-
Notifications
You must be signed in to change notification settings - Fork 17.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x/exp/cmd/govulncheck: exclude (fixed) vulnerability info from the own project #48079
Comments
cc @zpavlinovic |
Thanks for reporting this! We were actually wondering what to do with such findings. We decided to be very conservative for such cases and report them or issue a warning. Would not reporting anything for such findings be the best option? Is that what would you expect? |
This is new, so I don't know the right answer. An ideal scenario is to detect whether the fix is already in the main module by inspecting the commit history. But I am not sure how feasible and how practically useful it will be. If that's not possible, I think hiding them |
Agreed with @hyangah, if we had a way to determine the precise version of the main module, I would still not be sure vulnerabilities in it should be reported, but without version information they should absolutely be ignored. We can't show an ever-growing set of false positives to developers for their own module. |
Change https://golang.org/cl/346609 mentions this issue: |
Change https://go.dev/cl/391914 mentions this issue: |
govulncheck version: v0.0.0-20210830180030-b6ec30af783f
From the x/crypto repo checked out (commit: 32db794688a5a24a23a43f2a984cecd5b3d8da5), run govulncheck and see the old vulnerabilities are printed.
cc @FiloSottile @rolandshoemaker
The text was updated successfully, but these errors were encountered: