sonatype-nexus-community / nancy

A tool to check for vulnerabilities in your Golang dependencies, powered by Sonatype OSS Index
Apache License 2.0
549 stars 76 forks source link

[DepShield] (CVSS 7.5) Vulnerability due to usage of golang.org/x:net:0.0.0-20181201002055-351d144fa1fc #201

Closed sonatype-depshield[bot] closed 3 years ago

sonatype-depshield[bot] commented 3 years ago

Vulnerabilities

DepShield reports that this application's usage of golang.org/x:net:0.0.0-20181201002055-351d144fa1fc results in the following vulnerability(s):


Occurrences

golang.org/x:net:0.0.0-20181201002055-351d144fa1fc is a transitive dependency introduced by the following direct dependency(s):

github.com/spf13:viper:1.7.1         └─ github.com/bketelsen:crypt:0.0.3-0.20200106085610-5cbc8cc4026c               └─ github.com/hashicorp/consul:api:1.1.0                     └─ github.com/hashicorp:serf:0.8.2                           └─ golang.org/x:net:0.0.0-20181201002055-351d144fa1fc

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

bhamail commented 3 years ago

False positive. We are actually using a newer version of x/net (0.0.0-20190620200207-3b0461eec859), not version 0.0.0-20181201002055-351d144fa1fc

go list -m all | grep 'x/net'
golang.org/x/net v0.0.0-20190620200207-3b0461eec859