorp/yamux
(which I don't use) causes[email protected]
to imply thatGO-2025-3408
affects me (viasync.Once
which is called bytime.LoadLocation
).Sample code
Repository: https://github.com/ping-localhost/vuln-check-reproducible
What did you see happen?
What did you expect to see?
Since I never actually use Yamux, I do not expect the CVE to be picked up. Somewhere along the line
govulncheck
thinks thatsync.Once.Do
will callyamux
.The text was updated successfully, but these errors were encountered: