Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerability of dependency "golang.org/x/crypto, golang.org/x/net, golang.org/x/text, github.com/hashicorp/vault/sdk" #877

Open
Silence-worker-02 opened this issue Jul 29, 2023 · 0 comments

Comments

@Silence-worker-02
Copy link

Hello, we are a team researching the dependency management mechanism of Golang. During our analysis, we came across your project and noticed that it contains a vulnerability (CVE-2022-27191, CVE-2021-43565, CVE-2022-41723, CVE-2022-41717, CVE-2022-27664, CVE-2022-32149, CVE-2023-24999).

In your project, the golang.org/x/crypto package is being used at version golang.org/x/crypto v0.0.0-20210711020723-a769d52b0f97, but the patched version is v0.1.0. To fix the vulnerability, we recommend modifying the go.mod file to update the version to v0.1.0 or higher.

The golang.org/x/net package is being used at version golang.org/x/net v0.0.0-20220127200216-cd36cc0744dd, but the patched version is v0.7.0. To fix the vulnerability, we recommend modifying the go.mod file to update the version to v0.7.0 or higher.

The golang.org/x/text package is being used at version golang.org/x/text v0.3.7, but the patched version is v0.3.8. To fix the vulnerability, we recommend modifying the go.mod file to update the version to v0.3.8 or higher.

The github.com/hashicorp/vault/sdk package is being used at version github.com/hashicorp/vault/sdk v0.6.0, but the patched version is v0.9.0. To fix the vulnerability, we recommend modifying the go.mod file to update the version to v0.9.0 or higher.

Thank you for your attention to this matter.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant