-
Notifications
You must be signed in to change notification settings - Fork 18.3k
Closed as not planned
Labels
WaitingForInfoIssue is not actionable because of missing required information, which needs to be provided.Issue is not actionable because of missing required information, which needs to be provided.vulncheck or vulndbIssues for the x/vuln or x/vulndb repoIssues for the x/vuln or x/vulndb repo
Milestone
Description
govulncheck version
Go: go1.23.5
Scanner: [email protected]
DB: https://vuln.go.dev
DB updated: 2025-01-29 20:18:58 +0000 UTC
Does this issue reproduce at the latest version of golang.org/x/vuln?
Yes
Output of go env
in your module/workspace:
GO111MODULE='on'
GOARCH='arm64'
GOBIN=''
GOCACHE='/Users/mitchell/Library/Caches/go-build'
GOENV='/Users/mitchell/Library/Application Support/go/env'
GOEXE=''
GOEXPERIMENT=''
GOFLAGS=''
GOHOSTARCH='arm64'
GOHOSTOS='darwin'
GOINSECURE=''
GOMODCACHE='/Users/mitchell/go/pkg/mod'
GONOPROXY=''
GONOSUMDB=''
GOOS='darwin'
GOPATH='/Users/mitchell/go'
GOPRIVATE=''
GOPROXY='https://proxy.golang.org,direct'
GOROOT='/opt/homebrew/opt/go/libexec'
GOSUMDB='sum.golang.org'
GOTMPDIR=''
GOTOOLCHAIN='auto'
GOTOOLDIR='/opt/homebrew/opt/go/libexec/pkg/tool/darwin_arm64'
GOVCS=''
GOVERSION='go1.23.5'
GODEBUG=''
GOTELEMETRY='local'
GOTELEMETRYDIR='/Users/mitchell/Library/Application Support/go/telemetry'
GCCGO='gccgo'
GOARM64='v8.0'
AR='ar'
CC='cc'
CXX='c++'
CGO_ENABLED='1'
GOMOD='/dev/null'
GOWORK=''
CGO_CFLAGS='-O2 -g'
CGO_CPPFLAGS=''
CGO_CXXFLAGS='-O2 -g'
CGO_FFLAGS='-O2 -g'
CGO_LDFLAGS='-O2 -g'
PKG_CONFIG='pkg-config'
GOGCCFLAGS='-fPIC -arch arm64 -pthread -fno-caret-diagnostics -Qunused-arguments -fmessage-length=0 -ffile-prefix-map=/var/folders/c6/4l4ylj_530z56dccw0b7_pq00000gn/T/go-build2006941850=/tmp/go-build -gno-record-gcc-switches -fno-common'
What did you do?
Using github.com/mattermost/mattermost/server/public/model
in my project, which has a dependency on github.com/hashicorp/yamux
(which I don't use) causes [email protected]
to imply that GO-2025-3408
affects me (via sync.Once
which is called by time.LoadLocation
).
Sample code
package main
import (
"fmt"
"time"
"github.com/mattermost/mattermost/server/public/model"
)
func main() {
// Use something that calls `sync.Once`
netherlands, err := time.LoadLocation("Europe/Amsterdam")
if err != nil {
panic(err)
}
// Just use anything from the Mattermost package as an example
post := &model.Post{Message: "Hello!", ChannelId: "ID"}
// Output because we can
fmt.Println(netherlands, post.Message)
}
Repository: https://github.com/ping-localhost/vuln-check-reproducible
What did you see happen?
[16:56:12] ➜ vuln-check-reproducible git:(master) govulncheck ./...
=== Symbol Results ===
Vulnerability #1: GO-2025-3408
DefaultConfig has dangerous defaults causing hung Read in
github.com/hashicorp/yamux
More info: https://pkg.go.dev/vuln/GO-2025-3408
Module: github.com/hashicorp/yamux
Found in: github.com/hashicorp/[email protected]
Fixed in: N/A
Example traces found:
#1: main.go:12:39: vuln.main calls time.LoadLocation, which eventually calls yamux.Client
#2: main.go:12:39: vuln.main calls time.LoadLocation, which eventually calls yamux.DefaultConfig
Your code is affected by 1 vulnerability from 1 module.
This scan found no other vulnerabilities in packages you import or modules you
require.
Use '-show verbose' for more details.
What did you expect to see?
Since I never actually use Yamux, I do not expect the CVE to be picked up. Somewhere along the line govulncheck
thinks that sync.Once.Do
will call yamux
.
Metadata
Metadata
Assignees
Labels
WaitingForInfoIssue is not actionable because of missing required information, which needs to be provided.Issue is not actionable because of missing required information, which needs to be provided.vulncheck or vulndbIssues for the x/vuln or x/vulndb repoIssues for the x/vuln or x/vulndb repo