repo_id
stringclasses 927
values | file_path
stringlengths 99
214
| content
stringlengths 2
4.15M
|
|---|---|---|
test
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/internal/test/packages.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package test
import (
"os/exec"
"strings"
"testing"
"golang.org/x/tools/go/packages"
)
func VerifyImports(t *testing.T, allowed ...string) {
if _, err := exec.LookPath("go"); err != nil {
t.Skipf("skipping: %v", err)
}
cfg := &packages.Config{Mode: packages.NeedImports | packages.NeedDeps}
pkgs, err := packages.Load(cfg, ".")
if err != nil {
t.Fatal(err)
}
check := map[string]struct{}{}
for _, imp := range allowed {
check[imp] = struct{}{}
}
for _, p := range pkgs {
for _, imp := range p.Imports {
// this is an approximate stdlib check that is good enough for these tests
if !strings.ContainsRune(imp.ID, '.') {
continue
}
if _, ok := check[imp.ID]; !ok {
t.Errorf("include of %s is not allowed", imp.ID)
}
}
}
}
|
test
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/internal/test/handler.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package test
import (
"sort"
"golang.org/x/vuln/internal/govulncheck"
"golang.org/x/vuln/internal/osv"
)
// MockHandler implements govulncheck.Handler but (currently)
// does nothing.
//
// For use in tests.
type MockHandler struct {
ConfigMessages []*govulncheck.Config
ProgressMessages []*govulncheck.Progress
OSVMessages []*osv.Entry
FindingMessages []*govulncheck.Finding
}
func NewMockHandler() *MockHandler {
return &MockHandler{}
}
func (h *MockHandler) Config(config *govulncheck.Config) error {
h.ConfigMessages = append(h.ConfigMessages, config)
return nil
}
func (h *MockHandler) Progress(progress *govulncheck.Progress) error {
h.ProgressMessages = append(h.ProgressMessages, progress)
return nil
}
func (h *MockHandler) OSV(entry *osv.Entry) error {
h.OSVMessages = append(h.OSVMessages, entry)
return nil
}
func (h *MockHandler) Finding(finding *govulncheck.Finding) error {
h.FindingMessages = append(h.FindingMessages, finding)
return nil
}
func (h *MockHandler) Sort() {
sort.Slice(h.FindingMessages, func(i, j int) bool {
if h.FindingMessages[i].OSV > h.FindingMessages[j].OSV {
return true
}
if h.FindingMessages[i].OSV < h.FindingMessages[j].OSV {
return false
}
iframe := h.FindingMessages[i].Trace[0]
jframe := h.FindingMessages[j].Trace[0]
if iframe.Module < jframe.Module {
return true
}
if iframe.Module > jframe.Module {
return false
}
if iframe.Package < jframe.Package {
return true
}
if iframe.Package > jframe.Package {
return false
}
if iframe.Receiver < jframe.Receiver {
return true
}
if iframe.Receiver > jframe.Receiver {
return false
}
return iframe.Function < jframe.Function
})
}
func (h *MockHandler) Write(to govulncheck.Handler) error {
h.Sort()
for _, config := range h.ConfigMessages {
if err := to.Config(config); err != nil {
return err
}
}
for _, progress := range h.ProgressMessages {
if err := to.Progress(progress); err != nil {
return err
}
}
seen := map[string]bool{}
for _, finding := range h.FindingMessages {
if !seen[finding.OSV] {
seen[finding.OSV] = true
// first time seeing this osv, so find and write the osv message
for _, osv := range h.OSVMessages {
if osv.ID == finding.OSV {
if err := to.OSV(osv); err != nil {
return err
}
}
}
}
if err := to.Finding(finding); err != nil {
return err
}
}
for _, osv := range h.OSVMessages {
if !seen[osv.ID] {
if err := to.OSV(osv); err != nil {
return err
}
}
}
return nil
}
|
govulncheck
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/test_utils.go
|
// Copyright 2024 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package main
import (
"encoding/json"
"os"
"path/filepath"
"regexp"
"runtime"
"testing"
)
// copyTestCase copies the test case at dir into a
// temporary directory. The created files have 0644
// permission and directories 0755. It does not create
// symlinks.
func copyTestCase(dir string, t *testing.T) string {
newDir, err := filepath.Abs(t.TempDir())
if err != nil {
t.Fatalf("failed to copy test case %s: cannot create root %v", dir, err)
}
if err := copyDir(dir, newDir); err != nil {
t.Fatalf("failed to copy test case %s: copy failure %v", dir, err)
}
return newDir
}
func copyDir(srcDir, destDir string) error {
entries, err := os.ReadDir(srcDir)
if err != nil {
return err
}
for _, entry := range entries {
src := filepath.Join(srcDir, entry.Name())
dest := filepath.Join(destDir, entry.Name())
fileInfo, err := os.Stat(src)
if err != nil {
return err
}
switch fileInfo.Mode() & os.ModeType {
case os.ModeDir:
if err := os.MkdirAll(dest, 0755); err != nil {
return err
}
if err := copyDir(src, dest); err != nil {
return err
}
default:
if err := copyFile(src, dest); err != nil {
return err
}
}
}
return nil
}
func copyFile(src, dest string) error {
b, err := os.ReadFile(src)
if err != nil {
return err
}
return os.WriteFile(dest, b, 0644)
}
type config struct {
// SkipGOOS is a list of GOOS to skip
SkipGOOS []string `json:"skipGOOS,omitempty"`
// Copy the folder to isolate it
Copy bool `json:"copy,omitempty"`
// SkipBuild the test case
SkipBuild bool `json:"skipBuild,omitempty"`
// Strip indicates if binaries should be stripped
Strip bool `json:"strip,omitempty"`
Fixups []fixup `json:"fixups,omitempty"`
}
func (c *config) skip() bool {
for _, sg := range c.SkipGOOS {
if runtime.GOOS == sg {
return true
}
}
return false
}
type fixup struct {
Pattern string `json:"pattern,omitempty"`
Replace string `json:"replace,omitempty"`
compiled *regexp.Regexp
replaceFunc func(b []byte) []byte
}
func (f *fixup) init() {
f.compiled = regexp.MustCompile(f.Pattern)
}
func (f *fixup) apply(data []byte) []byte {
if f.replaceFunc != nil {
return f.compiled.ReplaceAllFunc(data, f.replaceFunc)
}
return f.compiled.ReplaceAll(data, []byte(f.Replace))
}
// loadConfig loads and initializes the config from path.
func loadConfig(path string) (*config, error) {
b, err := os.ReadFile(path)
if err != nil {
return nil, err
}
var cfg config
if err := json.Unmarshal(b, &cfg); err != nil {
return nil, err
}
for i := range cfg.Fixups {
cfg.Fixups[i].init()
}
return &cfg, nil
}
|
govulncheck
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/main_test.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package main
import (
"bytes"
"context"
"flag"
"fmt"
"os"
"path/filepath"
"runtime"
"sync"
"testing"
"unsafe"
"github.com/google/go-cmdtest"
"github.com/google/go-cmp/cmp"
"golang.org/x/vuln/internal/govulncheck"
"golang.org/x/vuln/internal/test"
"golang.org/x/vuln/internal/web"
"golang.org/x/vuln/scan"
)
var update = flag.Bool("update", false, "update test files with results")
func TestCommand(t *testing.T) {
if testing.Short() {
t.Skip("skipping test that uses internet in short mode")
}
testDir, err := os.Getwd()
if err != nil {
t.Fatal(err)
}
// test all cases in testdata subdirectory
fs, err := os.ReadDir(filepath.Join(testDir, "testdata"))
if err != nil {
t.Fatalf("failed to read test cases: %v", err)
}
for _, tc := range fs {
if !tc.IsDir() {
continue
}
t.Run(tc.Name(), func(t *testing.T) {
runTestCase(t, tc.Name(), testDir)
})
}
}
func runTestCase(t *testing.T, tcName, testDir string) {
testCaseDir := filepath.Join(testDir, "testdata", tcName)
cfg, err := loadConfig(filepath.Join(testCaseDir, "config.json"))
if err != nil {
t.Fatalf("failed to load config: %v", err)
}
if cfg.skip() {
return
}
if cfg.Copy {
testCaseDir = copyTestCase(testCaseDir, t)
}
vulndbDir := filepath.Join(testCaseDir, "vulndb-v1")
modulesDir := filepath.Join(testCaseDir, "modules")
testfilesDir := filepath.Join(testCaseDir, "testfiles")
govulndbURI, err := web.URLFromFilePath(vulndbDir)
if err != nil {
t.Fatalf("failed to create vulndb url: %v", err)
}
moduleDirs, err := filepath.Glob(filepath.Join(modulesDir, "*"))
if err != nil {
t.Fatal(err)
}
for _, md := range moduleDirs {
if cfg.SkipBuild {
continue
}
// Build test module binary.
binary, cleanup := test.GoBuild(t, md, "", cfg.Strip)
t.Cleanup(cleanup)
// Set an environment variable to the path to the binary, so tests
// can refer to it. The binary name is unique across all test cases.
varName := tcName + "_" + filepath.Base(md) + "_binary"
os.Setenv(varName, binary)
}
os.Setenv("moddir", modulesDir)
os.Setenv("testdir", testfilesDir)
runTestSuite(t, testfilesDir, govulndbURI.String(), cfg.Fixups, *update)
}
// Limit the number of concurrent scans. Scanning is implemented using
// x/tools/go/ssa, which is known to be memory-hungry
// (see https://go.dev/issue/14113), and by default the testing package
// allows up to GOMAXPROCS parallel tests at a time.
//
// For now we arbitrarily limit to ⌈GOMAXPROCS/4⌉, on the theory that many Go
// developer and CI machines have at least 8 logical cores and we want most
// runs of the test to exercise at least a little concurrency. If that turns
// out to still be too high, we may consider reducing it further.
//
// Since all of the scans run in the same process, we need an especially low
// limit on 32-bit platforms: we may run out of virtual address space well
// before we run out of system RAM.
var (
parallelLimiter chan struct{}
parallelLimiterInit sync.Once
)
// testSuite creates a cmdtest suite from testfilesDir. It also defines
// a govulncheck command on the suite that runs govulncheck against
// vulnerability database available at vulndbDir.
func runTestSuite(t *testing.T, testfilesDir string, vulndbDir string, fixups []fixup, update bool) {
parallelLimiterInit.Do(func() {
limit := (runtime.GOMAXPROCS(0) + 3) / 4
if limit > 2 && unsafe.Sizeof(uintptr(0)) < 8 {
limit = 2
}
parallelLimiter = make(chan struct{}, limit)
})
ts, err := cmdtest.Read(filepath.Join(testfilesDir, "*"))
if err != nil {
t.Fatal(err)
}
ts.DisableLogging = true
govulncheckCmd := func(args []string, inputFile string) ([]byte, error) {
parallelLimiter <- struct{}{}
defer func() { <-parallelLimiter }()
newargs := append([]string{"-db", vulndbDir}, args...)
buf := &bytes.Buffer{}
cmd := scan.Command(context.Background(), newargs...)
cmd.Stdout = buf
cmd.Stderr = buf
if inputFile != "" {
input, err := os.Open(filepath.Join(testfilesDir, inputFile))
if err != nil {
return nil, err
}
defer input.Close()
cmd.Stdin = input
}
// We set GOVERSION to always get the same results regardless of the underlying Go build system.
cmd.Env = append(os.Environ(), "GOVERSION=go1.18")
if err := cmd.Start(); err != nil {
return nil, err
}
err := cmd.Wait()
switch e := err.(type) {
case nil:
case interface{ ExitCode() int }:
err = &cmdtest.ExitCodeErr{Msg: err.Error(), Code: e.ExitCode()}
if e.ExitCode() == 0 {
err = nil
}
default:
fmt.Fprintln(buf, err)
err = &cmdtest.ExitCodeErr{Msg: err.Error(), Code: 1}
}
sorted := buf
if err == nil && isJSONMode(args) {
// parse, sort and reprint the output for test stability
gather := test.NewMockHandler()
if err := govulncheck.HandleJSON(buf, gather); err != nil {
return nil, err
}
sorted = &bytes.Buffer{}
h := govulncheck.NewJSONHandler(sorted)
if err := gather.Write(h); err != nil {
return nil, err
}
}
out := sorted.Bytes()
for _, fix := range fixups {
out = fix.apply(out)
}
return out, err
}
ts.Commands["govulncheck"] = govulncheckCmd
// govulncheck-cmp is like govulncheck except that the last argument is a file
// whose contents are compared to the output of govulncheck. This command does
// not output anything.
ts.Commands["govulncheck-cmp"] = func(args []string, inputFile string) ([]byte, error) {
l := len(args)
if l == 0 {
return nil, nil
}
cmpArg := args[l-1]
gArgs := args[:l-1]
out, err := govulncheckCmd(gArgs, inputFile)
if err != nil {
return nil, &cmdtest.ExitCodeErr{Msg: err.Error(), Code: 1}
}
got := string(out)
file, err := os.ReadFile(cmpArg)
if err != nil {
return nil, &cmdtest.ExitCodeErr{Msg: err.Error(), Code: 1}
}
want := string(file)
if diff := cmp.Diff(want, got); diff != "" {
return nil, &cmdtest.ExitCodeErr{Msg: "govulncheck output not matching the file contents:\n" + diff, Code: 1}
}
return nil, nil
}
if update {
ts.Run(t, true)
return
}
ts.RunParallel(t, false)
}
func isJSONMode(args []string) bool {
for _, arg := range args {
if arg == "json" {
return true
}
}
return false
}
|
govulncheck
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/doc.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
/*
Govulncheck reports known vulnerabilities that affect Go code. It uses static
analysis of source code or a binary's symbol table to narrow down reports to
only those that could affect the application.
By default, govulncheck makes requests to the Go vulnerability database at
https://vuln.go.dev. Requests to the vulnerability database contain only module
paths with vulnerabilities already known to the database, not code or other
properties of your program. See https://vuln.go.dev/privacy.html for more.
Use the -db flag to specify a different database, which must implement the
specification at https://go.dev/security/vuln/database.
Govulncheck looks for vulnerabilities in Go programs using a specific build
configuration. For analyzing source code, that configuration is the Go version
specified by the “go” command found on the PATH. For binaries, the build
configuration is the one used to build the binary. Note that different build
configurations may have different known vulnerabilities.
# Usage
To analyze source code, run govulncheck from the module directory, using the
same package path syntax that the go command uses:
$ cd my-module
$ govulncheck ./...
If no vulnerabilities are found, govulncheck will display a short message. If
there are vulnerabilities, each is displayed briefly, with a summary of a call
stack. The summary shows in brief how the package calls a vulnerable function.
For example, it might say
main.go:[line]:[column]: mypackage.main calls golang.org/x/text/language.Parse
To control which files are processed, use the -tags flag to provide a
comma-separated list of build tags, and the -test flag to indicate that test
files should be included.
To include more detailed stack traces, pass '-show traces', this will cause it to
print the full call stack for each entry.
To include progress messages and more details on findings, pass '-show verbose'.
To run govulncheck on a compiled binary, pass it the path to the binary file
with the '-mode binary' flag:
$ govulncheck -mode binary $HOME/go/bin/my-go-program
Govulncheck uses the binary's symbol information to find mentions of vulnerable
functions. Its output omits call stacks, which require source code analysis.
Govulncheck also supports '-mode extract' on a Go binary for extraction of minimal
information needed to analyze the binary. This will produce a blob, typically much
smaller than the binary, that can also be passed to govulncheck as an argument with
'-mode binary'. The users should not rely on the contents or representation of the blob.
# Integrations
Govulncheck supports streaming JSON. For more details, please see [golang.org/x/vuln/internal/govulncheck].
Govulncheck also supports Static Analysis Results Interchange Format (SARIF) output
format, following the specification at https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=sarif.
For more details, please see [golang.org/x/vuln/internal/sarif].
Govulncheck supports the Vulnerability EXchange (VEX) output format, following
the specification at https://github.com/openvex/spec.
For more details, please see [golang.org/x/vuln/internal/openvex].
# Exit codes
Govulncheck exits successfully (exit code 0) if there are no vulnerabilities,
and exits unsuccessfully if there are. It also exits successfully if the
'format -json' ('-json'), '-format sarif', or '-format openvex' is provided,
regardless of the number of detected vulnerabilities.
# Limitations
Govulncheck has these limitations:
- Govulncheck analyzes function pointer and interface calls conservatively,
which may result in false positives or inaccurate call stacks in some cases.
- Calls to functions made using package reflect are not visible to static
analysis. Vulnerable code reachable only through those calls will not be
reported in source scan mode. Similarly, use of the unsafe package may
result in false negatives.
- Because Go binaries do not contain detailed call information, govulncheck
cannot show the call graphs for detected vulnerabilities. It may also
report false positives for code that is in the binary but unreachable.
- There is no support for silencing vulnerability findings. See https://go.dev/issue/61211 for
updates.
- Govulncheck reports only standard library vulnerabilities for binaries
built with Go versions prior to Go 1.18.
- For binaries where the symbol information cannot be extracted, govulncheck
reports vulnerabilities for all modules on which the binary depends.
# Feedback
To share feedback, see https://go.dev/security/vuln#feedback.
*/
package main
|
govulncheck
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/main.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package main
import (
"context"
"fmt"
"os"
"golang.org/x/telemetry"
"golang.org/x/vuln/scan"
)
func main() {
telemetry.Start(telemetry.Config{ReportCrashes: true})
ctx := context.Background()
cmd := scan.Command(ctx, os.Args[1:]...)
err := cmd.Start()
if err == nil {
err = cmd.Wait()
}
switch err := err.(type) {
case nil:
case interface{ ExitCode() int }:
os.Exit(err.ExitCode())
default:
fmt.Fprintln(os.Stderr, err)
os.Exit(1)
}
}
|
integration
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/integration/Dockerfile
|
FROM golang:1.22.3-alpine
# This Dockerfile sets up an image for repeated integration testing.
# This assumes the build context, i.e., CWD is vuln/
# ---- Step 0: Setup shared build tools. ----
RUN apk update && apk add bash git gcc musl-dev linux-headers gcompat
# ---- Step 1: Build govulncheck ----
COPY . /go/src/golang.org/x/vuln
WORKDIR /go/src/golang.org/x/vuln/cmd/govulncheck/integration
RUN go install golang.org/x/vuln/cmd/govulncheck
# ---- Step 2: Build other test binaries ----
RUN go install golang.org/x/vuln/cmd/govulncheck/integration/k8s
RUN go install golang.org/x/vuln/cmd/govulncheck/integration/stackrox-scanner
|
integration
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/integration/integration_run.sh
|
#!/bin/bash
# Copyright 2022 The Go Authors. All rights reserved.
# Use of this source code is governed by a BSD-style
# license that can be found in the LICENSE file.
#!/bin/bash
# List of all projects for which integration test failed, if any.
failed=()
# Update status of the integration script. The first argument is
# the exit code for the integration run of a project and the second
# argument is the project name.
update_status(){
if [ "$1" -ne 0 ]; then
failed+=("$2")
fi
}
# Print go version for debugging purposes. Expected to be go1.18.8.
go version
# Clone kubernetes to a dedicated directory.
dir="$GOPATH/src/kubernetes"
if [ -d "$dir" ]; then
echo "Destination kubernetes already exists. Using the existing code."
else
git clone https://github.com/kubernetes/kubernetes.git "${dir}"
fi
# Checkout kubernetes version v1.15.11 that
# is known to have vulnerabilities.
pushd "$dir" || exit
cd pkg || exit
git checkout tags/v1.15.11
govulncheck --json ./... &> k8s.txt
k8s k8s.txt
update_status $? "kubernetes(source)"
popd || exit
# Clone scanner to a dedicated directory.
dir="$GOPATH/src/scanner"
if [ -d "$dir" ]; then
echo "Destination scanner already exists. Using the existing code."
else
git clone https://github.com/stackrox/scanner.git "${dir}"
fi
pushd "$dir" || exit
# Use scanner at specific commit and tag version for reproducibility.
git checkout 29b8761da747
go build -trimpath -ldflags="-X github.com/stackrox/scanner/pkg/version.Version=2.26-29-g29b8761da7-dirty" -o image/scanner/bin/scanner ./cmd/clair
govulncheck -mode=binary --json ./image/scanner/bin/scanner &> scan.txt
stackrox-scanner scan.txt
update_status $? "stackrox-scanner(binary)"
popd || exit
if [ ${#failed[@]} -ne 0 ]; then
echo "FAIL: integration run failed for the following projects: ${failed[*]}"
exit 1
fi
echo PASS
|
integration
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/integration/integration_test.sh
|
#!/bin/bash
# Copyright 2022 The Go Authors. All rights reserved.
# Use of this source code is governed by a BSD-style
# license that can be found in the LICENSE file.
# Runs the integration tests for whole program analysis.
# Assumes this is run from vuln/cmd/govulncheck/integration
echo "Building govulncheck docker image"
# The building context is vuln/ so we can have the current
# version of both govulncheck and its vuln dependencies
docker build -f Dockerfile -t govulncheck-integration ../../../
echo "Running govulncheck integration tests in the docker image"
docker run govulncheck-integration ./integration_run.sh
|
integration
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/integration/internal/integration/test.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package integration
import (
"bytes"
"encoding/json"
"errors"
"fmt"
"log"
"os"
"golang.org/x/vuln/internal/govulncheck"
)
// CompareVulns checks if packages of called vulnerable symbols
// out are a superset of want.
func CompareVulns(out string, want map[string]bool) error {
outJson, err := os.ReadFile(out)
if err != nil {
return fmt.Errorf("failed to read: %v", out)
}
calledVulnPkgs := make(map[string]bool)
dec := json.NewDecoder(bytes.NewReader(outJson))
for dec.More() {
msg := govulncheck.Message{}
// decode the next message in the stream
if err := dec.Decode(&msg); err != nil {
log.Fatalf("failed to load json: %v", err)
}
if msg.Finding != nil {
if msg.Finding.Trace[0].Function == "" {
// No symbol means the vulnerability is
// imported but not called.
continue
}
// collect only called non-std packages
pkgPath := msg.Finding.Trace[0].Package
calledVulnPkgs[pkgPath] = true
}
}
for pkg := range want {
if _, ok := calledVulnPkgs[pkg]; !ok {
e := fmt.Errorf("vulnerable symbols of expected package %s not detected", pkg)
err = errors.Join(err, e)
}
}
return err
}
|
k8s
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/integration/k8s/k8s.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package main
import (
"log"
"os"
"golang.org/x/vuln/cmd/govulncheck/integration/internal/integration"
)
const usage = `test helper for examining the output of running govulncheck on k8s@v1.15.11.
Example usage: ./k8s [path to output file]
`
func main() {
if len(os.Args) != 2 {
log.Fatal("Incorrect number of expected command line arguments", usage)
}
out := os.Args[1]
want := map[string]bool{
"github.com/containernetworking/cni/pkg/invoke": true,
"github.com/evanphx/json-patch": true,
"github.com/heketi/heketi/client/api/go-client": true,
"github.com/heketi/heketi/pkg/glusterfs/api": true,
"github.com/heketi/heketi/pkg/utils": true,
"github.com/opencontainers/selinux/go-selinux": true,
"github.com/prometheus/client_golang/prometheus/promhttp": true,
"golang.org/x/crypto/cryptobyte": true,
"golang.org/x/crypto/salsa20/salsa": true,
"golang.org/x/crypto/ssh": true,
"golang.org/x/net/http/httpguts": true,
"golang.org/x/net/http2": true,
"golang.org/x/net/http2/hpack": true,
"golang.org/x/text/encoding/unicode": true,
"google.golang.org/grpc": true,
}
if err := integration.CompareVulns(out, want); err != nil {
log.Fatal(err)
}
}
|
kokoro
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/integration/kokoro/integration.cfg
|
# Format: //devtools/kokoro/config/proto/build.proto
build_file: "vuln/cmd/govulncheck/integration/kokoro/integration.sh"
|
kokoro
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/integration/kokoro/integration.sh
|
#!/bin/bash
# Copyright 2022 The Go Authors. All rights reserved.
# Use of this source code is governed by a BSD-style
# license that can be found in the LICENSE file.
# Run integration_test.sh on kokoro.
# Fail on any error.
set -e
# Code under repo is checked out to ${KOKORO_ARTIFACTS_DIR}/git.
# The main directory name in this path is determined by the scm name specified
# in the job configuration, which in this case is "vuln".
cd "${KOKORO_ARTIFACTS_DIR}/git/vuln/cmd/govulncheck/integration"
# Run integration_test.sh
./integration_test.sh
|
stackrox-scanner
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/integration/stackrox-scanner/scanner.go
|
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package main
import (
"log"
"os"
"golang.org/x/vuln/cmd/govulncheck/integration/internal/integration"
)
const usage = `test helper for examining the output of running govulncheck on
stackrox-io/scanner binary (https://quay.io/repository/stackrox-io/scanner).
Example usage: ./stackrox-scanner [path to output file]
`
func main() {
if len(os.Args) != 2 {
log.Fatal("Incorrect number of expected command line arguments", usage)
}
out := os.Args[1]
want := map[string]bool{
"github.com/go-git/go-git/v5": true,
"github.com/go-git/go-git/v5/config": true,
"github.com/go-git/go-git/v5/plumbing/object": true,
"github.com/go-git/go-git/v5/storage/filesystem": true,
"github.com/go-git/go-git/v5/storage/filesystem/dotgit": true,
"github.com/mholt/archiver/v3": true,
"golang.org/x/crypto/ssh": true,
"golang.org/x/net/http2": true,
"golang.org/x/net/http2/hpack": true,
"google.golang.org/grpc": true,
"google.golang.org/grpc/internal/transport": true,
}
if err := integration.CompareVulns(out, want); err != nil {
log.Fatal(err)
}
}
|
common
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/config.json
|
{
"fixups": [
{
"pattern": "Scanning your code and (\\d+) packages across (\\d+)",
"replace": "Scanning your code and P packages across M"
},
{
"pattern": "Scanner: govulncheck@v.*",
"replace": "Scanner: govulncheck@v1.0.0"
},
{
"pattern": "\"([^\"]*\") is a file",
"replace": "govulncheck: myfile is a file"
},
{
"pattern": "\"scanner_version\": \"[^\"]*\"",
"replace": "\"scanner_version\": \"v0.0.0-00000000000-20000101010101\""
},
{
"pattern": "file:///(.*)/testdata/(.*)/vulndb",
"replace": "testdata/vulndb"
},
{
"pattern": "package (.*) is not in (GOROOT|std) (.*)",
"replace": "package foo is not in GOROOT (/tmp/foo)"
},
{
"pattern": "modified (.*)\\)",
"replace": "modified 01 Jan 21 00:00 UTC)"
},
{
"pattern": "Go: (go1.[\\.\\d]*|devel).*",
"replace": "Go: go1.18"
},
{
"pattern": "\"go_version\": \"go[^\\s\"]*\"",
"replace": "\"go_version\": \"go1.18\""
},
{
"pattern": "\"timestamp\": (.*),",
"replace": "\"timestamp\": \"2024-01-01T00:00:00\","
}
]
}
|
multientry
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/multientry/go.mod
|
module golang.org/multientry
go 1.18
require golang.org/x/text v0.3.5
|
multientry
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/multientry/go.sum
|
golang.org/x/text v0.3.5 h1:i6eZZ+zk0SOf0xgBpEpPD18qWcJda6q1sxt3S0kzyUQ=
golang.org/x/text v0.3.5/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
multientry
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/multientry/main.go
|
package main
import (
"fmt"
"os"
"golang.org/x/text/language"
)
func main() {
args := os.Args[1:]
// Calls foo which directly calls language.Parse.
A()
// Also calls foo which directly calls language.Parse.
B()
// Calls language.Parse directly.
//
// This will be displayed by govulncheck, since it is the shortest path.
C()
// Calls foobar which eventually calls language.MustParse (different
// symbol, same report)
D()
// Calls moreFoo which directly calls language.Parse.
E(args)
// Calls stillMoreFoo which directly calls language.Parse.
F(args)
}
func A() {
foo(os.Args[1:])
}
func B() {
foo(os.Args[1:])
}
func C() {
_, _ = language.Parse("")
}
func D() {
foobar()
}
func E(args []string) {
moreFoo(args)
}
func F(args []string) {
stillMoreFoo(args)
}
func foo(args []string) {
for _, arg := range args {
tag, err := language.Parse(arg)
if err != nil {
fmt.Printf("%s: error: %v\n", arg, err)
} else if tag == language.Und {
fmt.Printf("%s: undefined\n", arg)
} else {
fmt.Printf("%s: tag %s\n", arg, tag)
}
}
}
func moreFoo(args []string) {
for _, arg := range args {
tag, err := language.Parse(arg)
if err != nil {
fmt.Printf("%s: error: %v\n", arg, err)
} else if tag == language.Und {
fmt.Printf("%s: undefined\n", arg)
} else {
fmt.Printf("%s: tag %s\n", arg, tag)
}
}
}
func stillMoreFoo(args []string) {
for _, arg := range args {
tag, err := language.Parse(arg)
if err != nil {
fmt.Printf("%s: error: %v\n", arg, err)
} else if tag == language.Und {
fmt.Printf("%s: undefined\n", arg)
} else {
fmt.Printf("%s: tag %s\n", arg, tag)
}
}
}
func foobar() {
language.MustParse("")
}
|
replace
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/replace/go.mod
|
module golang.org/replace
go 1.20
replace golang.org/x/text v0.9.0 => golang.org/x/text v0.3.0
require golang.org/x/text v0.9.0
|
replace
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/replace/go.sum
|
golang.org/x/text v0.3.0 h1:g61tztE5qeGQ89tm6NTjjM9VPIm088od1l6aSorWRWg=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
replace
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/replace/main.go
|
package main
import (
"fmt"
"golang.org/x/text/language"
)
func main() {
fmt.Println("hello")
language.Parse("")
}
|
vendored
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vendored/go.mod
|
module golang.org/vendored
go 1.18
require (
// This version has one vulnerability that is imported, and
// one that is called.
github.com/tidwall/gjson v1.6.5
// This version has a vulnerability that is called.
golang.org/x/text v0.3.0
private.com/privateuser/fakemod v1.0.0
)
require (
github.com/tidwall/match v1.1.0 // indirect
github.com/tidwall/pretty v1.2.0 // indirect
)
|
vendored
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vendored/go.sum
|
github.com/tidwall/gjson v1.6.5 h1:P/K9r+1pt9AK54uap7HcoIp6T3a7AoMg3v18tUis+Cg=
github.com/tidwall/gjson v1.6.5/go.mod h1:zeFuBCIqD4sN/gmqBzZ4j7Jd6UcA2Fc56x7QFsv+8fI=
github.com/tidwall/match v1.0.3/go.mod h1:eRSPERbgtNPcGhD8UCthc6PmLEQXEWd3PRB5JTxsfmM=
github.com/tidwall/match v1.1.0 h1:VfI2e2aXLvytih7WUVyO9uvRC+RcXlaTrMbHuQWnFmk=
github.com/tidwall/match v1.1.0/go.mod h1:eRSPERbgtNPcGhD8UCthc6PmLEQXEWd3PRB5JTxsfmM=
github.com/tidwall/pretty v1.0.2/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk=
github.com/tidwall/pretty v1.2.0 h1:RWIZEg2iJ8/g6fDDYzMpobmaoGh5OLl4AXtGUGPcqCs=
github.com/tidwall/pretty v1.2.0/go.mod h1:ITEVvHYasfjBbM0u2Pg8T2nJnzm8xPwvNhhsoaGGjNU=
golang.org/x/text v0.3.0 h1:g61tztE5qeGQ89tm6NTjjM9VPIm088od1l6aSorWRWg=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
vendored
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vendored/vendored.go
|
package main
import (
"encoding/pem"
"private.com/privateuser/fakemod"
"golang.org/x/text/language"
)
func main() {
fakemod.Leave()
language.Parse("")
_, _ = pem.Decode([]byte("test"))
}
|
vendor
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vendored/vendor/modules.txt
|
# github.com/tidwall/gjson v1.6.5
## explicit; go 1.12
github.com/tidwall/gjson
# github.com/tidwall/match v1.1.0
## explicit; go 1.15
github.com/tidwall/match
# github.com/tidwall/pretty v1.2.0
## explicit; go 1.16
github.com/tidwall/pretty
# golang.org/x/text v0.3.0
## explicit
golang.org/x/text/internal/tag
golang.org/x/text/language
# private.com/privateuser/fakemod v1.0.0
## explicit
private.com/privateuser/fakemod
|
language
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vendored/vendor/golang.org/x/text/language/language.go
|
package language
var prevent_optimization int
func Parse(string) {
prevent_optimization++
}
|
gjson
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vendored/vendor/github.com/tidwall/gjson/gjson.go
|
package gjson
var prevent_optimization int
type Result struct{}
func (Result) Get(string) {
Get("", "")
}
func Get(json, path string) Result {
prevent_optimization++
return Result{}
}
|
fakemod
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vendored/vendor/private.com/privateuser/fakemod/mod.go
|
package fakemod
import "github.com/tidwall/gjson"
func Leave() {
gjson.Result{}.Get("")
}
|
subdir
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vendored/subdir/subdir.go
|
package subdir
import (
"golang.org/x/text/language"
)
func Foo() {
language.Parse("")
}
|
wholemodvuln
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/wholemodvuln/go.mod
|
module golang.org/wholemodvuln
go 1.18
require gopkg.in/yaml.v2 v2.2.3
|
wholemodvuln
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/wholemodvuln/whole_mod_vuln.go
|
package main
import (
"gopkg.in/yaml.v2"
)
func main() {
_, _ = yaml.Marshal(nil)
}
|
wholemodvuln
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/wholemodvuln/go.sum
|
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405 h1:yhCVgyC4o1eVCa2tZl7eS0r+SDo693bJlVdllGtEeKM=
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/yaml.v2 v2.2.3 h1:fvjTMHxHEw/mxHbtzPi3JCcKXQRAnQTBRo6YCJSVHKI=
gopkg.in/yaml.v2 v2.2.3/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
|
vuln
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vuln/go.mod
|
module golang.org/vuln
go 1.18
require (
// This version has one vulnerability that is imported, and
// one that is called.
github.com/tidwall/gjson v1.6.5
// This version has a vulnerability that is called.
golang.org/x/text v0.3.0
)
require (
github.com/tidwall/match v1.1.0 // indirect
github.com/tidwall/pretty v1.2.0 // indirect
)
|
vuln
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vuln/vuln.go
|
package main
import (
"encoding/pem"
"fmt"
"github.com/tidwall/gjson"
"golang.org/x/text/language"
)
func main() {
fmt.Println("hello")
language.Parse("")
gjson.Result{}.Get("")
_, _ = pem.Decode([]byte("test"))
}
|
vuln
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vuln/go.sum
|
github.com/tidwall/gjson v1.6.5 h1:P/K9r+1pt9AK54uap7HcoIp6T3a7AoMg3v18tUis+Cg=
github.com/tidwall/gjson v1.6.5/go.mod h1:zeFuBCIqD4sN/gmqBzZ4j7Jd6UcA2Fc56x7QFsv+8fI=
github.com/tidwall/match v1.0.3/go.mod h1:eRSPERbgtNPcGhD8UCthc6PmLEQXEWd3PRB5JTxsfmM=
github.com/tidwall/match v1.1.0 h1:VfI2e2aXLvytih7WUVyO9uvRC+RcXlaTrMbHuQWnFmk=
github.com/tidwall/match v1.1.0/go.mod h1:eRSPERbgtNPcGhD8UCthc6PmLEQXEWd3PRB5JTxsfmM=
github.com/tidwall/pretty v1.0.2/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk=
github.com/tidwall/pretty v1.2.0 h1:RWIZEg2iJ8/g6fDDYzMpobmaoGh5OLl4AXtGUGPcqCs=
github.com/tidwall/pretty v1.2.0/go.mod h1:ITEVvHYasfjBbM0u2Pg8T2nJnzm8xPwvNhhsoaGGjNU=
golang.org/x/text v0.3.0 h1:g61tztE5qeGQ89tm6NTjjM9VPIm088od1l6aSorWRWg=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
subdir
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vuln/subdir/subdir.go
|
package subdir
import (
"golang.org/x/text/language"
)
func Foo() {
language.Parse("")
}
|
informational
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/informational/go.mod
|
module golang.org/vuln
go 1.18
// This version has a vulnerability that is imported.
require github.com/tidwall/gjson v1.9.2
require (
github.com/tidwall/match v1.1.0 // indirect
github.com/tidwall/pretty v1.2.0 // indirect
)
|
informational
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/informational/vuln.go
|
package main
import (
"fmt"
"github.com/tidwall/gjson"
)
func main() {
fmt.Println("hello")
gjson.Valid("{hello: world}")
}
|
informational
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/informational/go.sum
|
github.com/tidwall/gjson v1.9.2 h1:SJQc2IgWWKL5V+YGJrr95hjNXFeZzHT2L9Wv1aAb51Q=
github.com/tidwall/gjson v1.9.2/go.mod h1:2tcKM/KQ/GjiTN7mfTL/HdNmef9Q6AZLaSK2RdfvSjw=
github.com/tidwall/match v1.1.0 h1:VfI2e2aXLvytih7WUVyO9uvRC+RcXlaTrMbHuQWnFmk=
github.com/tidwall/match v1.1.0/go.mod h1:eRSPERbgtNPcGhD8UCthc6PmLEQXEWd3PRB5JTxsfmM=
github.com/tidwall/pretty v1.2.0 h1:RWIZEg2iJ8/g6fDDYzMpobmaoGh5OLl4AXtGUGPcqCs=
github.com/tidwall/pretty v1.2.0/go.mod h1:ITEVvHYasfjBbM0u2Pg8T2nJnzm8xPwvNhhsoaGGjNU=
|
ID
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/ID/GO-2021-0113.json
|
{"schema_version":"1.3.1","id":"GO-2021-0113","modified":"2023-04-03T15:57:51Z","published":"2021-10-06T17:51:21Z","aliases":["CVE-2021-38561","GHSA-ppp9-7jff-5vj2"],"details":"Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.","affected":[{"package":{"name":"golang.org/x/text","ecosystem":"Go"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.3.7"}]}],"ecosystem_specific":{"imports":[{"path":"golang.org/x/text/language","symbols":["MatchStrings","MustParse","Parse","ParseAcceptLanguage"]}]}}],"references":[{"type":"FIX","url":"https://go.dev/cl/340830"},{"type":"FIX","url":"https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f"}],"credits":[{"name":"Guido Vranken"}],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2021-0113"}}
|
ID
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/ID/GO-2020-0015.json
|
{"schema_version":"1.3.1","id":"GO-2020-0015","modified":"2023-04-03T15:57:51Z","published":"2021-04-14T20:04:52Z","aliases":["CVE-2020-14040","GHSA-5rcv-m4m3-hfh7"],"summary":"Infinite loop when decoding some inputs in golang.org/x/text","details":"An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.","affected":[{"package":{"name":"golang.org/x/text","ecosystem":"Go"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.3.3"}]}],"ecosystem_specific":{"imports":[{"path":"golang.org/x/text/encoding/unicode","symbols":["bomOverride.Transform","utf16Decoder.Transform"]},{"path":"golang.org/x/text/transform","symbols":["String"]}]}}],"references":[{"type":"FIX","url":"https://go.dev/cl/238238"},{"type":"FIX","url":"https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e"},{"type":"REPORT","url":"https://go.dev/issue/39491"},{"type":"WEB","url":"https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0"}],"credits":[{"name":"@abacabadabacaba and Anton Gyllenberg"}],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2020-0015"}}
|
ID
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/ID/GO-2021-0054.json
|
{"schema_version":"1.3.1","id":"GO-2021-0054","modified":"2023-04-03T15:57:51Z","published":"2021-04-14T20:04:52Z","aliases":["CVE-2020-36067","GHSA-p64j-r5f4-pwwx"],"details":"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.","affected":[{"package":{"name":"github.com/tidwall/gjson","ecosystem":"Go"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.6.6"}]}],"ecosystem_specific":{"imports":[{"path":"github.com/tidwall/gjson","symbols":["Result.ForEach","unwrap"]}]}}],"references":[{"type":"FIX","url":"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b"},{"type":"WEB","url":"https://github.com/tidwall/gjson/issues/196"}],"credits":[{"name":"@toptotu"}],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2021-0054"}}
|
ID
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/ID/GO-2021-0265.json
|
{"schema_version":"1.3.1","id":"GO-2021-0265","modified":"2023-04-03T15:57:51Z","published":"2022-08-15T18:06:07Z","aliases":["CVE-2021-42248","CVE-2021-42836","GHSA-c9gm-7rfj-8w5h","GHSA-ppj4-34rq-v8j9"],"details":"A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.","affected":[{"package":{"name":"github.com/tidwall/gjson","ecosystem":"Go"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.9.3"}]}],"ecosystem_specific":{"imports":[{"path":"github.com/tidwall/gjson","symbols":["Get","GetBytes","GetMany","GetManyBytes","Result.Get","parseObject","queryMatches"]}]}}],"references":[{"type":"FIX","url":"https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96"},{"type":"WEB","url":"https://github.com/tidwall/gjson/issues/237"},{"type":"WEB","url":"https://github.com/tidwall/gjson/issues/236"},{"type":"WEB","url":"https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944"}],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2021-0265"}}
|
ID
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/ID/GO-2022-0956.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0956",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-08-29T22:15:46Z",
"aliases": [
"CVE-2022-3064",
"GHSA-6q6q-88xp-6f2r"
],
"summary": "Excessive resource consumption in gopkg.in/yaml.v2",
"details": "Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.",
"affected": [
{
"package": {
"name": "gopkg.in/yaml.v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.4"
}
]
}
]
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/go-yaml/yaml/commit/f221b8435cfb71e54062f6c6e99e9ade30b124d5"
},
{
"type": "WEB",
"url": "https://github.com/go-yaml/yaml/releases/tag/v2.2.4"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0956"
}
}
|
ID
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/ID/GO-2022-0969.json
|
{"schema_version":"1.3.1","id":"GO-2022-0969","modified":"2023-04-03T15:57:51Z","published":"2022-09-12T20:23:06Z","aliases":["CVE-2022-27664","GHSA-69cg-p879-7622"],"details":"HTTP/2 server connections can hang forever waiting for a clean shutdown that was preempted by a fatal error. This condition can be exploited by a malicious client to cause a denial of service.","affected":[{"package":{"name":"golang.org/x/net","ecosystem":"Go"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.0.0-20220906165146-f3363e06e74c"}]}],"ecosystem_specific":{"imports":[{"path":"golang.org/x/net/http2","symbols":["Server.ServeConn","serverConn.goAway"]}]}}],"references":[{"type":"WEB","url":"https://groups.google.com/g/golang-announce/c/x49AQzIVX-s"},{"type":"REPORT","url":"https://go.dev/issue/54658"},{"type":"FIX","url":"https://go.dev/cl/428735"}],"credits":[{"name":"Bahruz Jabiyev, Tommaso Innocenti, Anthony Gavazzi, Steven Sprecher, and Kaan Onarlioglu"}],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2022-0969"}}
|
ID
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/ID/GO-2021-0059.json
|
{"schema_version":"1.3.1","id":"GO-2021-0059","modified":"2023-04-03T15:57:51Z","published":"2021-04-14T20:04:52Z","aliases":["CVE-2020-35380","GHSA-w942-gw6m-p62c"],"details":"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.","affected":[{"package":{"name":"github.com/tidwall/gjson","ecosystem":"Go"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.6.4"}]}],"ecosystem_specific":{"imports":[{"path":"github.com/tidwall/gjson","symbols":["Get","GetBytes","GetMany","GetManyBytes","Result.Array","Result.Get","Result.Map","Result.Value","squash"]}]}}],"references":[{"type":"FIX","url":"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc"},{"type":"WEB","url":"https://github.com/tidwall/gjson/issues/192"}],"credits":[{"name":"@toptotu"}],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2021-0059"}}
|
index
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/index/modules.json
|
[{"path":"github.com/tidwall/gjson","vulns":[{"id":"GO-2021-0054","modified":"2023-04-03T15:57:51Z","fixed":"1.6.6"},{"id":"GO-2021-0059","modified":"2023-04-03T15:57:51Z","fixed":"1.6.4"},{"id":"GO-2021-0265","modified":"2023-04-03T15:57:51Z","fixed":"1.9.3"}]},{"path":"golang.org/x/net","vulns":[{"id":"GO-2022-0969","modified":"2023-04-03T15:57:51Z","fixed":"0.0.0-20220906165146-f3363e06e74c"}]},{"path":"golang.org/x/text","vulns":[{"id":"GO-2020-0015","modified":"2023-04-03T15:57:51Z","fixed":"0.3.3"},{"id":"GO-2021-0113","modified":"2023-04-03T15:57:51Z","fixed":"0.3.7"}]},{"path":"gopkg.in/yaml.v2","vulns":[{"id":"GO-2022-0956","modified":"0001-01-01T00:00:00Z","fixed":"2.2.4"}]}]
|
index
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/index/vulns.json
|
[{"id":"GO-2020-0015","modified":"2023-04-03T15:57:51Z","aliases":["CVE-2020-14040","GHSA-5rcv-m4m3-hfh7"]},{"id":"GO-2021-0054","modified":"2023-04-03T15:57:51Z","aliases":["CVE-2020-36067","GHSA-p64j-r5f4-pwwx"]},{"id":"GO-2021-0059","modified":"2023-04-03T15:57:51Z","aliases":["CVE-2020-35380","GHSA-w942-gw6m-p62c"]},{"id":"GO-2021-0113","modified":"2023-04-03T15:57:51Z","aliases":["CVE-2021-38561","GHSA-ppp9-7jff-5vj2"]},{"id":"GO-2021-0265","modified":"2023-04-03T15:57:51Z","aliases":["CVE-2021-42248","CVE-2021-42836","GHSA-c9gm-7rfj-8w5h","GHSA-ppj4-34rq-v8j9"]},{"id":"GO-2022-0969","modified":"2023-04-03T15:57:51Z","aliases":["CVE-2022-27664","GHSA-69cg-p879-7622"]},{"id":"GO-2022-0956","modified":"0001-01-01T00:00:00Z","aliases":["CVE-2022-3064","GHSA-6q6q-88xp-6f2r"]}]
|
index
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/index/db.json
|
{"modified":"2023-04-03T15:57:51Z"}
|
failures
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/no_header.blob
|
{"modules":[{"Path":"github.com/tidwall/gjson","Version":"v1.6.5","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null}]}
|
failures
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/usage_fail.ct
|
#####
# Test of invalid input to -mode
$ govulncheck -mode=invalid ./... --> FAIL 2
invalid value "invalid" for flag -mode: see -help for details
#####
# Test of trying to run -json with -show flag
$ govulncheck -C ${moddir}/vuln -show=traces -json . --> FAIL 2
the -show flag is not supported for json output
#####
# Test of invalid input to -scan
$ govulncheck -scan=invalid ./... --> FAIL 2
invalid value "invalid" for flag -scan: see -help for details
#####
# Test of invalid flag
$ govulncheck -flag go ./... --> FAIL 2
flag provided but not defined: -flag
#####
# Test of invalid show flag list value
$ govulncheck -show traces,color,verbose,something ./... --> FAIL 2
invalid value "traces,color,verbose,something" for flag -show: see -help for details
#####
# Test of invalid show flag value
$ govulncheck -show everything ./... --> FAIL 2
invalid value "everything" for flag -show: see -help for details
#####
# Test of invalid -format value
$ govulncheck -format invalid ./... --> FAIL 2
invalid value "invalid" for flag -format: see -help for details
#####
# Test of trying to run -json with '-format text' flag
$ govulncheck -C ${moddir}/vuln -json -format text . --> FAIL 2
the -json flag cannot be used with -format flag
#####
# Test of explicit format use together with -json flag
$ govulncheck -C ${moddir}/vuln -format json -json . --> FAIL 2
the -json flag cannot be used with -format flag
#####
# Test of trying to run -format sarif with -show flag
$ govulncheck -C ${moddir}/vuln -show=traces -format sarif . --> FAIL 2
the -show flag is not supported for sarif output
#####
# Test that -json and -format sarif are not allowed together
$ govulncheck -format sarif -json ./... --> FAIL 2
the -json flag cannot be used with -format flag
|
failures
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/binary_fail.ct
|
#####
# Test of passing a non-file to -mode=binary
$ govulncheck -mode=binary notafile --> FAIL 2
"notafile" is not a file
#####
# Test of passing a non-binary and non-blob file to -mode=binary
$ govulncheck -mode=binary ${moddir}/vuln/go.mod --> FAIL 1
govulncheck: unrecognized binary format
#####
# Test of passing a blob with invalid header id
$ govulncheck -mode=binary ${testdir}/failures/invalid_header_name.blob --> FAIL 1
govulncheck: unrecognized binary format
#####
# Test of passing a blob with invalid header version
$ govulncheck -mode=binary ${testdir}/failures/invalid_header_version.blob --> FAIL 1
govulncheck: unrecognized binary format
#####
# Test of passing a blob with no header
$ govulncheck -mode=binary ${testdir}/failures/no_header.blob --> FAIL 1
govulncheck: unrecognized binary format
#####
# Test of passing a blob with invalid header, i.e., no header
$ govulncheck -mode=binary ${testdir}/failures/no_header.blob --> FAIL 1
govulncheck: unrecognized binary format
#####
# Test of passing a blob with no body
$ govulncheck -mode=binary ${testdir}/failures/no_body.blob --> FAIL 1
govulncheck: unrecognized binary format
#####
# Test of passing an empty blob/file
$ govulncheck -mode=binary ${testdir}/failures/empty.blob --> FAIL 1
govulncheck: unrecognized binary format
#####
# Test of passing an empty blob message
$ govulncheck -mode=binary ${testdir}/failures/empty_message.blob --> FAIL 1
govulncheck: unrecognized binary format
#####
# Test of passing blob message with multiple headers
$ govulncheck -mode=binary ${testdir}/failures/multi_header.blob --> FAIL 1
govulncheck: unrecognized binary format
#####
# Test of passing blob message with something after the body
$ govulncheck -mode=binary ${testdir}/failures/multi_header.blob --> FAIL 1
govulncheck: unrecognized binary format
#####
# Test of trying to analyze multiple binaries
$ govulncheck -mode=binary ${common_vuln_binary} ${common_vuln_binary} --> FAIL 2
only 1 binary can be analyzed at a time
#####
# Test of trying to run -mode=binary with -tags flag
$ govulncheck -tags=foo -mode=binary ${common_vuln_binary} --> FAIL 2
the -tags flag is not supported in binary mode
#####
# Test of trying to run -mode=binary with the -test flag
$ govulncheck -test -mode=binary ${common_vuln_binary} --> FAIL 2
the -test flag is not supported in binary mode
|
failures
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/no_body.blob
|
{"name":"govulncheck-extract","version":"0.1.0"}
|
failures
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/invalid_header.blob
|
{"id":"invalid-name","protocol":"0.1.0"}{"modules":[{"Path":"github.com/tidwall/gjson","Version":"v1.6.5","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null}]}
|
failures
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/extract_fail.ct
|
#####
# Test extraction of an unsupported file format
$ govulncheck -mode=extract ${moddir}/vuln/go.mod --> FAIL 1
govulncheck: unrecognized binary format
|
failures
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/invalid_header_version.blob
|
{"name":"govulncheck-extract","version":"8.8.8"}{"modules":[{"Path":"github.com/tidwall/gjson","Version":"v1.6.5","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null}]}
|
failures
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/multi_header.blob
|
{"name":"govulncheck-extract","version":"0.1.0"}{"name":"govulncheck-extract","version":"0.1.0"}{"modules":[]}
|
failures
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/source_fail.ct
|
#####
# Test of handing a binary to source mode
$ govulncheck ${common_vuln_binary} --> FAIL 2
govulncheck: myfile is a file.
By default, govulncheck runs source analysis on Go modules.
Did you mean to run govulncheck with -mode=binary?
For details, run govulncheck -h.
#####
# Test of handing an invalid package pattern to source mode
$ govulncheck -C ${moddir}/vuln blah --> FAIL 1
govulncheck: loading packages:
There are errors with the provided package patterns:
-: package foo is not in GOROOT (/tmp/foo)
For details on package patterns, see https://pkg.go.dev/cmd/go#hdr-Package_lists_and_patterns.
#####
# Test of handing a package pattern to scan level module
$ govulncheck -scan module -C ${moddir}/vuln pattern --> FAIL 2
patterns are not accepted for module only scanning
|
failures
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/empty_message.blob
|
{}
|
failures
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/invalid_header_name.blob
|
{"name":"invalid-name","version":"0.1.0"}{"modules":[{"Path":"github.com/tidwall/gjson","Version":"v1.6.5","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null}]}
|
failures
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/after_body.blob
|
{"name":"govulncheck-extract","version":"0.1.0"}{"modules":[]}{"name":"govulncheck-extract","version":"0.1.0"}
|
failures
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/query_fail.ct
|
#####
# Test of query mode with invalid input.
$ govulncheck -mode=query -format json example.com/module@ --> FAIL 2
invalid query example.com/module@: must be of the form module@version
|
binary-module
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-module/binary_module_text.ct
|
#####
# Test binary scanning at the module level
$ govulncheck -mode=binary -scan module ${common_vuln_binary} --> FAIL 3
=== Module Results ===
Vulnerability #1: GO-2021-0265
A maliciously crafted path can cause Get and other query functions to
consume excessive amounts of CPU and time.
More info: https://pkg.go.dev/vuln/GO-2021-0265
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.9.3
Vulnerability #2: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.0
Fixed in: golang.org/x/text@v0.3.7
Vulnerability #3: GO-2021-0054
Due to improper bounds checking, maliciously crafted JSON objects can cause
an out-of-bounds panic. If parsing user input, this may be used as a denial
of service vector.
More info: https://pkg.go.dev/vuln/GO-2021-0054
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.6.6
Vulnerability #4: GO-2020-0015
Infinite loop when decoding some inputs in golang.org/x/text
More info: https://pkg.go.dev/vuln/GO-2020-0015
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.0
Fixed in: golang.org/x/text@v0.3.3
Your code may be affected by 4 vulnerabilities.
Use '-scan symbol' for more fine grained vulnerability detection.
|
binary-module
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-module/binary_module_json.ct
|
#####
# Test binary scanning at the module level with json output
$ govulncheck -format json -mode binary -scan module ${common_vuln_binary}
{
"config": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"scan_level": "module",
"scan_mode": "binary"
}
}
{
"progress": {
"message": "Scanning your binary for known vulnerabilities..."
}
}
{
"progress": {
"message": "Fetching vulnerabilities from the database..."
}
}
{
"progress": {
"message": "Checking the binary against the vulnerabilities..."
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0265",
"modified": "2023-04-03T15:57:51Z",
"published": "2022-08-15T18:06:07Z",
"aliases": [
"CVE-2021-42248",
"CVE-2021-42836",
"GHSA-c9gm-7rfj-8w5h",
"GHSA-ppj4-34rq-v8j9"
],
"details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Get",
"GetBytes",
"GetMany",
"GetManyBytes",
"Result.Get",
"parseObject",
"queryMatches"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/237"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/236"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0265"
}
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0113",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-10-06T17:51:21Z",
"aliases": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
],
"details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/language",
"symbols": [
"MatchStrings",
"MustParse",
"Parse",
"ParseAcceptLanguage"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/340830"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f"
}
],
"credits": [
{
"name": "Guido Vranken"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0113"
}
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0054",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-36067",
"GHSA-p64j-r5f4-pwwx"
],
"details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.6"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Result.ForEach",
"unwrap"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/196"
}
],
"credits": [
{
"name": "@toptotu"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0054"
}
}
}
{
"finding": {
"osv": "GO-2021-0054",
"fixed_version": "v1.6.6",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2020-0015",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
],
"summary": "Infinite loop when decoding some inputs in golang.org/x/text",
"details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/encoding/unicode",
"symbols": [
"bomOverride.Transform",
"utf16Decoder.Transform"
]
},
{
"path": "golang.org/x/text/transform",
"symbols": [
"String"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/238238"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/39491"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0"
}
],
"credits": [
{
"name": "@abacabadabacaba and Anton Gyllenberg"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0015"
}
}
}
{
"finding": {
"osv": "GO-2020-0015",
"fixed_version": "v0.3.3",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0059",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-35380",
"GHSA-w942-gw6m-p62c"
],
"details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.4"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Get",
"GetBytes",
"GetMany",
"GetManyBytes",
"Result.Array",
"Result.Get",
"Result.Map",
"Result.Value",
"squash"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/192"
}
],
"credits": [
{
"name": "@toptotu"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0059"
}
}
}
|
query
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/query/query_json.ct
|
#####
# Test of query mode for a third party module.
$ govulncheck -mode=query -format json github.com/tidwall/gjson@v1.6.5
{
"config": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"scan_level": "symbol",
"scan_mode": "query"
}
}
{
"progress": {
"message": "Looking up vulnerabilities in github.com/tidwall/gjson at v1.6.5..."
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0054",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-36067",
"GHSA-p64j-r5f4-pwwx"
],
"details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.6"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Result.ForEach",
"unwrap"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/196"
}
],
"credits": [
{
"name": "@toptotu"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0054"
}
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0265",
"modified": "2023-04-03T15:57:51Z",
"published": "2022-08-15T18:06:07Z",
"aliases": [
"CVE-2021-42248",
"CVE-2021-42836",
"GHSA-c9gm-7rfj-8w5h",
"GHSA-ppj4-34rq-v8j9"
],
"details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Get",
"GetBytes",
"GetMany",
"GetManyBytes",
"Result.Get",
"parseObject",
"queryMatches"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/237"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/236"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0265"
}
}
}
|
query
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/query/query_multi_json.ct
|
#####
# Test of query mode with multiple inputs.
$ govulncheck -mode=query -format json golang.org/x/text@v0.3.0 github.com/tidwall/gjson@v1.6.5
{
"config": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"scan_level": "symbol",
"scan_mode": "query"
}
}
{
"progress": {
"message": "Looking up vulnerabilities in golang.org/x/text at v0.3.0..."
}
}
{
"progress": {
"message": "Looking up vulnerabilities in github.com/tidwall/gjson at v1.6.5..."
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2020-0015",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
],
"summary": "Infinite loop when decoding some inputs in golang.org/x/text",
"details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/encoding/unicode",
"symbols": [
"bomOverride.Transform",
"utf16Decoder.Transform"
]
},
{
"path": "golang.org/x/text/transform",
"symbols": [
"String"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/238238"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/39491"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0"
}
],
"credits": [
{
"name": "@abacabadabacaba and Anton Gyllenberg"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0015"
}
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0113",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-10-06T17:51:21Z",
"aliases": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
],
"details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/language",
"symbols": [
"MatchStrings",
"MustParse",
"Parse",
"ParseAcceptLanguage"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/340830"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f"
}
],
"credits": [
{
"name": "Guido Vranken"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0113"
}
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0054",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-36067",
"GHSA-p64j-r5f4-pwwx"
],
"details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.6"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Result.ForEach",
"unwrap"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/196"
}
],
"credits": [
{
"name": "@toptotu"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0054"
}
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0265",
"modified": "2023-04-03T15:57:51Z",
"published": "2022-08-15T18:06:07Z",
"aliases": [
"CVE-2021-42248",
"CVE-2021-42836",
"GHSA-c9gm-7rfj-8w5h",
"GHSA-ppj4-34rq-v8j9"
],
"details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Get",
"GetBytes",
"GetMany",
"GetManyBytes",
"Result.Get",
"parseObject",
"queryMatches"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/237"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/236"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0265"
}
}
}
|
binary-package
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct
|
#####
# Test binary scanning at the package level with json output
$ govulncheck -format json -mode binary -scan package ${common_vuln_binary}
{
"config": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"scan_level": "package",
"scan_mode": "binary"
}
}
{
"progress": {
"message": "Scanning your binary for known vulnerabilities..."
}
}
{
"progress": {
"message": "Fetching vulnerabilities from the database..."
}
}
{
"progress": {
"message": "Checking the binary against the vulnerabilities..."
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0265",
"modified": "2023-04-03T15:57:51Z",
"published": "2022-08-15T18:06:07Z",
"aliases": [
"CVE-2021-42248",
"CVE-2021-42836",
"GHSA-c9gm-7rfj-8w5h",
"GHSA-ppj4-34rq-v8j9"
],
"details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Get",
"GetBytes",
"GetMany",
"GetManyBytes",
"Result.Get",
"parseObject",
"queryMatches"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/237"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/236"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0265"
}
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0113",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-10-06T17:51:21Z",
"aliases": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
],
"details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/language",
"symbols": [
"MatchStrings",
"MustParse",
"Parse",
"ParseAcceptLanguage"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/340830"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f"
}
],
"credits": [
{
"name": "Guido Vranken"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0113"
}
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0",
"package": "golang.org/x/text/language"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0054",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-36067",
"GHSA-p64j-r5f4-pwwx"
],
"details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.6"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Result.ForEach",
"unwrap"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/196"
}
],
"credits": [
{
"name": "@toptotu"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0054"
}
}
}
{
"finding": {
"osv": "GO-2021-0054",
"fixed_version": "v1.6.6",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0054",
"fixed_version": "v1.6.6",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2020-0015",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
],
"summary": "Infinite loop when decoding some inputs in golang.org/x/text",
"details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/encoding/unicode",
"symbols": [
"bomOverride.Transform",
"utf16Decoder.Transform"
]
},
{
"path": "golang.org/x/text/transform",
"symbols": [
"String"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/238238"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/39491"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0"
}
],
"credits": [
{
"name": "@abacabadabacaba and Anton Gyllenberg"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0015"
}
}
}
{
"finding": {
"osv": "GO-2020-0015",
"fixed_version": "v0.3.3",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0059",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-35380",
"GHSA-w942-gw6m-p62c"
],
"details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.4"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Get",
"GetBytes",
"GetMany",
"GetManyBytes",
"Result.Array",
"Result.Get",
"Result.Map",
"Result.Value",
"squash"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/192"
}
],
"credits": [
{
"name": "@toptotu"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0059"
}
}
}
|
binary-package
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_text.ct
|
# Test binary scanning at the package level.
$ govulncheck -mode=binary -scan package ${common_vuln_binary} --> FAIL 3
=== Package Results ===
Vulnerability #1: GO-2021-0265
A maliciously crafted path can cause Get and other query functions to
consume excessive amounts of CPU and time.
More info: https://pkg.go.dev/vuln/GO-2021-0265
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.9.3
Vulnerability #2: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.0
Fixed in: golang.org/x/text@v0.3.7
Vulnerability #3: GO-2021-0054
Due to improper bounds checking, maliciously crafted JSON objects can cause
an out-of-bounds panic. If parsing user input, this may be used as a denial
of service vector.
More info: https://pkg.go.dev/vuln/GO-2021-0054
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.6.6
Your code may be affected by 3 vulnerabilities.
This scan also found 1 vulnerability in modules you require.
Use '-scan symbol' for more fine grained vulnerability detection and '-show
verbose' for more details.
|
usage
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/usage/format.ct
|
#####
# Test of explicit text format
$ govulncheck -C ${moddir}/informational -format text .
=== Symbol Results ===
No vulnerabilities found.
Your code is affected by 0 vulnerabilities.
This scan also found 1 vulnerability in packages you import and 0
vulnerabilities in modules you require, but your code doesn't appear to call
these vulnerabilities.
Use '-show verbose' for more details.
# Test of explicit json format
$ govulncheck -C ${moddir}/informational -format json
{
"config": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"go_version": "go1.18",
"scan_level": "symbol",
"scan_mode": "source"
}
}
|
usage
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/usage/source_no_packages.ct
|
#####
# Test message when there are no packages matching the provided pattern (#59623).
$ govulncheck -C ${moddir}/vuln pkg/no-govulncheck/...
No vulnerabilities found.
|
usage
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/usage/usage.ct
|
#####
# Test of govulncheck help output
$ govulncheck -h
Govulncheck reports known vulnerabilities in dependencies.
Usage:
govulncheck [flags] [patterns]
govulncheck -mode=binary [flags] [binary]
-C dir
change to dir before running govulncheck
-db url
vulnerability database url (default "https://vuln.go.dev")
-format value
specify format output
The supported values are 'text', 'json', 'sarif', and 'openvex' (default 'text')
-json
output JSON (Go compatible legacy flag, see format flag)
-mode value
supports 'source', 'binary', and 'extract' (default 'source')
-scan value
set the scanning level desired, one of 'module', 'package', or 'symbol' (default 'symbol')
-show list
enable display of additional information specified by the comma separated list
The supported values are 'traces','color', 'version', and 'verbose'
-tags list
comma-separated list of build tags
-test
analyze test files (only valid for source mode, default false)
-version
print the version information
For details, see https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck.
#####
# Not scanning anything.
$ govulncheck
No vulnerabilities found.
#####
# Reporting version without scanning anything.
$ govulncheck -version
Go: go1.18
Scanner: govulncheck@v1.0.0
DB: testdata/vulndb-v1
DB updated: 2023-04-03 15:57:51 +0000 UTC
No vulnerabilities found.
|
extract
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/extract/binary_extract.ct
|
#####
# Test binary mode using the extracted binary blob.
$ govulncheck -mode=binary ${testdir}/extract/vuln.blob --> FAIL 3
=== Symbol Results ===
Vulnerability #1: GO-2021-0265
A maliciously crafted path can cause Get and other query functions to
consume excessive amounts of CPU and time.
More info: https://pkg.go.dev/vuln/GO-2021-0265
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.9.3
Vulnerable symbols found:
#1: gjson.Get
#2: gjson.Result.Get
Vulnerability #2: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.0
Fixed in: golang.org/x/text@v0.3.7
Vulnerable symbols found:
#1: language.Parse
Vulnerability #3: GO-2021-0054
Due to improper bounds checking, maliciously crafted JSON objects can cause
an out-of-bounds panic. If parsing user input, this may be used as a denial
of service vector.
More info: https://pkg.go.dev/vuln/GO-2021-0054
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.6.6
Vulnerable symbols found:
#1: gjson.Result.ForEach
Your code is affected by 3 vulnerabilities from 2 modules.
This scan also found 0 vulnerabilities in packages you import and 1
vulnerability in modules you require, but your code doesn't appear to call these
vulnerabilities.
Use '-show verbose' for more details.
# Test extract mode. Due to the size of the blob even for smallest programs, we
# directly compare its output to a target vuln_blob.json file.
$ govulncheck-cmp -mode=extract ${moddir}/vuln/vuln_dont_run_me ${testdir}/extract/vuln.blob
|
extract
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/extract/vuln.blob
|
{"name":"govulncheck-extract","version":"0.1.0"}
{"path":"golang.org/vuln","main":{"Path":"golang.org/vuln","Version":"(devel)","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null},"modules":[{"Path":"github.com/tidwall/gjson","Version":"v1.6.5","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null},{"Path":"github.com/tidwall/match","Version":"v1.1.0","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null},{"Path":"github.com/tidwall/pretty","Version":"v1.2.0","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null},{"Path":"golang.org/x/text","Version":"v0.3.0","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null}],"pkgSymbols":[{"name":"Encoding"},{"name":"FD"},{"name":"Int64"},{"name":"MarshalerError"},{"name":"NotInHeap"},{"name":"PathError"},{"name":"Pointer[...]"},{"name":"RegArgs"},{"name":"Result"},{"name":"SyntaxError"},{"name":"Uint64"},{"name":"UnmarshalTypeError"},{"name":"UnsupportedValueError"},{"name":"ValueError"},{"name":"_rt0_amd64"},{"name":"_rt0_amd64_linux"},{"name":"aeshashbody"},{"name":"callRet"},{"name":"cmpbody"},{"name":"debugCall1024"},{"name":"debugCall128"},{"name":"debugCall16384"},{"name":"debugCall2048"},{"name":"debugCall256"},{"name":"debugCall32"},{"name":"debugCall32768"},{"name":"debugCall4096"},{"name":"debugCall512"},{"name":"debugCall64"},{"name":"debugCall65536"},{"name":"debugCall8192"},{"name":"encoder"},{"name":"eq.[...[...]string"},{"name":"eq.[...]runtime.Frame"},{"name":"eq.fmt.fmt"},{"name":"eq.fmt.wrapError"},{"name":"eq.os.file"},{"name":"eq.reflect.Method"},{"name":"eq.reflect.ValueError"},{"name":"eq.reflect.makeFuncCtxt"},{"name":"eq.reflect.methodValue"},{"name":"eq.reflect.uncommonType"},{"name":"eq.runtime.Frame"},{"name":"eq.runtime.TypeAssertionError"},{"name":"eq.runtime._func"},{"name":"eq.runtime._panic"},{"name":"eq.runtime.bitvector"},{"name":"eq.runtime.boundsError"},{"name":"eq.runtime.errorAddressString"},{"name":"eq.runtime.gcBits"},{"name":"eq.runtime.gcWork"},{"name":"eq.runtime.hchan"},{"name":"eq.runtime.itab"},{"name":"eq.runtime.limiterEvent"},{"name":"eq.runtime.mOS"},{"name":"eq.runtime.mSpanList"},{"name":"eq.runtime.mcache"},{"name":"eq.runtime.modulehash"},{"name":"eq.runtime.mspan"},{"name":"eq.runtime.notInHeap"},{"name":"eq.runtime.piController"},{"name":"eq.runtime.special"},{"name":"eq.runtime.sudog"},{"name":"eq.runtime.sysmontick"},{"name":"eq.runtime.workbuf"},{"name":"eq.strconv.NumError"},{"name":"eq.struct { runtime.gList; runtime.n int32 }"},{"name":"eq.sync.WaitGroup"},{"name":"eq.sync.entry"},{"name":"eq.sync.poolLocal"},{"name":"eq.sync.poolLocalInternal"},{"name":"gogo"},{"name":"gosave_systemstack_switch"},{"name":"indexbody"},{"name":"indexbytebody"},{"name":"len int }"},{"name":"memeqbody"},{"name":"option"},{"name":"reflectWithString"},{"name":"setg_gcc"},{"name":"subSelector"},{"name":"uncommonType"},{"pkg":"bytes","name":"Buffer.Bytes"},{"pkg":"bytes","name":"Buffer.Len"},{"pkg":"bytes","name":"Buffer.Reset"},{"pkg":"bytes","name":"Buffer.String"},{"pkg":"bytes","name":"Buffer.Truncate"},{"pkg":"bytes","name":"Buffer.Write"},{"pkg":"bytes","name":"Buffer.WriteByte"},{"pkg":"bytes","name":"Buffer.WriteString"},{"pkg":"bytes","name":"Buffer.grow"},{"pkg":"bytes","name":"Buffer.tryGrowByReslice"},{"pkg":"bytes","name":"Compare"},{"pkg":"bytes","name":"ContainsAny"},{"pkg":"bytes","name":"Cut"},{"pkg":"bytes","name":"Equal"},{"pkg":"bytes","name":"EqualFold"},{"pkg":"bytes","name":"HasPrefix"},{"pkg":"bytes","name":"HasSuffix"},{"pkg":"bytes","name":"Index"},{"pkg":"bytes","name":"IndexAny"},{"pkg":"bytes","name":"IndexByte"},{"pkg":"bytes","name":"IndexRune"},{"pkg":"bytes","name":"Join"},{"pkg":"bytes","name":"NewBuffer"},{"pkg":"bytes","name":"TrimFunc"},{"pkg":"bytes","name":"TrimLeftFunc"},{"pkg":"bytes","name":"TrimRight"},{"pkg":"bytes","name":"TrimRightFunc"},{"pkg":"bytes","name":"TrimSpace"},{"pkg":"bytes","name":"asciiSet.contains"},{"pkg":"bytes","name":"containsRune"},{"pkg":"bytes","name":"growSlice"},{"pkg":"bytes","name":"growSlice.func1"},{"pkg":"bytes","name":"indexFunc"},{"pkg":"bytes","name":"init"},{"pkg":"bytes","name":"lastIndexFunc"},{"pkg":"bytes","name":"makeASCIISet"},{"pkg":"bytes","name":"trimRightASCII"},{"pkg":"bytes","name":"trimRightByte"},{"pkg":"bytes","name":"trimRightUnicode"},{"pkg":"encoding/base64","name":"CorruptInputError.Error"},{"pkg":"encoding/base64","name":"Encoding.Decode"},{"pkg":"encoding/base64","name":"Encoding.DecodedLen"},{"pkg":"encoding/base64","name":"Encoding.Encode"},{"pkg":"encoding/base64","name":"Encoding.EncodedLen"},{"pkg":"encoding/base64","name":"Encoding.WithPadding"},{"pkg":"encoding/base64","name":"Encoding.decodeQuantum"},{"pkg":"encoding/base64","name":"NewEncoder"},{"pkg":"encoding/base64","name":"NewEncoding"},{"pkg":"encoding/base64","name":"assemble32"},{"pkg":"encoding/base64","name":"assemble64"},{"pkg":"encoding/base64","name":"encoder.Close"},{"pkg":"encoding/base64","name":"encoder.Write"},{"pkg":"encoding/base64","name":"init"},{"pkg":"encoding/binary","name":"bigEndian.PutUint32"},{"pkg":"encoding/binary","name":"bigEndian.PutUint64"},{"pkg":"encoding/binary","name":"init"},{"pkg":"encoding/json","name":"HTMLEscape"},{"pkg":"encoding/json","name":"InvalidUnmarshalError.Error"},{"pkg":"encoding/json","name":"Marshal"},{"pkg":"encoding/json","name":"Marshal.func1"},{"pkg":"encoding/json","name":"MarshalerError.Error"},{"pkg":"encoding/json","name":"Number.String"},{"pkg":"encoding/json","name":"SyntaxError.Error"},{"pkg":"encoding/json","name":"Unmarshal"},{"pkg":"encoding/json","name":"UnmarshalTypeError.Error"},{"pkg":"encoding/json","name":"UnsupportedTypeError.Error"},{"pkg":"encoding/json","name":"UnsupportedValueError.Error"},{"pkg":"encoding/json","name":"addrMarshalerEncoder"},{"pkg":"encoding/json","name":"addrTextMarshalerEncoder"},{"pkg":"encoding/json","name":"arrayEncoder.encode"},{"pkg":"encoding/json","name":"arrayEncoder.encode-fm"},{"pkg":"encoding/json","name":"asciiEqualFold"},{"pkg":"encoding/json","name":"boolEncoder"},{"pkg":"encoding/json","name":"byIndex.Len"},{"pkg":"encoding/json","name":"byIndex.Less"},{"pkg":"encoding/json","name":"byIndex.Swap"},{"pkg":"encoding/json","name":"cachedTypeFields"},{"pkg":"encoding/json","name":"checkValid"},{"pkg":"encoding/json","name":"compact"},{"pkg":"encoding/json","name":"compact.func1"},{"pkg":"encoding/json","name":"condAddrEncoder.encode"},{"pkg":"encoding/json","name":"condAddrEncoder.encode-fm"},{"pkg":"encoding/json","name":"decodeState.addErrorContext"},{"pkg":"encoding/json","name":"decodeState.array"},{"pkg":"encoding/json","name":"decodeState.arrayInterface"},{"pkg":"encoding/json","name":"decodeState.convertNumber"},{"pkg":"encoding/json","name":"decodeState.init"},{"pkg":"encoding/json","name":"decodeState.literalInterface"},{"pkg":"encoding/json","name":"decodeState.literalStore"},{"pkg":"encoding/json","name":"decodeState.object"},{"pkg":"encoding/json","name":"decodeState.objectInterface"},{"pkg":"encoding/json","name":"decodeState.readIndex"},{"pkg":"encoding/json","name":"decodeState.rescanLiteral"},{"pkg":"encoding/json","name":"decodeState.saveError"},{"pkg":"encoding/json","name":"decodeState.scanNext"},{"pkg":"encoding/json","name":"decodeState.scanWhile"},{"pkg":"encoding/json","name":"decodeState.skip"},{"pkg":"encoding/json","name":"decodeState.unmarshal"},{"pkg":"encoding/json","name":"decodeState.value"},{"pkg":"encoding/json","name":"decodeState.valueInterface"},{"pkg":"encoding/json","name":"decodeState.valueQuoted"},{"pkg":"encoding/json","name":"dominantField"},{"pkg":"encoding/json","name":"encodeByteSlice"},{"pkg":"encoding/json","name":"encodeState).marshal.func1"},{"pkg":"encoding/json","name":"encodeState.Len"},{"pkg":"encoding/json","name":"encodeState.String"},{"pkg":"encoding/json","name":"encodeState.Write"},{"pkg":"encoding/json","name":"encodeState.error"},{"pkg":"encoding/json","name":"encodeState.marshal"},{"pkg":"encoding/json","name":"encodeState.reflectValue"},{"pkg":"encoding/json","name":"encodeState.string"},{"pkg":"encoding/json","name":"encodeState.stringBytes"},{"pkg":"encoding/json","name":"equalFoldRight"},{"pkg":"encoding/json","name":"floatEncoder.encode"},{"pkg":"encoding/json","name":"floatEncoder.encode-fm"},{"pkg":"encoding/json","name":"foldFunc"},{"pkg":"encoding/json","name":"freeScanner"},{"pkg":"encoding/json","name":"getu4"},{"pkg":"encoding/json","name":"glob..func1"},{"pkg":"encoding/json","name":"indirect"},{"pkg":"encoding/json","name":"init"},{"pkg":"encoding/json","name":"intEncoder"},{"pkg":"encoding/json","name":"interfaceEncoder"},{"pkg":"encoding/json","name":"invalidValueEncoder"},{"pkg":"encoding/json","name":"isEmptyValue"},{"pkg":"encoding/json","name":"isSpace"},{"pkg":"encoding/json","name":"isValidNumber"},{"pkg":"encoding/json","name":"isValidTag"},{"pkg":"encoding/json","name":"jsonError.Error"},{"pkg":"encoding/json","name":"mapEncoder.encode"},{"pkg":"encoding/json","name":"mapEncoder.encode-fm"},{"pkg":"encoding/json","name":"mapEncoder.encode.func1"},{"pkg":"encoding/json","name":"mapEncoder.encode.func2"},{"pkg":"encoding/json","name":"marshalerEncoder"},{"pkg":"encoding/json","name":"newArrayEncoder"},{"pkg":"encoding/json","name":"newCondAddrEncoder"},{"pkg":"encoding/json","name":"newEncodeState"},{"pkg":"encoding/json","name":"newMapEncoder"},{"pkg":"encoding/json","name":"newPtrEncoder"},{"pkg":"encoding/json","name":"newScanner"},{"pkg":"encoding/json","name":"newSliceEncoder"},{"pkg":"encoding/json","name":"newStructEncoder"},{"pkg":"encoding/json","name":"newTypeEncoder"},{"pkg":"encoding/json","name":"parseTag"},{"pkg":"encoding/json","name":"ptrEncoder.encode"},{"pkg":"encoding/json","name":"ptrEncoder.encode-fm"},{"pkg":"encoding/json","name":"ptrEncoder.encode.func1"},{"pkg":"encoding/json","name":"quoteChar"},{"pkg":"encoding/json","name":"reflectWithString.resolve"},{"pkg":"encoding/json","name":"scanner.eof"},{"pkg":"encoding/json","name":"scanner.error"},{"pkg":"encoding/json","name":"scanner.popParseState"},{"pkg":"encoding/json","name":"scanner.pushParseState"},{"pkg":"encoding/json","name":"scanner.reset"},{"pkg":"encoding/json","name":"simpleLetterEqualFold"},{"pkg":"encoding/json","name":"sliceEncoder.encode"},{"pkg":"encoding/json","name":"sliceEncoder.encode-fm"},{"pkg":"encoding/json","name":"sliceEncoder.encode.func1"},{"pkg":"encoding/json","name":"state0"},{"pkg":"encoding/json","name":"state1"},{"pkg":"encoding/json","name":"stateBeginString"},{"pkg":"encoding/json","name":"stateBeginStringOrEmpty"},{"pkg":"encoding/json","name":"stateBeginValue"},{"pkg":"encoding/json","name":"stateBeginValueOrEmpty"},{"pkg":"encoding/json","name":"stateDot"},{"pkg":"encoding/json","name":"stateDot0"},{"pkg":"encoding/json","name":"stateE"},{"pkg":"encoding/json","name":"stateE0"},{"pkg":"encoding/json","name":"stateESign"},{"pkg":"encoding/json","name":"stateEndTop"},{"pkg":"encoding/json","name":"stateEndValue"},{"pkg":"encoding/json","name":"stateError"},{"pkg":"encoding/json","name":"stateF"},{"pkg":"encoding/json","name":"stateFa"},{"pkg":"encoding/json","name":"stateFal"},{"pkg":"encoding/json","name":"stateFals"},{"pkg":"encoding/json","name":"stateInString"},{"pkg":"encoding/json","name":"stateInStringEsc"},{"pkg":"encoding/json","name":"stateInStringEscU"},{"pkg":"encoding/json","name":"stateInStringEscU1"},{"pkg":"encoding/json","name":"stateInStringEscU12"},{"pkg":"encoding/json","name":"stateInStringEscU123"},{"pkg":"encoding/json","name":"stateN"},{"pkg":"encoding/json","name":"stateNeg"},{"pkg":"encoding/json","name":"stateNu"},{"pkg":"encoding/json","name":"stateNul"},{"pkg":"encoding/json","name":"stateT"},{"pkg":"encoding/json","name":"stateTr"},{"pkg":"encoding/json","name":"stateTru"},{"pkg":"encoding/json","name":"stringEncoder"},{"pkg":"encoding/json","name":"structEncoder.encode"},{"pkg":"encoding/json","name":"structEncoder.encode-fm"},{"pkg":"encoding/json","name":"tagOptions.Contains"},{"pkg":"encoding/json","name":"textMarshalerEncoder"},{"pkg":"encoding/json","name":"typeByIndex"},{"pkg":"encoding/json","name":"typeEncoder"},{"pkg":"encoding/json","name":"typeEncoder.func1"},{"pkg":"encoding/json","name":"typeFields"},{"pkg":"encoding/json","name":"typeFields.func1"},{"pkg":"encoding/json","name":"uintEncoder"},{"pkg":"encoding/json","name":"unquote"},{"pkg":"encoding/json","name":"unquoteBytes"},{"pkg":"encoding/json","name":"unsupportedTypeEncoder"},{"pkg":"encoding/json","name":"valueEncoder"},{"pkg":"encoding/pem","name":"Decode"},{"pkg":"encoding/pem","name":"getLine"},{"pkg":"encoding/pem","name":"removeSpacesAndTabs"},{"pkg":"errors","name":"New"},{"pkg":"errors","name":"errorString.Error"},{"pkg":"errors","name":"init"},{"pkg":"fmt","name":"Errorf"},{"pkg":"fmt","name":"Fprint"},{"pkg":"fmt","name":"Fprintln"},{"pkg":"fmt","name":"Println"},{"pkg":"fmt","name":"Sprintf"},{"pkg":"fmt","name":"buffer.write"},{"pkg":"fmt","name":"buffer.writeByte"},{"pkg":"fmt","name":"buffer.writeRune"},{"pkg":"fmt","name":"buffer.writeString"},{"pkg":"fmt","name":"fmt.clearflags"},{"pkg":"fmt","name":"fmt.fmtBoolean"},{"pkg":"fmt","name":"fmt.fmtBs"},{"pkg":"fmt","name":"fmt.fmtBx"},{"pkg":"fmt","name":"fmt.fmtC"},{"pkg":"fmt","name":"fmt.fmtFloat"},{"pkg":"fmt","name":"fmt.fmtInteger"},{"pkg":"fmt","name":"fmt.fmtQ"},{"pkg":"fmt","name":"fmt.fmtQc"},{"pkg":"fmt","name":"fmt.fmtS"},{"pkg":"fmt","name":"fmt.fmtSbx"},{"pkg":"fmt","name":"fmt.fmtSx"},{"pkg":"fmt","name":"fmt.fmtUnicode"},{"pkg":"fmt","name":"fmt.init"},{"pkg":"fmt","name":"fmt.pad"},{"pkg":"fmt","name":"fmt.padString"},{"pkg":"fmt","name":"fmt.truncate"},{"pkg":"fmt","name":"fmt.truncateString"},{"pkg":"fmt","name":"fmt.writePadding"},{"pkg":"fmt","name":"getField"},{"pkg":"fmt","name":"glob..func1"},{"pkg":"fmt","name":"init"},{"pkg":"fmt","name":"intFromArg"},{"pkg":"fmt","name":"newPrinter"},{"pkg":"fmt","name":"parseArgNumber"},{"pkg":"fmt","name":"parsenum"},{"pkg":"fmt","name":"pp).handleMethods.func1"},{"pkg":"fmt","name":"pp).handleMethods.func2"},{"pkg":"fmt","name":"pp).handleMethods.func3"},{"pkg":"fmt","name":"pp).handleMethods.func4"},{"pkg":"fmt","name":"pp.Write"},{"pkg":"fmt","name":"pp.argNumber"},{"pkg":"fmt","name":"pp.badArgNum"},{"pkg":"fmt","name":"pp.badVerb"},{"pkg":"fmt","name":"pp.catchPanic"},{"pkg":"fmt","name":"pp.doPrint"},{"pkg":"fmt","name":"pp.doPrintf"},{"pkg":"fmt","name":"pp.doPrintln"},{"pkg":"fmt","name":"pp.fmt0x64"},{"pkg":"fmt","name":"pp.fmtBool"},{"pkg":"fmt","name":"pp.fmtBytes"},{"pkg":"fmt","name":"pp.fmtComplex"},{"pkg":"fmt","name":"pp.fmtFloat"},{"pkg":"fmt","name":"pp.fmtInteger"},{"pkg":"fmt","name":"pp.fmtPointer"},{"pkg":"fmt","name":"pp.fmtString"},{"pkg":"fmt","name":"pp.free"},{"pkg":"fmt","name":"pp.handleMethods"},{"pkg":"fmt","name":"pp.missingArg"},{"pkg":"fmt","name":"pp.printArg"},{"pkg":"fmt","name":"pp.printValue"},{"pkg":"fmt","name":"pp.unknownType"},{"pkg":"fmt","name":"tooLarge"},{"pkg":"fmt","name":"wrapError.Error"},{"pkg":"fmt","name":"wrapErrors.Error"},{"pkg":"github.com/tidwall/gjson","name":"Get"},{"pkg":"github.com/tidwall/gjson","name":"Parse"},{"pkg":"github.com/tidwall/gjson","name":"Result.Bool"},{"pkg":"github.com/tidwall/gjson","name":"Result.Exists"},{"pkg":"github.com/tidwall/gjson","name":"Result.ForEach"},{"pkg":"github.com/tidwall/gjson","name":"Result.Get"},{"pkg":"github.com/tidwall/gjson","name":"Result.Int"},{"pkg":"github.com/tidwall/gjson","name":"Result.IsArray"},{"pkg":"github.com/tidwall/gjson","name":"Result.IsObject"},{"pkg":"github.com/tidwall/gjson","name":"Result.String"},{"pkg":"github.com/tidwall/gjson","name":"Valid"},{"pkg":"github.com/tidwall/gjson","name":"appendJSONString"},{"pkg":"github.com/tidwall/gjson","name":"execModifier"},{"pkg":"github.com/tidwall/gjson","name":"fillIndex"},{"pkg":"github.com/tidwall/gjson","name":"init"},{"pkg":"github.com/tidwall/gjson","name":"isSimpleName"},{"pkg":"github.com/tidwall/gjson","name":"modFlatten"},{"pkg":"github.com/tidwall/gjson","name":"modFlatten.func1"},{"pkg":"github.com/tidwall/gjson","name":"modFlatten.func2"},{"pkg":"github.com/tidwall/gjson","name":"modJoin"},{"pkg":"github.com/tidwall/gjson","name":"modJoin.func1"},{"pkg":"github.com/tidwall/gjson","name":"modJoin.func2"},{"pkg":"github.com/tidwall/gjson","name":"modJoin.func3"},{"pkg":"github.com/tidwall/gjson","name":"modJoin.func3.1"},{"pkg":"github.com/tidwall/gjson","name":"modPretty"},{"pkg":"github.com/tidwall/gjson","name":"modPretty.func1"},{"pkg":"github.com/tidwall/gjson","name":"modReverse"},{"pkg":"github.com/tidwall/gjson","name":"modReverse.func1"},{"pkg":"github.com/tidwall/gjson","name":"modReverse.func2"},{"pkg":"github.com/tidwall/gjson","name":"modThis"},{"pkg":"github.com/tidwall/gjson","name":"modUgly"},{"pkg":"github.com/tidwall/gjson","name":"modValid"},{"pkg":"github.com/tidwall/gjson","name":"nameOfLast"},{"pkg":"github.com/tidwall/gjson","name":"parseAny"},{"pkg":"github.com/tidwall/gjson","name":"parseArray"},{"pkg":"github.com/tidwall/gjson","name":"parseArray.func1"},{"pkg":"github.com/tidwall/gjson","name":"parseArrayPath"},{"pkg":"github.com/tidwall/gjson","name":"parseInt"},{"pkg":"github.com/tidwall/gjson","name":"parseLiteral"},{"pkg":"github.com/tidwall/gjson","name":"parseNumber"},{"pkg":"github.com/tidwall/gjson","name":"parseObject"},{"pkg":"github.com/tidwall/gjson","name":"parseObjectPath"},{"pkg":"github.com/tidwall/gjson","name":"parseQuery"},{"pkg":"github.com/tidwall/gjson","name":"parseSquash"},{"pkg":"github.com/tidwall/gjson","name":"parseString"},{"pkg":"github.com/tidwall/gjson","name":"parseSubSelectors"},{"pkg":"github.com/tidwall/gjson","name":"parseSubSelectors.func1"},{"pkg":"github.com/tidwall/gjson","name":"parseUint"},{"pkg":"github.com/tidwall/gjson","name":"queryMatches"},{"pkg":"github.com/tidwall/gjson","name":"runeit"},{"pkg":"github.com/tidwall/gjson","name":"safeInt"},{"pkg":"github.com/tidwall/gjson","name":"splitPossiblePipe"},{"pkg":"github.com/tidwall/gjson","name":"squash"},{"pkg":"github.com/tidwall/gjson","name":"stringBytes"},{"pkg":"github.com/tidwall/gjson","name":"tolit"},{"pkg":"github.com/tidwall/gjson","name":"tonum"},{"pkg":"github.com/tidwall/gjson","name":"tostr"},{"pkg":"github.com/tidwall/gjson","name":"trim"},{"pkg":"github.com/tidwall/gjson","name":"unescape"},{"pkg":"github.com/tidwall/gjson","name":"unwrap"},{"pkg":"github.com/tidwall/gjson","name":"validany"},{"pkg":"github.com/tidwall/gjson","name":"validarray"},{"pkg":"github.com/tidwall/gjson","name":"validcolon"},{"pkg":"github.com/tidwall/gjson","name":"validcomma"},{"pkg":"github.com/tidwall/gjson","name":"validfalse"},{"pkg":"github.com/tidwall/gjson","name":"validnull"},{"pkg":"github.com/tidwall/gjson","name":"validnumber"},{"pkg":"github.com/tidwall/gjson","name":"validobject"},{"pkg":"github.com/tidwall/gjson","name":"validpayload"},{"pkg":"github.com/tidwall/gjson","name":"validstring"},{"pkg":"github.com/tidwall/gjson","name":"validtrue"},{"pkg":"github.com/tidwall/match","name":"Match"},{"pkg":"github.com/tidwall/match","name":"match"},{"pkg":"github.com/tidwall/match","name":"matchTrimSuffix"},{"pkg":"github.com/tidwall/pretty","name":"Pretty"},{"pkg":"github.com/tidwall/pretty","name":"PrettyOptions"},{"pkg":"github.com/tidwall/pretty","name":"Ugly"},{"pkg":"github.com/tidwall/pretty","name":"appendPrettyAny"},{"pkg":"github.com/tidwall/pretty","name":"appendPrettyNumber"},{"pkg":"github.com/tidwall/pretty","name":"appendPrettyObject"},{"pkg":"github.com/tidwall/pretty","name":"appendPrettyString"},{"pkg":"github.com/tidwall/pretty","name":"appendTabs"},{"pkg":"github.com/tidwall/pretty","name":"byKeyVal.Len"},{"pkg":"github.com/tidwall/pretty","name":"byKeyVal.Less"},{"pkg":"github.com/tidwall/pretty","name":"byKeyVal.Swap"},{"pkg":"github.com/tidwall/pretty","name":"byKeyVal.isLess"},{"pkg":"github.com/tidwall/pretty","name":"getjtype"},{"pkg":"github.com/tidwall/pretty","name":"hexp"},{"pkg":"github.com/tidwall/pretty","name":"init.0"},{"pkg":"github.com/tidwall/pretty","name":"init.0.func1"},{"pkg":"github.com/tidwall/pretty","name":"isNaNOrInf"},{"pkg":"github.com/tidwall/pretty","name":"parsestr"},{"pkg":"github.com/tidwall/pretty","name":"sortPairs"},{"pkg":"github.com/tidwall/pretty","name":"ugly"},{"pkg":"golang.org/x/text/internal/tag","name":"Compare"},{"pkg":"golang.org/x/text/internal/tag","name":"FixCase"},{"pkg":"golang.org/x/text/internal/tag","name":"Index.Elem"},{"pkg":"golang.org/x/text/internal/tag","name":"Index.Index"},{"pkg":"golang.org/x/text/internal/tag","name":"Index.Index.func1"},{"pkg":"golang.org/x/text/internal/tag","name":"Index.Next"},{"pkg":"golang.org/x/text/internal/tag","name":"cmp"},{"pkg":"golang.org/x/text/language","name":"CanonType.Make"},{"pkg":"golang.org/x/text/language","name":"CanonType.Parse"},{"pkg":"golang.org/x/text/language","name":"Make"},{"pkg":"golang.org/x/text/language","name":"Parse"},{"pkg":"golang.org/x/text/language","name":"Tag.canonicalize"},{"pkg":"golang.org/x/text/language","name":"Tag.equalTags"},{"pkg":"golang.org/x/text/language","name":"Tag.genCoreBytes"},{"pkg":"golang.org/x/text/language","name":"Tag.private"},{"pkg":"golang.org/x/text/language","name":"Tag.remakeString"},{"pkg":"golang.org/x/text/language","name":"Tag.setUndefinedLang"},{"pkg":"golang.org/x/text/language","name":"Tag.setUndefinedRegion"},{"pkg":"golang.org/x/text/language","name":"Tag.setUndefinedScript"},{"pkg":"golang.org/x/text/language","name":"ValueError.Error"},{"pkg":"golang.org/x/text/language","name":"ValueError.tag"},{"pkg":"golang.org/x/text/language","name":"addTags"},{"pkg":"golang.org/x/text/language","name":"bytesSort.Len"},{"pkg":"golang.org/x/text/language","name":"bytesSort.Less"},{"pkg":"golang.org/x/text/language","name":"bytesSort.Swap"},{"pkg":"golang.org/x/text/language","name":"findIndex"},{"pkg":"golang.org/x/text/language","name":"getLangID"},{"pkg":"golang.org/x/text/language","name":"getLangISO2"},{"pkg":"golang.org/x/text/language","name":"getLangISO3"},{"pkg":"golang.org/x/text/language","name":"getRegionID"},{"pkg":"golang.org/x/text/language","name":"getRegionISO2"},{"pkg":"golang.org/x/text/language","name":"getRegionISO3"},{"pkg":"golang.org/x/text/language","name":"getRegionM49"},{"pkg":"golang.org/x/text/language","name":"getRegionM49.func1"},{"pkg":"golang.org/x/text/language","name":"getScriptID"},{"pkg":"golang.org/x/text/language","name":"grandfathered"},{"pkg":"golang.org/x/text/language","name":"init"},{"pkg":"golang.org/x/text/language","name":"init.0"},{"pkg":"golang.org/x/text/language","name":"intToStr"},{"pkg":"golang.org/x/text/language","name":"isAlphaNum"},{"pkg":"golang.org/x/text/language","name":"langID.String"},{"pkg":"golang.org/x/text/language","name":"langID.stringToBuf"},{"pkg":"golang.org/x/text/language","name":"makeScannerString"},{"pkg":"golang.org/x/text/language","name":"mkErrInvalid"},{"pkg":"golang.org/x/text/language","name":"normLang"},{"pkg":"golang.org/x/text/language","name":"normLang.func1"},{"pkg":"golang.org/x/text/language","name":"normRegion"},{"pkg":"golang.org/x/text/language","name":"normRegion.func1"},{"pkg":"golang.org/x/text/language","name":"parse"},{"pkg":"golang.org/x/text/language","name":"parseExtension"},{"pkg":"golang.org/x/text/language","name":"parseExtensions"},{"pkg":"golang.org/x/text/language","name":"parseTag"},{"pkg":"golang.org/x/text/language","name":"parseVariants"},{"pkg":"golang.org/x/text/language","name":"regionID.M49"},{"pkg":"golang.org/x/text/language","name":"regionID.String"},{"pkg":"golang.org/x/text/language","name":"regionID.contains"},{"pkg":"golang.org/x/text/language","name":"scanner.acceptMinSize"},{"pkg":"golang.org/x/text/language","name":"scanner.deleteRange"},{"pkg":"golang.org/x/text/language","name":"scanner.gobble"},{"pkg":"golang.org/x/text/language","name":"scanner.init"},{"pkg":"golang.org/x/text/language","name":"scanner.replace"},{"pkg":"golang.org/x/text/language","name":"scanner.resizeRange"},{"pkg":"golang.org/x/text/language","name":"scanner.scan"},{"pkg":"golang.org/x/text/language","name":"scanner.setError"},{"pkg":"golang.org/x/text/language","name":"scanner.toLower"},{"pkg":"golang.org/x/text/language","name":"scriptID.String"},{"pkg":"golang.org/x/text/language","name":"specializeRegion"},{"pkg":"golang.org/x/text/language","name":"strToInt"},{"pkg":"golang.org/x/text/language","name":"variantsSort.Len"},{"pkg":"golang.org/x/text/language","name":"variantsSort.Less"},{"pkg":"golang.org/x/text/language","name":"variantsSort.Swap"},{"pkg":"internal/abi","name":"IntArgRegBitmap.Get"},{"pkg":"internal/abi","name":"IntArgRegBitmap.Set"},{"pkg":"internal/abi","name":"RegArgs.IntRegArgAddr"},{"pkg":"internal/bytealg","name":"Compare"},{"pkg":"internal/bytealg","name":"Cutover"},{"pkg":"internal/bytealg","name":"Equal"},{"pkg":"internal/bytealg","name":"HashStr"},{"pkg":"internal/bytealg","name":"HashStrBytes"},{"pkg":"internal/bytealg","name":"Index"},{"pkg":"internal/bytealg","name":"IndexByte"},{"pkg":"internal/bytealg","name":"IndexByteString"},{"pkg":"internal/bytealg","name":"IndexRabinKarp"},{"pkg":"internal/bytealg","name":"IndexRabinKarpBytes"},{"pkg":"internal/bytealg","name":"IndexString"},{"pkg":"internal/bytealg","name":"init.0"},{"pkg":"internal/cpu","name":"Initialize"},{"pkg":"internal/cpu","name":"cpuid"},{"pkg":"internal/cpu","name":"doinit"},{"pkg":"internal/cpu","name":"getGOAMD64level"},{"pkg":"internal/cpu","name":"indexByte"},{"pkg":"internal/cpu","name":"isSet"},{"pkg":"internal/cpu","name":"processOptions"},{"pkg":"internal/cpu","name":"xgetbv"},{"pkg":"internal/fmtsort","name":"Sort"},{"pkg":"internal/fmtsort","name":"SortedMap.Len"},{"pkg":"internal/fmtsort","name":"SortedMap.Less"},{"pkg":"internal/fmtsort","name":"SortedMap.Swap"},{"pkg":"internal/fmtsort","name":"compare"},{"pkg":"internal/fmtsort","name":"floatCompare"},{"pkg":"internal/fmtsort","name":"isNaN"},{"pkg":"internal/fmtsort","name":"nilCompare"},{"pkg":"internal/itoa","name":"Itoa"},{"pkg":"internal/itoa","name":"Uitoa"},{"pkg":"internal/oserror","name":"init"},{"pkg":"internal/poll","name":"DeadlineExceededError.Error"},{"pkg":"internal/poll","name":"FD).Write.func1"},{"pkg":"internal/poll","name":"FD.Close"},{"pkg":"internal/poll","name":"FD.Init"},{"pkg":"internal/poll","name":"FD.Write"},{"pkg":"internal/poll","name":"FD.decref"},{"pkg":"internal/poll","name":"FD.destroy"},{"pkg":"internal/poll","name":"FD.writeLock"},{"pkg":"internal/poll","name":"FD.writeUnlock"},{"pkg":"internal/poll","name":"convertErr"},{"pkg":"internal/poll","name":"errClosing"},{"pkg":"internal/poll","name":"errNetClosing.Error"},{"pkg":"internal/poll","name":"errnoErr"},{"pkg":"internal/poll","name":"fdMutex.decref"},{"pkg":"internal/poll","name":"fdMutex.increfAndClose"},{"pkg":"internal/poll","name":"fdMutex.rwlock"},{"pkg":"internal/poll","name":"fdMutex.rwunlock"},{"pkg":"internal/poll","name":"ignoringEINTRIO"},{"pkg":"internal/poll","name":"init"},{"pkg":"internal/poll","name":"pollDesc.close"},{"pkg":"internal/poll","name":"pollDesc.evict"},{"pkg":"internal/poll","name":"pollDesc.init"},{"pkg":"internal/poll","name":"pollDesc.pollable"},{"pkg":"internal/poll","name":"pollDesc.prepare"},{"pkg":"internal/poll","name":"pollDesc.prepareWrite"},{"pkg":"internal/poll","name":"pollDesc.wait"},{"pkg":"internal/poll","name":"pollDesc.waitWrite"},{"pkg":"internal/poll","name":"runtime_Semacquire"},{"pkg":"internal/poll","name":"runtime_Semrelease"},{"pkg":"internal/poll","name":"runtime_pollClose"},{"pkg":"internal/poll","name":"runtime_pollOpen"},{"pkg":"internal/poll","name":"runtime_pollReset"},{"pkg":"internal/poll","name":"runtime_pollServerInit"},{"pkg":"internal/poll","name":"runtime_pollUnblock"},{"pkg":"internal/poll","name":"runtime_pollWait"},{"pkg":"internal/reflectlite","name":"Kind.String"},{"pkg":"internal/reflectlite","name":"Swapper"},{"pkg":"internal/reflectlite","name":"Swapper.func1"},{"pkg":"internal/reflectlite","name":"Swapper.func2"},{"pkg":"internal/reflectlite","name":"Swapper.func3"},{"pkg":"internal/reflectlite","name":"Swapper.func4"},{"pkg":"internal/reflectlite","name":"Swapper.func5"},{"pkg":"internal/reflectlite","name":"Swapper.func6"},{"pkg":"internal/reflectlite","name":"Swapper.func7"},{"pkg":"internal/reflectlite","name":"Swapper.func8"},{"pkg":"internal/reflectlite","name":"Swapper.func9"},{"pkg":"internal/reflectlite","name":"TypeOf"},{"pkg":"internal/reflectlite","name":"Value.Kind"},{"pkg":"internal/reflectlite","name":"Value.Len"},{"pkg":"internal/reflectlite","name":"Value.pointer"},{"pkg":"internal/reflectlite","name":"ValueError.Error"},{"pkg":"internal/reflectlite","name":"ValueOf"},{"pkg":"internal/reflectlite","name":"add"},{"pkg":"internal/reflectlite","name":"arrayAt"},{"pkg":"internal/reflectlite","name":"chanlen"},{"pkg":"internal/reflectlite","name":"escapes"},{"pkg":"internal/reflectlite","name":"flag.kind"},{"pkg":"internal/reflectlite","name":"ifaceIndir"},{"pkg":"internal/reflectlite","name":"interfaceType.NumMethod"},{"pkg":"internal/reflectlite","name":"maplen"},{"pkg":"internal/reflectlite","name":"name.data"},{"pkg":"internal/reflectlite","name":"name.name"},{"pkg":"internal/reflectlite","name":"name.readVarint"},{"pkg":"internal/reflectlite","name":"resolveNameOff"},{"pkg":"internal/reflectlite","name":"rtype.Elem"},{"pkg":"internal/reflectlite","name":"rtype.Kind"},{"pkg":"internal/reflectlite","name":"rtype.Len"},{"pkg":"internal/reflectlite","name":"rtype.Name"},{"pkg":"internal/reflectlite","name":"rtype.NumField"},{"pkg":"internal/reflectlite","name":"rtype.NumMethod"},{"pkg":"internal/reflectlite","name":"rtype.PkgPath"},{"pkg":"internal/reflectlite","name":"rtype.Size"},{"pkg":"internal/reflectlite","name":"rtype.String"},{"pkg":"internal/reflectlite","name":"rtype.exportedMethods"},{"pkg":"internal/reflectlite","name":"rtype.hasName"},{"pkg":"internal/reflectlite","name":"rtype.nameOff"},{"pkg":"internal/reflectlite","name":"rtype.pointers"},{"pkg":"internal/reflectlite","name":"rtype.uncommon"},{"pkg":"internal/reflectlite","name":"toType"},{"pkg":"internal/reflectlite","name":"typedmemmove"},{"pkg":"internal/reflectlite","name":"uncommonType.exportedMethods"},{"pkg":"internal/reflectlite","name":"unpackEface"},{"pkg":"internal/reflectlite","name":"unsafe_New"},{"pkg":"internal/safefilepath","name":"init"},{"pkg":"internal/syscall/unix","name":"IsNonblock"},{"pkg":"io","name":"init"},{"pkg":"io/fs","name":"PathError.Error"},{"pkg":"io/fs","name":"init"},{"pkg":"main","name":"main"},{"pkg":"math","name":"Abs"},{"pkg":"math","name":"Float32bits"},{"pkg":"math","name":"Float32frombits"},{"pkg":"math","name":"Float64bits"},{"pkg":"math","name":"Float64frombits"},{"pkg":"math","name":"Inf"},{"pkg":"math","name":"IsInf"},{"pkg":"math","name":"IsNaN"},{"pkg":"math","name":"NaN"},{"pkg":"math","name":"init"},{"pkg":"math/bits","name":"LeadingZeros64"},{"pkg":"math/bits","name":"TrailingZeros"},{"pkg":"os","name":"File.Name"},{"pkg":"os","name":"File.Write"},{"pkg":"os","name":"File.checkValid"},{"pkg":"os","name":"File.wrapErr"},{"pkg":"os","name":"File.write"},{"pkg":"os","name":"NewFile"},{"pkg":"os","name":"dirInfo.close"},{"pkg":"os","name":"epipecheck"},{"pkg":"os","name":"file.close"},{"pkg":"os","name":"glob..func1"},{"pkg":"os","name":"init"},{"pkg":"os","name":"init.0"},{"pkg":"os","name":"init.1"},{"pkg":"os","name":"newFile"},{"pkg":"os","name":"runtime_args"},{"pkg":"os","name":"sigpipe"},{"pkg":"os/signal","name":"signal_ignored"},{"pkg":"path","name":"init"},{"pkg":"reflect","name":"ChanDir.String"},{"pkg":"reflect","name":"Copy"},{"pkg":"reflect","name":"Kind.String"},{"pkg":"reflect","name":"MakeMap"},{"pkg":"reflect","name":"MakeMapWithSize"},{"pkg":"reflect","name":"MakeSlice"},{"pkg":"reflect","name":"MapIter.Key"},{"pkg":"reflect","name":"MapIter.Next"},{"pkg":"reflect","name":"MapIter.Value"},{"pkg":"reflect","name":"New"},{"pkg":"reflect","name":"PointerTo"},{"pkg":"reflect","name":"StructField.IsExported"},{"pkg":"reflect","name":"StructTag.Get"},{"pkg":"reflect","name":"StructTag.Lookup"},{"pkg":"reflect","name":"TypeOf"},{"pkg":"reflect","name":"Value.Addr"},{"pkg":"reflect","name":"Value.Bool"},{"pkg":"reflect","name":"Value.Bytes"},{"pkg":"reflect","name":"Value.CanAddr"},{"pkg":"reflect","name":"Value.CanInterface"},{"pkg":"reflect","name":"Value.CanSet"},{"pkg":"reflect","name":"Value.Cap"},{"pkg":"reflect","name":"Value.Complex"},{"pkg":"reflect","name":"Value.Convert"},{"pkg":"reflect","name":"Value.Elem"},{"pkg":"reflect","name":"Value.Field"},{"pkg":"reflect","name":"Value.Float"},{"pkg":"reflect","name":"Value.Index"},{"pkg":"reflect","name":"Value.Int"},{"pkg":"reflect","name":"Value.Interface"},{"pkg":"reflect","name":"Value.IsNil"},{"pkg":"reflect","name":"Value.IsValid"},{"pkg":"reflect","name":"Value.Kind"},{"pkg":"reflect","name":"Value.Len"},{"pkg":"reflect","name":"Value.MapRange"},{"pkg":"reflect","name":"Value.NumField"},{"pkg":"reflect","name":"Value.NumMethod"},{"pkg":"reflect","name":"Value.OverflowFloat"},{"pkg":"reflect","name":"Value.OverflowInt"},{"pkg":"reflect","name":"Value.OverflowUint"},{"pkg":"reflect","name":"Value.Pointer"},{"pkg":"reflect","name":"Value.Set"},{"pkg":"reflect","name":"Value.SetBool"},{"pkg":"reflect","name":"Value.SetBytes"},{"pkg":"reflect","name":"Value.SetFloat"},{"pkg":"reflect","name":"Value.SetInt"},{"pkg":"reflect","name":"Value.SetLen"},{"pkg":"reflect","name":"Value.SetMapIndex"},{"pkg":"reflect","name":"Value.SetString"},{"pkg":"reflect","name":"Value.SetUint"},{"pkg":"reflect","name":"Value.Slice"},{"pkg":"reflect","name":"Value.String"},{"pkg":"reflect","name":"Value.Type"},{"pkg":"reflect","name":"Value.Uint"},{"pkg":"reflect","name":"Value.UnsafePointer"},{"pkg":"reflect","name":"Value.assignTo"},{"pkg":"reflect","name":"Value.bytesSlow"},{"pkg":"reflect","name":"Value.lenNonSlice"},{"pkg":"reflect","name":"Value.panicNotBool"},{"pkg":"reflect","name":"Value.pointer"},{"pkg":"reflect","name":"Value.runes"},{"pkg":"reflect","name":"Value.setRunes"},{"pkg":"reflect","name":"Value.stringNonString"},{"pkg":"reflect","name":"Value.typeSlow"},{"pkg":"reflect","name":"ValueError.Error"},{"pkg":"reflect","name":"ValueOf"},{"pkg":"reflect","name":"Zero"},{"pkg":"reflect","name":"abiSeq.addArg"},{"pkg":"reflect","name":"abiSeq.addRcvr"},{"pkg":"reflect","name":"abiSeq.assignFloatN"},{"pkg":"reflect","name":"abiSeq.assignIntN"},{"pkg":"reflect","name":"abiSeq.regAssign"},{"pkg":"reflect","name":"abiSeq.stackAssign"},{"pkg":"reflect","name":"abiSeq.stepsForValue"},{"pkg":"reflect","name":"add"},{"pkg":"reflect","name":"addReflectOff"},{"pkg":"reflect","name":"addTypeBits"},{"pkg":"reflect","name":"align"},{"pkg":"reflect","name":"archFloat32ToReg"},{"pkg":"reflect","name":"arrayAt"},{"pkg":"reflect","name":"bitVector.append"},{"pkg":"reflect","name":"callMethod"},{"pkg":"reflect","name":"chanlen"},{"pkg":"reflect","name":"convertOp"},{"pkg":"reflect","name":"copyVal"},{"pkg":"reflect","name":"cvtBytesString"},{"pkg":"reflect","name":"cvtComplex"},{"pkg":"reflect","name":"cvtDirect"},{"pkg":"reflect","name":"cvtFloat"},{"pkg":"reflect","name":"cvtFloatInt"},{"pkg":"reflect","name":"cvtFloatUint"},{"pkg":"reflect","name":"cvtI2I"},{"pkg":"reflect","name":"cvtInt"},{"pkg":"reflect","name":"cvtIntFloat"},{"pkg":"reflect","name":"cvtIntString"},{"pkg":"reflect","name":"cvtRunesString"},{"pkg":"reflect","name":"cvtSliceArray"},{"pkg":"reflect","name":"cvtSliceArrayPtr"},{"pkg":"reflect","name":"cvtStringBytes"},{"pkg":"reflect","name":"cvtStringRunes"},{"pkg":"reflect","name":"cvtT2I"},{"pkg":"reflect","name":"cvtUint"},{"pkg":"reflect","name":"cvtUintFloat"},{"pkg":"reflect","name":"cvtUintString"},{"pkg":"reflect","name":"directlyAssignable"},{"pkg":"reflect","name":"escapes"},{"pkg":"reflect","name":"flag.kind"},{"pkg":"reflect","name":"flag.mustBe"},{"pkg":"reflect","name":"flag.mustBeAssignable"},{"pkg":"reflect","name":"flag.mustBeAssignableSlow"},{"pkg":"reflect","name":"flag.mustBeExported"},{"pkg":"reflect","name":"flag.mustBeExportedSlow"},{"pkg":"reflect","name":"flag.panicNotMap"},{"pkg":"reflect","name":"flag.ro"},{"pkg":"reflect","name":"floatFromReg"},{"pkg":"reflect","name":"floatToReg"},{"pkg":"reflect","name":"fnv1"},{"pkg":"reflect","name":"funcLayout"},{"pkg":"reflect","name":"funcLayout.func1"},{"pkg":"reflect","name":"funcType.Bits"},{"pkg":"reflect","name":"funcType.Elem"},{"pkg":"reflect","name":"funcType.Field"},{"pkg":"reflect","name":"funcType.Implements"},{"pkg":"reflect","name":"funcType.Key"},{"pkg":"reflect","name":"funcType.Kind"},{"pkg":"reflect","name":"funcType.Len"},{"pkg":"reflect","name":"funcType.Name"},{"pkg":"reflect","name":"funcType.NumField"},{"pkg":"reflect","name":"funcType.NumMethod"},{"pkg":"reflect","name":"funcType.PkgPath"},{"pkg":"reflect","name":"funcType.String"},{"pkg":"reflect","name":"funcType.common"},{"pkg":"reflect","name":"funcType.in"},{"pkg":"reflect","name":"funcType.out"},{"pkg":"reflect","name":"haveIdenticalType"},{"pkg":"reflect","name":"haveIdenticalUnderlyingType"},{"pkg":"reflect","name":"hiter.initialized"},{"pkg":"reflect","name":"ifaceE2I"},{"pkg":"reflect","name":"ifaceIndir"},{"pkg":"reflect","name":"implements"},{"pkg":"reflect","name":"init"},{"pkg":"reflect","name":"intFromReg"},{"pkg":"reflect","name":"intToReg"},{"pkg":"reflect","name":"interfaceType.NumMethod"},{"pkg":"reflect","name":"makeBytes"},{"pkg":"reflect","name":"makeComplex"},{"pkg":"reflect","name":"makeFloat"},{"pkg":"reflect","name":"makeFloat32"},{"pkg":"reflect","name":"makeInt"},{"pkg":"reflect","name":"makeMethodValue"},{"pkg":"reflect","name":"makeRunes"},{"pkg":"reflect","name":"makeString"},{"pkg":"reflect","name":"makemap"},{"pkg":"reflect","name":"mapassign"},{"pkg":"reflect","name":"mapassign_faststr"},{"pkg":"reflect","name":"mapdelete"},{"pkg":"reflect","name":"mapdelete_faststr"},{"pkg":"reflect","name":"mapiterelem"},{"pkg":"reflect","name":"mapiterinit"},{"pkg":"reflect","name":"mapiterkey"},{"pkg":"reflect","name":"mapiternext"},{"pkg":"reflect","name":"maplen"},{"pkg":"reflect","name":"memmove"},{"pkg":"reflect","name":"methodReceiver"},{"pkg":"reflect","name":"methodValueCall"},{"pkg":"reflect","name":"methodValueCallCodePtr"},{"pkg":"reflect","name":"moveMakeFuncArgPtrs"},{"pkg":"reflect","name":"name.data"},{"pkg":"reflect","name":"name.embedded"},{"pkg":"reflect","name":"name.hasTag"},{"pkg":"reflect","name":"name.isExported"},{"pkg":"reflect","name":"name.name"},{"pkg":"reflect","name":"name.pkgPath"},{"pkg":"reflect","name":"name.readVarint"},{"pkg":"reflect","name":"name.tag"},{"pkg":"reflect","name":"newAbiDesc"},{"pkg":"reflect","name":"newName"},{"pkg":"reflect","name":"overflowFloat32"},{"pkg":"reflect","name":"packEface"},{"pkg":"reflect","name":"ptrType.Bits"},{"pkg":"reflect","name":"ptrType.Elem"},{"pkg":"reflect","name":"ptrType.Field"},{"pkg":"reflect","name":"ptrType.Implements"},{"pkg":"reflect","name":"ptrType.Key"},{"pkg":"reflect","name":"ptrType.Kind"},{"pkg":"reflect","name":"ptrType.Len"},{"pkg":"reflect","name":"ptrType.Name"},{"pkg":"reflect","name":"ptrType.NumField"},{"pkg":"reflect","name":"ptrType.NumMethod"},{"pkg":"reflect","name":"ptrType.PkgPath"},{"pkg":"reflect","name":"ptrType.String"},{"pkg":"reflect","name":"ptrType.common"},{"pkg":"reflect","name":"resolveNameOff"},{"pkg":"reflect","name":"resolveReflectName"},{"pkg":"reflect","name":"resolveTextOff"},{"pkg":"reflect","name":"resolveTypeOff"},{"pkg":"reflect","name":"rtype.Bits"},{"pkg":"reflect","name":"rtype.ChanDir"},{"pkg":"reflect","name":"rtype.Elem"},{"pkg":"reflect","name":"rtype.Field"},{"pkg":"reflect","name":"rtype.Implements"},{"pkg":"reflect","name":"rtype.In"},{"pkg":"reflect","name":"rtype.Key"},{"pkg":"reflect","name":"rtype.Kind"},{"pkg":"reflect","name":"rtype.Len"},{"pkg":"reflect","name":"rtype.Name"},{"pkg":"reflect","name":"rtype.NumField"},{"pkg":"reflect","name":"rtype.NumIn"},{"pkg":"reflect","name":"rtype.NumMethod"},{"pkg":"reflect","name":"rtype.NumOut"},{"pkg":"reflect","name":"rtype.Out"},{"pkg":"reflect","name":"rtype.PkgPath"},{"pkg":"reflect","name":"rtype.Size"},{"pkg":"reflect","name":"rtype.String"},{"pkg":"reflect","name":"rtype.common"},{"pkg":"reflect","name":"rtype.exportedMethods"},{"pkg":"reflect","name":"rtype.hasName"},{"pkg":"reflect","name":"rtype.nameOff"},{"pkg":"reflect","name":"rtype.pointers"},{"pkg":"reflect","name":"rtype.ptrTo"},{"pkg":"reflect","name":"rtype.textOff"},{"pkg":"reflect","name":"rtype.typeOff"},{"pkg":"reflect","name":"rtype.uncommon"},{"pkg":"reflect","name":"rtypeOf"},{"pkg":"reflect","name":"rtypeOff"},{"pkg":"reflect","name":"specialChannelAssignability"},{"pkg":"reflect","name":"storeRcvr"},{"pkg":"reflect","name":"structField.embedded"},{"pkg":"reflect","name":"structType.Field"},{"pkg":"reflect","name":"toType"},{"pkg":"reflect","name":"typedmemclr"},{"pkg":"reflect","name":"typedmemmove"},{"pkg":"reflect","name":"typedslicecopy"},{"pkg":"reflect","name":"typelinks"},{"pkg":"reflect","name":"typesByString"},{"pkg":"reflect","name":"typesMustMatch"},{"pkg":"reflect","name":"uncommonType.exportedMethods"},{"pkg":"reflect","name":"uncommonType.methods"},{"pkg":"reflect","name":"unpackEface"},{"pkg":"reflect","name":"unsafe_New"},{"pkg":"reflect","name":"unsafe_NewArray"},{"pkg":"reflect","name":"valueInterface"},{"pkg":"reflect","name":"valueMethodName"},{"pkg":"reflect","name":"verifyNotInHeapPtr"},{"pkg":"reflect","name":"writeVarint"},{"pkg":"runtime","name":"Callers"},{"pkg":"runtime","name":"CallersFrames"},{"pkg":"runtime","name":"Frames.Next"},{"pkg":"runtime","name":"Func.Entry"},{"pkg":"runtime","name":"Func.startLine"},{"pkg":"runtime","name":"GOMAXPROCS"},{"pkg":"runtime","name":"Gosched"},{"pkg":"runtime","name":"SetFinalizer"},{"pkg":"runtime","name":"SetFinalizer.func1"},{"pkg":"runtime","name":"SetFinalizer.func2"},{"pkg":"runtime","name":"TypeAssertionError.Error"},{"pkg":"runtime","name":"_ELF_ST_BIND"},{"pkg":"runtime","name":"_ELF_ST_TYPE"},{"pkg":"runtime","name":"_ExternalCode"},{"pkg":"runtime","name":"_GC"},{"pkg":"runtime","name":"_LostExternalCode"},{"pkg":"runtime","name":"_LostSIGPROFDuringAtomic64"},{"pkg":"runtime","name":"_System"},{"pkg":"runtime","name":"_VDSO"},{"pkg":"runtime","name":"_func.funcInfo"},{"pkg":"runtime","name":"_func.isInlined"},{"pkg":"runtime","name":"_type.nameOff"},{"pkg":"runtime","name":"_type.pkgpath"},{"pkg":"runtime","name":"_type.string"},{"pkg":"runtime","name":"_type.textOff"},{"pkg":"runtime","name":"_type.typeOff"},{"pkg":"runtime","name":"_type.uncommon"},{"pkg":"runtime","name":"abort"},{"pkg":"runtime","name":"acquireSudog"},{"pkg":"runtime","name":"acquirem"},{"pkg":"runtime","name":"acquirep"},{"pkg":"runtime","name":"activeModules"},{"pkg":"runtime","name":"activeSweep.begin"},{"pkg":"runtime","name":"activeSweep.end"},{"pkg":"runtime","name":"activeSweep.isDone"},{"pkg":"runtime","name":"activeSweep.markDrained"},{"pkg":"runtime","name":"activeSweep.reset"},{"pkg":"runtime","name":"activeSweep.sweepers"},{"pkg":"runtime","name":"add"},{"pkg":"runtime","name":"add1"},{"pkg":"runtime","name":"addAdjustedTimers"},{"pkg":"runtime","name":"addOneOpenDeferFrame"},{"pkg":"runtime","name":"addOneOpenDeferFrame.func1"},{"pkg":"runtime","name":"addOneOpenDeferFrame.func1.1"},{"pkg":"runtime","name":"addb"},{"pkg":"runtime","name":"addfinalizer"},{"pkg":"runtime","name":"addrRange.contains"},{"pkg":"runtime","name":"addrRange.size"},{"pkg":"runtime","name":"addrRange.subtract"},{"pkg":"runtime","name":"addrRanges.add"},{"pkg":"runtime","name":"addrRanges.findAddrGreaterEqual"},{"pkg":"runtime","name":"addrRanges.findSucc"},{"pkg":"runtime","name":"addrRanges.init"},{"pkg":"runtime","name":"addrsToSummaryRange"},{"pkg":"runtime","name":"addspecial"},{"pkg":"runtime","name":"adjustSignalStack"},{"pkg":"runtime","name":"adjustctxt"},{"pkg":"runtime","name":"adjustdefers"},{"pkg":"runtime","name":"adjustframe"},{"pkg":"runtime","name":"adjustpanics"},{"pkg":"runtime","name":"adjustpointer"},{"pkg":"runtime","name":"adjustpointers"},{"pkg":"runtime","name":"adjustsudogs"},{"pkg":"runtime","name":"adjusttimers"},{"pkg":"runtime","name":"advanceEvacuationMark"},{"pkg":"runtime","name":"alginit"},{"pkg":"runtime","name":"alignDown"},{"pkg":"runtime","name":"alignUp"},{"pkg":"runtime","name":"allGsSnapshot"},{"pkg":"runtime","name":"allgadd"},{"pkg":"runtime","name":"allocm"},{"pkg":"runtime","name":"allocm.func1"},{"pkg":"runtime","name":"allocmcache"},{"pkg":"runtime","name":"allocmcache.func1"},{"pkg":"runtime","name":"appendIntStr"},{"pkg":"runtime","name":"arenaIndex"},{"pkg":"runtime","name":"args"},{"pkg":"runtime","name":"argv_index"},{"pkg":"runtime","name":"asmcgocall"},{"pkg":"runtime","name":"asminit"},{"pkg":"runtime","name":"assertE2I"},{"pkg":"runtime","name":"assertE2I2"},{"pkg":"runtime","name":"asyncPreempt"},{"pkg":"runtime","name":"asyncPreempt2"},{"pkg":"runtime","name":"atoi"},{"pkg":"runtime","name":"atoi32"},{"pkg":"runtime","name":"atoi64"},{"pkg":"runtime","name":"atomicAllG"},{"pkg":"runtime","name":"atomicAllGIndex"},{"pkg":"runtime","name":"atomicHeadTailIndex.cas"},{"pkg":"runtime","name":"atomicHeadTailIndex.incTail"},{"pkg":"runtime","name":"atomicHeadTailIndex.load"},{"pkg":"runtime","name":"atomicHeadTailIndex.reset"},{"pkg":"runtime","name":"atomicMSpanPointer.Load"},{"pkg":"runtime","name":"atomicMSpanPointer.StoreNoWB"},{"pkg":"runtime","name":"atomicOffAddr.Clear"},{"pkg":"runtime","name":"atomicOffAddr.Load"},{"pkg":"runtime","name":"atomicOffAddr.StoreMarked"},{"pkg":"runtime","name":"atomicOffAddr.StoreMin"},{"pkg":"runtime","name":"atomicOffAddr.StoreUnmark"},{"pkg":"runtime","name":"atomicSpanSetSpinePointer.Load"},{"pkg":"runtime","name":"atomicSpanSetSpinePointer.StoreNoWB"},{"pkg":"runtime","name":"atomicstorep"},{"pkg":"runtime","name":"atomicwb"},{"pkg":"runtime","name":"badPointer"},{"pkg":"runtime","name":"badTimer"},{"pkg":"runtime","name":"badctxt"},{"pkg":"runtime","name":"badmcall"},{"pkg":"runtime","name":"badmcall2"},{"pkg":"runtime","name":"badmorestackg0"},{"pkg":"runtime","name":"badmorestackgsignal"},{"pkg":"runtime","name":"badreflectcall"},{"pkg":"runtime","name":"badsignal"},{"pkg":"runtime","name":"badsystemstack"},{"pkg":"runtime","name":"badunlockosthread"},{"pkg":"runtime","name":"bgscavenge"},{"pkg":"runtime","name":"bgsweep"},{"pkg":"runtime","name":"binarySearchTree"},{"pkg":"runtime","name":"blockAlignSummaryRange"},{"pkg":"runtime","name":"blockableSig"},{"pkg":"runtime","name":"blockevent"},{"pkg":"runtime","name":"blocksampled"},{"pkg":"runtime","name":"bmap.keys"},{"pkg":"runtime","name":"bmap.overflow"},{"pkg":"runtime","name":"bmap.setoverflow"},{"pkg":"runtime","name":"bool2int"},{"pkg":"runtime","name":"boundsError.Error"},{"pkg":"runtime","name":"bucket.bp"},{"pkg":"runtime","name":"bucket.mp"},{"pkg":"runtime","name":"bucket.stk"},{"pkg":"runtime","name":"bucketEvacuated"},{"pkg":"runtime","name":"bucketMask"},{"pkg":"runtime","name":"bucketShift"},{"pkg":"runtime","name":"bulkBarrierBitmap"},{"pkg":"runtime","name":"bulkBarrierPreWrite"},{"pkg":"runtime","name":"bulkBarrierPreWriteSrcOnly"},{"pkg":"runtime","name":"bytes"},{"pkg":"runtime","name":"c128equal"},{"pkg":"runtime","name":"c128hash"},{"pkg":"runtime","name":"c64equal"},{"pkg":"runtime","name":"c64hash"},{"pkg":"runtime","name":"call1024"},{"pkg":"runtime","name":"call1048576"},{"pkg":"runtime","name":"call1073741824"},{"pkg":"runtime","name":"call128"},{"pkg":"runtime","name":"call131072"},{"pkg":"runtime","name":"call134217728"},{"pkg":"runtime","name":"call16"},{"pkg":"runtime","name":"call16384"},{"pkg":"runtime","name":"call16777216"},{"pkg":"runtime","name":"call2048"},{"pkg":"runtime","name":"call2097152"},{"pkg":"runtime","name":"call256"},{"pkg":"runtime","name":"call262144"},{"pkg":"runtime","name":"call268435456"},{"pkg":"runtime","name":"call32"},{"pkg":"runtime","name":"call32768"},{"pkg":"runtime","name":"call33554432"},{"pkg":"runtime","name":"call4096"},{"pkg":"runtime","name":"call4194304"},{"pkg":"runtime","name":"call512"},{"pkg":"runtime","name":"call524288"},{"pkg":"runtime","name":"call536870912"},{"pkg":"runtime","name":"call64"},{"pkg":"runtime","name":"call65536"},{"pkg":"runtime","name":"call67108864"},{"pkg":"runtime","name":"call8192"},{"pkg":"runtime","name":"call8388608"},{"pkg":"runtime","name":"callCgoMmap"},{"pkg":"runtime","name":"callCgoMunmap"},{"pkg":"runtime","name":"callCgoSigaction"},{"pkg":"runtime","name":"callCgoSymbolizer"},{"pkg":"runtime","name":"callers"},{"pkg":"runtime","name":"callers.func1"},{"pkg":"runtime","name":"canPreemptM"},{"pkg":"runtime","name":"canpanic"},{"pkg":"runtime","name":"cansemacquire"},{"pkg":"runtime","name":"casGFromPreempted"},{"pkg":"runtime","name":"casGToPreemptScan"},{"pkg":"runtime","name":"casGToWaiting"},{"pkg":"runtime","name":"casfrom_Gscanstatus"},{"pkg":"runtime","name":"casgstatus"},{"pkg":"runtime","name":"casgstatus.func1"},{"pkg":"runtime","name":"castogscanstatus"},{"pkg":"runtime","name":"cfuncname"},{"pkg":"runtime","name":"cfuncnameFromNameOff"},{"pkg":"runtime","name":"cgoCheckBits"},{"pkg":"runtime","name":"cgoCheckMemmove"},{"pkg":"runtime","name":"cgoCheckSliceCopy"},{"pkg":"runtime","name":"cgoCheckTypedBlock"},{"pkg":"runtime","name":"cgoCheckTypedBlock.func1"},{"pkg":"runtime","name":"cgoCheckUsingType"},{"pkg":"runtime","name":"cgoCheckWriteBarrier"},{"pkg":"runtime","name":"cgoCheckWriteBarrier.func1"},{"pkg":"runtime","name":"cgoContextPCs"},{"pkg":"runtime","name":"cgoInRange"},{"pkg":"runtime","name":"cgoIsGoPointer"},{"pkg":"runtime","name":"cgoSigtramp"},{"pkg":"runtime","name":"cgocall"},{"pkg":"runtime","name":"chanbuf"},{"pkg":"runtime","name":"chanparkcommit"},{"pkg":"runtime","name":"chanrecv"},{"pkg":"runtime","name":"chanrecv.func1"},{"pkg":"runtime","name":"chanrecv1"},{"pkg":"runtime","name":"chansend"},{"pkg":"runtime","name":"chansend.func1"},{"pkg":"runtime","name":"chansend1"},{"pkg":"runtime","name":"check"},{"pkg":"runtime","name":"checkASM"},{"pkg":"runtime","name":"checkIdleGCNoP"},{"pkg":"runtime","name":"checkRunqsNoP"},{"pkg":"runtime","name":"checkTimers"},{"pkg":"runtime","name":"checkTimersNoP"},{"pkg":"runtime","name":"checkdead"},{"pkg":"runtime","name":"checkdead.func1"},{"pkg":"runtime","name":"checkmcount"},{"pkg":"runtime","name":"chunkBase"},{"pkg":"runtime","name":"chunkIdx.l1"},{"pkg":"runtime","name":"chunkIdx.l2"},{"pkg":"runtime","name":"chunkIndex"},{"pkg":"runtime","name":"chunkPageIndex"},{"pkg":"runtime","name":"clearDeletedTimers"},{"pkg":"runtime","name":"clearpools"},{"pkg":"runtime","name":"clobberfree"},{"pkg":"runtime","name":"clone"},{"pkg":"runtime","name":"closechan"},{"pkg":"runtime","name":"closefd"},{"pkg":"runtime","name":"cmpstring"},{"pkg":"runtime","name":"concatstring2"},{"pkg":"runtime","name":"concatstring3"},{"pkg":"runtime","name":"concatstring4"},{"pkg":"runtime","name":"concatstring5"},{"pkg":"runtime","name":"concatstrings"},{"pkg":"runtime","name":"consistentHeapStats.acquire"},{"pkg":"runtime","name":"consistentHeapStats.release"},{"pkg":"runtime","name":"convT"},{"pkg":"runtime","name":"convT64"},{"pkg":"runtime","name":"convTnoptr"},{"pkg":"runtime","name":"convTslice"},{"pkg":"runtime","name":"convTstring"},{"pkg":"runtime","name":"copystack"},{"pkg":"runtime","name":"countSub"},{"pkg":"runtime","name":"cpuProfile.add"},{"pkg":"runtime","name":"cpuProfile.addExtra"},{"pkg":"runtime","name":"cpuProfile.addNonGo"},{"pkg":"runtime","name":"cpuinit"},{"pkg":"runtime","name":"cputicks"},{"pkg":"runtime","name":"crash"},{"pkg":"runtime","name":"createfing"},{"pkg":"runtime","name":"debugCallCheck"},{"pkg":"runtime","name":"debugCallCheck.func1"},{"pkg":"runtime","name":"debugCallPanicked"},{"pkg":"runtime","name":"debugCallV2"},{"pkg":"runtime","name":"debugCallWrap"},{"pkg":"runtime","name":"debugCallWrap.func1"},{"pkg":"runtime","name":"debugCallWrap.func2"},{"pkg":"runtime","name":"debugCallWrap1"},{"pkg":"runtime","name":"debugCallWrap1.func1"},{"pkg":"runtime","name":"debugCallWrap2"},{"pkg":"runtime","name":"debugCallWrap2.func1"},{"pkg":"runtime","name":"decoderune"},{"pkg":"runtime","name":"deductAssistCredit"},{"pkg":"runtime","name":"deductSweepCredit"},{"pkg":"runtime","name":"deferCallSave"},{"pkg":"runtime","name":"deferprocStack"},{"pkg":"runtime","name":"deferreturn"},{"pkg":"runtime","name":"deltimer"},{"pkg":"runtime","name":"dematerializeGCProg"},{"pkg":"runtime","name":"dieFromSignal"},{"pkg":"runtime","name":"divRoundUp"},{"pkg":"runtime","name":"doInit"},{"pkg":"runtime","name":"doRecordGoroutineProfile"},{"pkg":"runtime","name":"doRecordGoroutineProfile.func1"},{"pkg":"runtime","name":"doSigPreempt"},{"pkg":"runtime","name":"doaddtimer"},{"pkg":"runtime","name":"dodeltimer"},{"pkg":"runtime","name":"dodeltimer0"},{"pkg":"runtime","name":"dolockOSThread"},{"pkg":"runtime","name":"dopanic_m"},{"pkg":"runtime","name":"dounlockOSThread"},{"pkg":"runtime","name":"dropg"},{"pkg":"runtime","name":"dropm"},{"pkg":"runtime","name":"duffcopy"},{"pkg":"runtime","name":"duffzero"},{"pkg":"runtime","name":"dumpgstatus"},{"pkg":"runtime","name":"dumpregs"},{"pkg":"runtime","name":"efaceeq"},{"pkg":"runtime","name":"elideWrapperCalling"},{"pkg":"runtime","name":"empty"},{"pkg":"runtime","name":"encoderune"},{"pkg":"runtime","name":"endCheckmarks"},{"pkg":"runtime","name":"entersyscall"},{"pkg":"runtime","name":"entersyscall_gcwait"},{"pkg":"runtime","name":"entersyscall_sysmon"},{"pkg":"runtime","name":"entersyscallblock"},{"pkg":"runtime","name":"entersyscallblock.func1"},{"pkg":"runtime","name":"entersyscallblock.func2"},{"pkg":"runtime","name":"entersyscallblock_handoff"},{"pkg":"runtime","name":"envKeyEqual"},{"pkg":"runtime","name":"eqslice"},{"pkg":"runtime","name":"errorAddressString.Error"},{"pkg":"runtime","name":"errorString.Error"},{"pkg":"runtime","name":"evacuate"},{"pkg":"runtime","name":"evacuate_fast32"},{"pkg":"runtime","name":"evacuate_fast64"},{"pkg":"runtime","name":"evacuate_faststr"},{"pkg":"runtime","name":"evacuated"},{"pkg":"runtime","name":"execute"},{"pkg":"runtime","name":"exit"},{"pkg":"runtime","name":"exitThread"},{"pkg":"runtime","name":"exitsyscall"},{"pkg":"runtime","name":"exitsyscall.func1"},{"pkg":"runtime","name":"exitsyscall0"},{"pkg":"runtime","name":"exitsyscallfast"},{"pkg":"runtime","name":"exitsyscallfast.func1"},{"pkg":"runtime","name":"exitsyscallfast_pidle"},{"pkg":"runtime","name":"exitsyscallfast_reacquired"},{"pkg":"runtime","name":"exitsyscallfast_reacquired.func1"},{"pkg":"runtime","name":"expandCgoFrames"},{"pkg":"runtime","name":"extendRandom"},{"pkg":"runtime","name":"f32equal"},{"pkg":"runtime","name":"f32hash"},{"pkg":"runtime","name":"f64equal"},{"pkg":"runtime","name":"f64hash"},{"pkg":"runtime","name":"fastexprand"},{"pkg":"runtime","name":"fastlog2"},{"pkg":"runtime","name":"fastrand"},{"pkg":"runtime","name":"fastrand64"},{"pkg":"runtime","name":"fastrandinit"},{"pkg":"runtime","name":"fastrandn"},{"pkg":"runtime","name":"fatal"},{"pkg":"runtime","name":"fatal.func1"},{"pkg":"runtime","name":"fatalpanic"},{"pkg":"runtime","name":"fatalpanic.func1"},{"pkg":"runtime","name":"fatalpanic.func2"},{"pkg":"runtime","name":"fatalthrow"},{"pkg":"runtime","name":"fatalthrow.func1"},{"pkg":"runtime","name":"fillAligned"},{"pkg":"runtime","name":"fillAligned.func1"},{"pkg":"runtime","name":"finalizercommit"},{"pkg":"runtime","name":"findBitRange64"},{"pkg":"runtime","name":"findObject"},{"pkg":"runtime","name":"findRunnable"},{"pkg":"runtime","name":"findfunc"},{"pkg":"runtime","name":"findmoduledatap"},{"pkg":"runtime","name":"findnull"},{"pkg":"runtime","name":"findsghi"},{"pkg":"runtime","name":"finishsweep_m"},{"pkg":"runtime","name":"fixalloc.alloc"},{"pkg":"runtime","name":"fixalloc.free"},{"pkg":"runtime","name":"fixalloc.init"},{"pkg":"runtime","name":"float64bits"},{"pkg":"runtime","name":"fmtNSAsMS"},{"pkg":"runtime","name":"forEachG"},{"pkg":"runtime","name":"forEachGRace"},{"pkg":"runtime","name":"forEachP"},{"pkg":"runtime","name":"forcegchelper"},{"pkg":"runtime","name":"freeSomeWbufs"},{"pkg":"runtime","name":"freeSomeWbufs.func1"},{"pkg":"runtime","name":"freeSpecial"},{"pkg":"runtime","name":"freeStackSpans"},{"pkg":"runtime","name":"freedefer"},{"pkg":"runtime","name":"freedeferfn"},{"pkg":"runtime","name":"freedeferpanic"},{"pkg":"runtime","name":"freemcache"},{"pkg":"runtime","name":"freemcache.func1"},{"pkg":"runtime","name":"freezetheworld"},{"pkg":"runtime","name":"full"},{"pkg":"runtime","name":"funcInfo.entry"},{"pkg":"runtime","name":"funcInfo.valid"},{"pkg":"runtime","name":"funcMaxSPDelta"},{"pkg":"runtime","name":"funcdata"},{"pkg":"runtime","name":"funcfile"},{"pkg":"runtime","name":"funcline"},{"pkg":"runtime","name":"funcline1"},{"pkg":"runtime","name":"funcname"},{"pkg":"runtime","name":"funcnameFromNameOff"},{"pkg":"runtime","name":"funcpkgpath"},{"pkg":"runtime","name":"funcspdelta"},{"pkg":"runtime","name":"functype.dotdotdot"},{"pkg":"runtime","name":"functype.in"},{"pkg":"runtime","name":"functype.out"},{"pkg":"runtime","name":"futex"},{"pkg":"runtime","name":"futexsleep"},{"pkg":"runtime","name":"futexwakeup"},{"pkg":"runtime","name":"futexwakeup.func1"},{"pkg":"runtime","name":"gList.empty"},{"pkg":"runtime","name":"gList.pop"},{"pkg":"runtime","name":"gList.push"},{"pkg":"runtime","name":"gList.pushAll"},{"pkg":"runtime","name":"gQueue.empty"},{"pkg":"runtime","name":"gQueue.pop"},{"pkg":"runtime","name":"gQueue.popList"},{"pkg":"runtime","name":"gQueue.push"},{"pkg":"runtime","name":"gQueue.pushBack"},{"pkg":"runtime","name":"gQueue.pushBackAll"},{"pkg":"runtime","name":"gcAssistAlloc"},{"pkg":"runtime","name":"gcAssistAlloc.func1"},{"pkg":"runtime","name":"gcAssistAlloc1"},{"pkg":"runtime","name":"gcBgMarkPrepare"},{"pkg":"runtime","name":"gcBgMarkStartWorkers"},{"pkg":"runtime","name":"gcBgMarkWorker"},{"pkg":"runtime","name":"gcBgMarkWorker.func1"},{"pkg":"runtime","name":"gcBgMarkWorker.func2"},{"pkg":"runtime","name":"gcBits.bitp"},{"pkg":"runtime","name":"gcBits.bytep"},{"pkg":"runtime","name":"gcBitsArena.tryAlloc"},{"pkg":"runtime","name":"gcCPULimiterState.accumulate"},{"pkg":"runtime","name":"gcCPULimiterState.addAssistTime"},{"pkg":"runtime","name":"gcCPULimiterState.addIdleTime"},{"pkg":"runtime","name":"gcCPULimiterState.finishGCTransition"},{"pkg":"runtime","name":"gcCPULimiterState.limiting"},{"pkg":"runtime","name":"gcCPULimiterState.needUpdate"},{"pkg":"runtime","name":"gcCPULimiterState.resetCapacity"},{"pkg":"runtime","name":"gcCPULimiterState.startGCTransition"},{"pkg":"runtime","name":"gcCPULimiterState.tryLock"},{"pkg":"runtime","name":"gcCPULimiterState.unlock"},{"pkg":"runtime","name":"gcCPULimiterState.update"},{"pkg":"runtime","name":"gcCPULimiterState.updateLocked"},{"pkg":"runtime","name":"gcComputeStartingStackSize"},{"pkg":"runtime","name":"gcControllerCommit"},{"pkg":"runtime","name":"gcControllerState).findRunnableGCWorker.func1"},{"pkg":"runtime","name":"gcControllerState.addGlobals"},{"pkg":"runtime","name":"gcControllerState.addIdleMarkWorker"},{"pkg":"runtime","name":"gcControllerState.addScannableStack"},{"pkg":"runtime","name":"gcControllerState.commit"},{"pkg":"runtime","name":"gcControllerState.endCycle"},{"pkg":"runtime","name":"gcControllerState.enlistWorker"},{"pkg":"runtime","name":"gcControllerState.findRunnableGCWorker"},{"pkg":"runtime","name":"gcControllerState.heapGoal"},{"pkg":"runtime","name":"gcControllerState.heapGoalInternal"},{"pkg":"runtime","name":"gcControllerState.init"},{"pkg":"runtime","name":"gcControllerState.markWorkerStop"},{"pkg":"runtime","name":"gcControllerState.memoryLimitHeapGoal"},{"pkg":"runtime","name":"gcControllerState.needIdleMarkWorker"},{"pkg":"runtime","name":"gcControllerState.removeIdleMarkWorker"},{"pkg":"runtime","name":"gcControllerState.resetLive"},{"pkg":"runtime","name":"gcControllerState.revise"},{"pkg":"runtime","name":"gcControllerState.setGCPercent"},{"pkg":"runtime","name":"gcControllerState.setMaxIdleMarkWorkers"},{"pkg":"runtime","name":"gcControllerState.setMemoryLimit"},{"pkg":"runtime","name":"gcControllerState.startCycle"},{"pkg":"runtime","name":"gcControllerState.trigger"},{"pkg":"runtime","name":"gcControllerState.update"},{"pkg":"runtime","name":"gcDrain"},{"pkg":"runtime","name":"gcDrainN"},{"pkg":"runtime","name":"gcDumpObject"},{"pkg":"runtime","name":"gcFlushBgCredit"},{"pkg":"runtime","name":"gcMark"},{"pkg":"runtime","name":"gcMarkDone"},{"pkg":"runtime","name":"gcMarkDone.func1"},{"pkg":"runtime","name":"gcMarkDone.func1.1"},{"pkg":"runtime","name":"gcMarkDone.func2"},{"pkg":"runtime","name":"gcMarkDone.func3"},{"pkg":"runtime","name":"gcMarkRootCheck"},{"pkg":"runtime","name":"gcMarkRootCheck.func1"},{"pkg":"runtime","name":"gcMarkRootPrepare"},{"pkg":"runtime","name":"gcMarkRootPrepare.func1"},{"pkg":"runtime","name":"gcMarkTermination"},{"pkg":"runtime","name":"gcMarkTermination.func1"},{"pkg":"runtime","name":"gcMarkTermination.func2"},{"pkg":"runtime","name":"gcMarkTermination.func3"},{"pkg":"runtime","name":"gcMarkTermination.func4"},{"pkg":"runtime","name":"gcMarkTermination.func4.1"},{"pkg":"runtime","name":"gcMarkTinyAllocs"},{"pkg":"runtime","name":"gcMarkWorkAvailable"},{"pkg":"runtime","name":"gcPaceScavenger"},{"pkg":"runtime","name":"gcPaceSweeper"},{"pkg":"runtime","name":"gcParkAssist"},{"pkg":"runtime","name":"gcResetMarkState"},{"pkg":"runtime","name":"gcResetMarkState.func1"},{"pkg":"runtime","name":"gcStart"},{"pkg":"runtime","name":"gcStart.func1"},{"pkg":"runtime","name":"gcStart.func2"},{"pkg":"runtime","name":"gcSweep"},{"pkg":"runtime","name":"gcTrigger.test"},{"pkg":"runtime","name":"gcWakeAllAssists"},{"pkg":"runtime","name":"gcWork.balance"},{"pkg":"runtime","name":"gcWork.dispose"},{"pkg":"runtime","name":"gcWork.empty"},{"pkg":"runtime","name":"gcWork.init"},{"pkg":"runtime","name":"gcWork.put"},{"pkg":"runtime","name":"gcWork.putBatch"},{"pkg":"runtime","name":"gcWork.putFast"},{"pkg":"runtime","name":"gcWork.tryGet"},{"pkg":"runtime","name":"gcWork.tryGetFast"},{"pkg":"runtime","name":"gcWriteBarrier"},{"pkg":"runtime","name":"gcWriteBarrierBX"},{"pkg":"runtime","name":"gcWriteBarrierCX"},{"pkg":"runtime","name":"gcWriteBarrierDX"},{"pkg":"runtime","name":"gcWriteBarrierR8"},{"pkg":"runtime","name":"gcWriteBarrierR9"},{"pkg":"runtime","name":"gcWriteBarrierSI"},{"pkg":"runtime","name":"gcallers"},{"pkg":"runtime","name":"gcd"},{"pkg":"runtime","name":"gcenable"},{"pkg":"runtime","name":"gcenable.func1"},{"pkg":"runtime","name":"gcenable.func2"},{"pkg":"runtime","name":"gcinit"},{"pkg":"runtime","name":"gclinkptr.ptr"},{"pkg":"runtime","name":"gcmarknewobject"},{"pkg":"runtime","name":"gcstopm"},{"pkg":"runtime","name":"gentraceback"},{"pkg":"runtime","name":"getGodebugEarly"},{"pkg":"runtime","name":"getHugePageSize"},{"pkg":"runtime","name":"getMCache"},{"pkg":"runtime","name":"getRandomData"},{"pkg":"runtime","name":"getargp"},{"pkg":"runtime","name":"getempty"},{"pkg":"runtime","name":"getempty.func1"},{"pkg":"runtime","name":"getitab"},{"pkg":"runtime","name":"getpid"},{"pkg":"runtime","name":"getproccount"},{"pkg":"runtime","name":"getsig"},{"pkg":"runtime","name":"gettid"},{"pkg":"runtime","name":"gfget"},{"pkg":"runtime","name":"gfget.func1"},{"pkg":"runtime","name":"gfget.func2"},{"pkg":"runtime","name":"gfpurge"},{"pkg":"runtime","name":"gfput"},{"pkg":"runtime","name":"globrunqget"},{"pkg":"runtime","name":"globrunqput"},{"pkg":"runtime","name":"globrunqputbatch"},{"pkg":"runtime","name":"globrunqputhead"},{"pkg":"runtime","name":"goPanicIndex"},{"pkg":"runtime","name":"goPanicIndexU"},{"pkg":"runtime","name":"goPanicSlice3Alen"},{"pkg":"runtime","name":"goPanicSlice3AlenU"},{"pkg":"runtime","name":"goPanicSlice3C"},{"pkg":"runtime","name":"goPanicSliceAcap"},{"pkg":"runtime","name":"goPanicSliceAcapU"},{"pkg":"runtime","name":"goPanicSliceAlen"},{"pkg":"runtime","name":"goPanicSliceAlenU"},{"pkg":"runtime","name":"goPanicSliceB"},{"pkg":"runtime","name":"goPanicSliceBU"},{"pkg":"runtime","name":"goargs"},{"pkg":"runtime","name":"goenvs"},{"pkg":"runtime","name":"goenvs_unix"},{"pkg":"runtime","name":"goexit"},{"pkg":"runtime","name":"goexit0"},{"pkg":"runtime","name":"goexit1"},{"pkg":"runtime","name":"gogetenv"},{"pkg":"runtime","name":"gogo"},{"pkg":"runtime","name":"gopanic"},{"pkg":"runtime","name":"gopark"},{"pkg":"runtime","name":"goparkunlock"},{"pkg":"runtime","name":"gopreempt_m"},{"pkg":"runtime","name":"goready"},{"pkg":"runtime","name":"goready.func1"},{"pkg":"runtime","name":"gorecover"},{"pkg":"runtime","name":"goroutineProfileStateHolder.CompareAndSwap"},{"pkg":"runtime","name":"goroutineProfileStateHolder.Load"},{"pkg":"runtime","name":"goroutineProfileStateHolder.Store"},{"pkg":"runtime","name":"goroutineheader"},{"pkg":"runtime","name":"goschedIfBusy"},{"pkg":"runtime","name":"goschedImpl"},{"pkg":"runtime","name":"gosched_m"},{"pkg":"runtime","name":"goschedguarded"},{"pkg":"runtime","name":"goschedguarded_m"},{"pkg":"runtime","name":"gostartcall"},{"pkg":"runtime","name":"gostartcallfn"},{"pkg":"runtime","name":"gostring"},{"pkg":"runtime","name":"gostringnocopy"},{"pkg":"runtime","name":"gotraceback"},{"pkg":"runtime","name":"goyield"},{"pkg":"runtime","name":"goyield_m"},{"pkg":"runtime","name":"greyobject"},{"pkg":"runtime","name":"growWork"},{"pkg":"runtime","name":"growWork_fast32"},{"pkg":"runtime","name":"growWork_fast64"},{"pkg":"runtime","name":"growWork_faststr"},{"pkg":"runtime","name":"growslice"},{"pkg":"runtime","name":"guintptr.cas"},{"pkg":"runtime","name":"guintptr.ptr"},{"pkg":"runtime","name":"guintptr.set"},{"pkg":"runtime","name":"gwrite"},{"pkg":"runtime","name":"handoff"},{"pkg":"runtime","name":"handoffp"},{"pkg":"runtime","name":"hasPrefix"},{"pkg":"runtime","name":"hashGrow"},{"pkg":"runtime","name":"hchan.raceaddr"},{"pkg":"runtime","name":"headTailIndex.head"},{"pkg":"runtime","name":"headTailIndex.split"},{"pkg":"runtime","name":"heapBits.next"},{"pkg":"runtime","name":"heapBits.nextFast"},{"pkg":"runtime","name":"heapBitsForAddr"},{"pkg":"runtime","name":"heapBitsSetType"},{"pkg":"runtime","name":"heapRetained"},{"pkg":"runtime","name":"hexdumpWords"},{"pkg":"runtime","name":"hmap.createOverflow"},{"pkg":"runtime","name":"hmap.growing"},{"pkg":"runtime","name":"hmap.incrnoverflow"},{"pkg":"runtime","name":"hmap.newoverflow"},{"pkg":"runtime","name":"hmap.noldbuckets"},{"pkg":"runtime","name":"hmap.oldbucketmask"},{"pkg":"runtime","name":"hmap.sameSizeGrow"},{"pkg":"runtime","name":"ifaceeq"},{"pkg":"runtime","name":"inHeapOrStack"},{"pkg":"runtime","name":"inPersistentAlloc"},{"pkg":"runtime","name":"inUserArenaChunk"},{"pkg":"runtime","name":"inVDSOPage"},{"pkg":"runtime","name":"incidlelocked"},{"pkg":"runtime","name":"init"},{"pkg":"runtime","name":"init.0"},{"pkg":"runtime","name":"init.1"},{"pkg":"runtime","name":"init.4"},{"pkg":"runtime","name":"init.5"},{"pkg":"runtime","name":"init.6"},{"pkg":"runtime","name":"initAlgAES"},{"pkg":"runtime","name":"initsig"},{"pkg":"runtime","name":"injectglist"},{"pkg":"runtime","name":"injectglist.func1"},{"pkg":"runtime","name":"int64Hash"},{"pkg":"runtime","name":"interequal"},{"pkg":"runtime","name":"interhash"},{"pkg":"runtime","name":"intstring"},{"pkg":"runtime","name":"isAbortPC"},{"pkg":"runtime","name":"isAsyncSafePoint"},{"pkg":"runtime","name":"isDirectIface"},{"pkg":"runtime","name":"isEmpty"},{"pkg":"runtime","name":"isExportedRuntime"},{"pkg":"runtime","name":"isFinite"},{"pkg":"runtime","name":"isInf"},{"pkg":"runtime","name":"isNaN"},{"pkg":"runtime","name":"isPowerOfTwo"},{"pkg":"runtime","name":"isShrinkStackSafe"},{"pkg":"runtime","name":"isSweepDone"},{"pkg":"runtime","name":"isSystemGoroutine"},{"pkg":"runtime","name":"itab.init"},{"pkg":"runtime","name":"itabAdd"},{"pkg":"runtime","name":"itabHashFunc"},{"pkg":"runtime","name":"itabTableType.add"},{"pkg":"runtime","name":"itabTableType.add-fm"},{"pkg":"runtime","name":"itabTableType.find"},{"pkg":"runtime","name":"itabsinit"},{"pkg":"runtime","name":"iterate_itabs"},{"pkg":"runtime","name":"itoa"},{"pkg":"runtime","name":"itoaDiv"},{"pkg":"runtime","name":"levelIndexToOffAddr"},{"pkg":"runtime","name":"lfnodeValidate"},{"pkg":"runtime","name":"lfstack.empty"},{"pkg":"runtime","name":"lfstack.pop"},{"pkg":"runtime","name":"lfstack.push"},{"pkg":"runtime","name":"lfstackPack"},{"pkg":"runtime","name":"lfstackUnpack"},{"pkg":"runtime","name":"limiterEvent.consume"},{"pkg":"runtime","name":"limiterEvent.start"},{"pkg":"runtime","name":"limiterEvent.stop"},{"pkg":"runtime","name":"limiterEventStamp.duration"},{"pkg":"runtime","name":"limiterEventStamp.typ"},{"pkg":"runtime","name":"linearAlloc.alloc"},{"pkg":"runtime","name":"lock"},{"pkg":"runtime","name":"lock2"},{"pkg":"runtime","name":"lockOSThread"},{"pkg":"runtime","name":"lockRank.String"},{"pkg":"runtime","name":"lockRankMayTraceFlush"},{"pkg":"runtime","name":"lockWithRank"},{"pkg":"runtime","name":"lockextra"},{"pkg":"runtime","name":"m.becomeSpinning"},{"pkg":"runtime","name":"mPark"},{"pkg":"runtime","name":"mProfCycleHolder.increment"},{"pkg":"runtime","name":"mProfCycleHolder.read"},{"pkg":"runtime","name":"mProfCycleHolder.setFlushed"},{"pkg":"runtime","name":"mProf_Flush"},{"pkg":"runtime","name":"mProf_FlushLocked"},{"pkg":"runtime","name":"mProf_Free"},{"pkg":"runtime","name":"mProf_Malloc"},{"pkg":"runtime","name":"mProf_Malloc.func1"},{"pkg":"runtime","name":"mProf_NextCycle"},{"pkg":"runtime","name":"mReserveID"},{"pkg":"runtime","name":"mSpanList.init"},{"pkg":"runtime","name":"mSpanList.insert"},{"pkg":"runtime","name":"mSpanList.isEmpty"},{"pkg":"runtime","name":"mSpanList.remove"},{"pkg":"runtime","name":"mSpanList.takeAll"},{"pkg":"runtime","name":"mSpanStateBox.get"},{"pkg":"runtime","name":"mSpanStateBox.set"},{"pkg":"runtime","name":"madvise"},{"pkg":"runtime","name":"main"},{"pkg":"runtime","name":"main.func1"},{"pkg":"runtime","name":"main.func2"},{"pkg":"runtime","name":"makeAddrRange"},{"pkg":"runtime","name":"makeBucketArray"},{"pkg":"runtime","name":"makeHeadTailIndex"},{"pkg":"runtime","name":"makeLimiterEventStamp"},{"pkg":"runtime","name":"makeSpanClass"},{"pkg":"runtime","name":"makechan"},{"pkg":"runtime","name":"makemap"},{"pkg":"runtime","name":"makemap_small"},{"pkg":"runtime","name":"makeslice"},{"pkg":"runtime","name":"makeslicecopy"},{"pkg":"runtime","name":"malg"},{"pkg":"runtime","name":"malg.func1"},{"pkg":"runtime","name":"mallocgc"},{"pkg":"runtime","name":"mallocinit"},{"pkg":"runtime","name":"mapaccess1"},{"pkg":"runtime","name":"mapaccess1_fast32"},{"pkg":"runtime","name":"mapaccess1_faststr"},{"pkg":"runtime","name":"mapaccess2"},{"pkg":"runtime","name":"mapaccess2_fast32"},{"pkg":"runtime","name":"mapaccess2_fast64"},{"pkg":"runtime","name":"mapaccess2_faststr"},{"pkg":"runtime","name":"mapaccessK"},{"pkg":"runtime","name":"mapassign"},{"pkg":"runtime","name":"mapassign_fast32"},{"pkg":"runtime","name":"mapassign_fast64ptr"},{"pkg":"runtime","name":"mapassign_faststr"},{"pkg":"runtime","name":"mapdelete"},{"pkg":"runtime","name":"mapdelete_faststr"},{"pkg":"runtime","name":"mapiterinit"},{"pkg":"runtime","name":"mapiternext"},{"pkg":"runtime","name":"maptype.hashMightPanic"},{"pkg":"runtime","name":"maptype.indirectelem"},{"pkg":"runtime","name":"maptype.indirectkey"},{"pkg":"runtime","name":"maptype.needkeyupdate"},{"pkg":"runtime","name":"maptype.reflexivekey"},{"pkg":"runtime","name":"markBits.advance"},{"pkg":"runtime","name":"markBits.isMarked"},{"pkg":"runtime","name":"markBits.setMarked"},{"pkg":"runtime","name":"markBits.setMarkedNonAtomic"},{"pkg":"runtime","name":"markroot"},{"pkg":"runtime","name":"markroot.func1"},{"pkg":"runtime","name":"markrootBlock"},{"pkg":"runtime","name":"markrootFreeGStacks"},{"pkg":"runtime","name":"markrootSpans"},{"pkg":"runtime","name":"materializeGCProg"},{"pkg":"runtime","name":"mcache.allocLarge"},{"pkg":"runtime","name":"mcache.nextFree"},{"pkg":"runtime","name":"mcache.prepareForSweep"},{"pkg":"runtime","name":"mcache.refill"},{"pkg":"runtime","name":"mcache.releaseAll"},{"pkg":"runtime","name":"mcall"},{"pkg":"runtime","name":"mcentral.cacheSpan"},{"pkg":"runtime","name":"mcentral.fullSwept"},{"pkg":"runtime","name":"mcentral.fullUnswept"},{"pkg":"runtime","name":"mcentral.grow"},{"pkg":"runtime","name":"mcentral.init"},{"pkg":"runtime","name":"mcentral.partialSwept"},{"pkg":"runtime","name":"mcentral.partialUnswept"},{"pkg":"runtime","name":"mcentral.uncacheSpan"},{"pkg":"runtime","name":"mcommoninit"},{"pkg":"runtime","name":"mcount"},{"pkg":"runtime","name":"memRecordCycle.add"},{"pkg":"runtime","name":"memclrHasPointers"},{"pkg":"runtime","name":"memclrNoHeapPointers"},{"pkg":"runtime","name":"memclrNoHeapPointersChunked"},{"pkg":"runtime","name":"memequal"},{"pkg":"runtime","name":"memequal0"},{"pkg":"runtime","name":"memequal128"},{"pkg":"runtime","name":"memequal16"},{"pkg":"runtime","name":"memequal32"},{"pkg":"runtime","name":"memequal64"},{"pkg":"runtime","name":"memequal8"},{"pkg":"runtime","name":"memequal_varlen"},{"pkg":"runtime","name":"memhash"},{"pkg":"runtime","name":"memhash128"},{"pkg":"runtime","name":"memhash32"},{"pkg":"runtime","name":"memhash32Fallback"},{"pkg":"runtime","name":"memhash64"},{"pkg":"runtime","name":"memhash64Fallback"},{"pkg":"runtime","name":"memhashFallback"},{"pkg":"runtime","name":"memhash_varlen"},{"pkg":"runtime","name":"memmove"},{"pkg":"runtime","name":"mergeSummaries"},{"pkg":"runtime","name":"mexit"},{"pkg":"runtime","name":"mget"},{"pkg":"runtime","name":"mheap).alloc.func1"},{"pkg":"runtime","name":"mheap).allocSpan.func1"},{"pkg":"runtime","name":"mheap).freeSpan.func1"},{"pkg":"runtime","name":"mheap.alloc"},{"pkg":"runtime","name":"mheap.allocMSpanLocked"},{"pkg":"runtime","name":"mheap.allocManual"},{"pkg":"runtime","name":"mheap.allocNeedsZero"},{"pkg":"runtime","name":"mheap.allocSpan"},{"pkg":"runtime","name":"mheap.freeMSpanLocked"},{"pkg":"runtime","name":"mheap.freeManual"},{"pkg":"runtime","name":"mheap.freeSpan"},{"pkg":"runtime","name":"mheap.freeSpanLocked"},{"pkg":"runtime","name":"mheap.grow"},{"pkg":"runtime","name":"mheap.init"},{"pkg":"runtime","name":"mheap.initSpan"},{"pkg":"runtime","name":"mheap.nextSpanForSweep"},{"pkg":"runtime","name":"mheap.reclaim"},{"pkg":"runtime","name":"mheap.reclaimChunk"},{"pkg":"runtime","name":"mheap.setSpans"},{"pkg":"runtime","name":"mheap.sysAlloc"},{"pkg":"runtime","name":"mheap.tryAllocMSpan"},{"pkg":"runtime","name":"mincore"},{"pkg":"runtime","name":"minit"},{"pkg":"runtime","name":"minitSignalMask"},{"pkg":"runtime","name":"minitSignalStack"},{"pkg":"runtime","name":"minitSignals"},{"pkg":"runtime","name":"mix"},{"pkg":"runtime","name":"mmap"},{"pkg":"runtime","name":"mmap.func1"},{"pkg":"runtime","name":"modtimer"},{"pkg":"runtime","name":"moduledata.textAddr"},{"pkg":"runtime","name":"moduledata.textOff"},{"pkg":"runtime","name":"moduledataverify"},{"pkg":"runtime","name":"moduledataverify1"},{"pkg":"runtime","name":"modulesinit"},{"pkg":"runtime","name":"morestack"},{"pkg":"runtime","name":"morestack_noctxt"},{"pkg":"runtime","name":"morestackc"},{"pkg":"runtime","name":"moveTimers"},{"pkg":"runtime","name":"mpreinit"},{"pkg":"runtime","name":"mput"},{"pkg":"runtime","name":"msigrestore"},{"pkg":"runtime","name":"mspan).setUserArenaChunkToFault.func1"},{"pkg":"runtime","name":"mspan.allocBitsForIndex"},{"pkg":"runtime","name":"mspan.base"},{"pkg":"runtime","name":"mspan.countAlloc"},{"pkg":"runtime","name":"mspan.divideByElemSize"},{"pkg":"runtime","name":"mspan.ensureSwept"},{"pkg":"runtime","name":"mspan.init"},{"pkg":"runtime","name":"mspan.initHeapBits"},{"pkg":"runtime","name":"mspan.isFree"},{"pkg":"runtime","name":"mspan.markBitsForBase"},{"pkg":"runtime","name":"mspan.markBitsForIndex"},{"pkg":"runtime","name":"mspan.nextFreeIndex"},{"pkg":"runtime","name":"mspan.objIndex"},{"pkg":"runtime","name":"mspan.refillAllocCache"},{"pkg":"runtime","name":"mspan.reportZombies"},{"pkg":"runtime","name":"mspan.setUserArenaChunkToFault"},{"pkg":"runtime","name":"mspinning"},{"pkg":"runtime","name":"mstart"},{"pkg":"runtime","name":"mstart0"},{"pkg":"runtime","name":"mstart1"},{"pkg":"runtime","name":"mstartm0"},{"pkg":"runtime","name":"muintptr.ptr"},{"pkg":"runtime","name":"muintptr.set"},{"pkg":"runtime","name":"munmap"},{"pkg":"runtime","name":"munmap.func1"},{"pkg":"runtime","name":"name.data"},{"pkg":"runtime","name":"name.isBlank"},{"pkg":"runtime","name":"name.isEmbedded"},{"pkg":"runtime","name":"name.isExported"},{"pkg":"runtime","name":"name.name"},{"pkg":"runtime","name":"name.pkgPath"},{"pkg":"runtime","name":"name.readvarint"},{"pkg":"runtime","name":"name.tag"},{"pkg":"runtime","name":"nanotime"},{"pkg":"runtime","name":"nanotime1"},{"pkg":"runtime","name":"needm"},{"pkg":"runtime","name":"netpoll"},{"pkg":"runtime","name":"netpollBreak"},{"pkg":"runtime","name":"netpollGenericInit"},{"pkg":"runtime","name":"netpollblock"},{"pkg":"runtime","name":"netpollblockcommit"},{"pkg":"runtime","name":"netpollcheckerr"},{"pkg":"runtime","name":"netpollclose"},{"pkg":"runtime","name":"netpollgoready"},{"pkg":"runtime","name":"netpollinit"},{"pkg":"runtime","name":"netpollinited"},{"pkg":"runtime","name":"netpollopen"},{"pkg":"runtime","name":"netpollready"},{"pkg":"runtime","name":"netpollunblock"},{"pkg":"runtime","name":"newAllocBits"},{"pkg":"runtime","name":"newArenaMayUnlock"},{"pkg":"runtime","name":"newBucket"},{"pkg":"runtime","name":"newMarkBits"},{"pkg":"runtime","name":"newarray"},{"pkg":"runtime","name":"newdefer"},{"pkg":"runtime","name":"newextram"},{"pkg":"runtime","name":"newm"},{"pkg":"runtime","name":"newm1"},{"pkg":"runtime","name":"newobject"},{"pkg":"runtime","name":"newosproc"},{"pkg":"runtime","name":"newosproc.func1"},{"pkg":"runtime","name":"newproc"},{"pkg":"runtime","name":"newproc.func1"},{"pkg":"runtime","name":"newproc1"},{"pkg":"runtime","name":"newstack"},{"pkg":"runtime","name":"nextFreeFast"},{"pkg":"runtime","name":"nextMarkBitArenaEpoch"},{"pkg":"runtime","name":"nextSample"},{"pkg":"runtime","name":"nilfunc"},{"pkg":"runtime","name":"nilinterequal"},{"pkg":"runtime","name":"nilinterhash"},{"pkg":"runtime","name":"noSignalStack"},{"pkg":"runtime","name":"nobarrierWakeTime"},{"pkg":"runtime","name":"nonblockingPipe"},{"pkg":"runtime","name":"notInHeap.add"},{"pkg":"runtime","name":"noteclear"},{"pkg":"runtime","name":"notesleep"},{"pkg":"runtime","name":"notetsleep"},{"pkg":"runtime","name":"notetsleep_internal"},{"pkg":"runtime","name":"notetsleepg"},{"pkg":"runtime","name":"notewakeup"},{"pkg":"runtime","name":"offAddr.add"},{"pkg":"runtime","name":"offAddr.addr"},{"pkg":"runtime","name":"offAddr.diff"},{"pkg":"runtime","name":"offAddr.equal"},{"pkg":"runtime","name":"offAddr.lessEqual"},{"pkg":"runtime","name":"offAddr.lessThan"},{"pkg":"runtime","name":"offAddrToLevelIndex"},{"pkg":"runtime","name":"oneNewExtraM"},{"pkg":"runtime","name":"open"},{"pkg":"runtime","name":"osinit"},{"pkg":"runtime","name":"osyield"},{"pkg":"runtime","name":"osyield_no_g"},{"pkg":"runtime","name":"overLoadFactor"},{"pkg":"runtime","name":"p).destroy.func1"},{"pkg":"runtime","name":"p.destroy"},{"pkg":"runtime","name":"p.init"},{"pkg":"runtime","name":"pMask.clear"},{"pkg":"runtime","name":"pMask.read"},{"pkg":"runtime","name":"pMask.set"},{"pkg":"runtime","name":"packPallocSum"},{"pkg":"runtime","name":"pageAlloc).find.func1"},{"pkg":"runtime","name":"pageAlloc).scavenge.func1"},{"pkg":"runtime","name":"pageAlloc).sysGrow.func1"},{"pkg":"runtime","name":"pageAlloc).sysGrow.func2"},{"pkg":"runtime","name":"pageAlloc).sysGrow.func3"},{"pkg":"runtime","name":"pageAlloc.alloc"},{"pkg":"runtime","name":"pageAlloc.allocRange"},{"pkg":"runtime","name":"pageAlloc.allocToCache"},{"pkg":"runtime","name":"pageAlloc.chunkOf"},{"pkg":"runtime","name":"pageAlloc.find"},{"pkg":"runtime","name":"pageAlloc.findMappedAddr"},{"pkg":"runtime","name":"pageAlloc.free"},{"pkg":"runtime","name":"pageAlloc.grow"},{"pkg":"runtime","name":"pageAlloc.init"},{"pkg":"runtime","name":"pageAlloc.scavenge"},{"pkg":"runtime","name":"pageAlloc.scavengeOne"},{"pkg":"runtime","name":"pageAlloc.sysGrow"},{"pkg":"runtime","name":"pageAlloc.sysInit"},{"pkg":"runtime","name":"pageAlloc.update"},{"pkg":"runtime","name":"pageBits.block64"},{"pkg":"runtime","name":"pageBits.clear"},{"pkg":"runtime","name":"pageBits.clearAll"},{"pkg":"runtime","name":"pageBits.clearBlock64"},{"pkg":"runtime","name":"pageBits.clearRange"},{"pkg":"runtime","name":"pageBits.popcntRange"},{"pkg":"runtime","name":"pageBits.set"},{"pkg":"runtime","name":"pageBits.setAll"},{"pkg":"runtime","name":"pageBits.setBlock64"},{"pkg":"runtime","name":"pageBits.setRange"},{"pkg":"runtime","name":"pageCache.alloc"},{"pkg":"runtime","name":"pageCache.allocN"},{"pkg":"runtime","name":"pageCache.empty"},{"pkg":"runtime","name":"pageCache.flush"},{"pkg":"runtime","name":"pageIndexOf"},{"pkg":"runtime","name":"pallocBits.allocAll"},{"pkg":"runtime","name":"pallocBits.allocPages64"},{"pkg":"runtime","name":"pallocBits.allocRange"},{"pkg":"runtime","name":"pallocBits.find"},{"pkg":"runtime","name":"pallocBits.find1"},{"pkg":"runtime","name":"pallocBits.findLargeN"},{"pkg":"runtime","name":"pallocBits.findSmallN"},{"pkg":"runtime","name":"pallocBits.free"},{"pkg":"runtime","name":"pallocBits.free1"},{"pkg":"runtime","name":"pallocBits.freeAll"},{"pkg":"runtime","name":"pallocBits.pages64"},{"pkg":"runtime","name":"pallocBits.summarize"},{"pkg":"runtime","name":"pallocData.allocAll"},{"pkg":"runtime","name":"pallocData.allocRange"},{"pkg":"runtime","name":"pallocData.findScavengeCandidate"},{"pkg":"runtime","name":"pallocSum.end"},{"pkg":"runtime","name":"pallocSum.max"},{"pkg":"runtime","name":"pallocSum.start"},{"pkg":"runtime","name":"pallocSum.unpack"},{"pkg":"runtime","name":"panicCheck1"},{"pkg":"runtime","name":"panicCheck2"},{"pkg":"runtime","name":"panicIndex"},{"pkg":"runtime","name":"panicIndexU"},{"pkg":"runtime","name":"panicSlice3Alen"},{"pkg":"runtime","name":"panicSlice3AlenU"},{"pkg":"runtime","name":"panicSlice3C"},{"pkg":"runtime","name":"panicSliceAcap"},{"pkg":"runtime","name":"panicSliceAcapU"},{"pkg":"runtime","name":"panicSliceAlen"},{"pkg":"runtime","name":"panicSliceAlenU"},{"pkg":"runtime","name":"panicSliceB"},{"pkg":"runtime","name":"panicSliceBU"},{"pkg":"runtime","name":"panicdivide"},{"pkg":"runtime","name":"panicdottypeE"},{"pkg":"runtime","name":"panicdottypeI"},{"pkg":"runtime","name":"panicfloat"},{"pkg":"runtime","name":"panicmakeslicecap"},{"pkg":"runtime","name":"panicmakeslicelen"},{"pkg":"runtime","name":"panicmem"},{"pkg":"runtime","name":"panicmemAddr"},{"pkg":"runtime","name":"panicoverflow"},{"pkg":"runtime","name":"panicshift"},{"pkg":"runtime","name":"panicunsafeslicelen"},{"pkg":"runtime","name":"panicunsafeslicenilptr"},{"pkg":"runtime","name":"panicunsafestringlen"},{"pkg":"runtime","name":"panicunsafestringnilptr"},{"pkg":"runtime","name":"panicwrap"},{"pkg":"runtime","name":"park_m"},{"pkg":"runtime","name":"parkunlock_c"},{"pkg":"runtime","name":"parseByteCount"},{"pkg":"runtime","name":"parsedebugvars"},{"pkg":"runtime","name":"pcdatastart"},{"pkg":"runtime","name":"pcdatavalue"},{"pkg":"runtime","name":"pcdatavalue1"},{"pkg":"runtime","name":"pcdatavalue2"},{"pkg":"runtime","name":"pcvalue"},{"pkg":"runtime","name":"pcvalueCacheKey"},{"pkg":"runtime","name":"persistentalloc"},{"pkg":"runtime","name":"persistentalloc.func1"},{"pkg":"runtime","name":"persistentalloc1"},{"pkg":"runtime","name":"piController.next"},{"pkg":"runtime","name":"piController.reset"},{"pkg":"runtime","name":"pidleget"},{"pkg":"runtime","name":"pidlegetSpinning"},{"pkg":"runtime","name":"pidleput"},{"pkg":"runtime","name":"pipe2"},{"pkg":"runtime","name":"plainError.Error"},{"pkg":"runtime","name":"pollCache.alloc"},{"pkg":"runtime","name":"pollCache.free"},{"pkg":"runtime","name":"pollDesc.info"},{"pkg":"runtime","name":"pollDesc.publishInfo"},{"pkg":"runtime","name":"pollDesc.setEventErr"},{"pkg":"runtime","name":"pollFractionalWorkerExit"},{"pkg":"runtime","name":"pollInfo.closing"},{"pkg":"runtime","name":"pollInfo.eventErr"},{"pkg":"runtime","name":"pollInfo.expiredReadDeadline"},{"pkg":"runtime","name":"pollInfo.expiredWriteDeadline"},{"pkg":"runtime","name":"pollWork"},{"pkg":"runtime","name":"preemptM"},{"pkg":"runtime","name":"preemptPark"},{"pkg":"runtime","name":"preemptall"},{"pkg":"runtime","name":"preemptone"},{"pkg":"runtime","name":"prepareFreeWorkbufs"},{"pkg":"runtime","name":"preprintpanics"},{"pkg":"runtime","name":"preprintpanics.func1"},{"pkg":"runtime","name":"printAncestorTraceback"},{"pkg":"runtime","name":"printAncestorTracebackFuncInfo"},{"pkg":"runtime","name":"printArgs"},{"pkg":"runtime","name":"printArgs.func1"},{"pkg":"runtime","name":"printArgs.func2"},{"pkg":"runtime","name":"printArgs.func3"},{"pkg":"runtime","name":"printCgoTraceback"},{"pkg":"runtime","name":"printOneCgoTraceback"},{"pkg":"runtime","name":"printScavTrace"},{"pkg":"runtime","name":"printany"},{"pkg":"runtime","name":"printanycustomtype"},{"pkg":"runtime","name":"printbool"},{"pkg":"runtime","name":"printcomplex"},{"pkg":"runtime","name":"printcreatedby"},{"pkg":"runtime","name":"printcreatedby1"},{"pkg":"runtime","name":"printfloat"},{"pkg":"runtime","name":"printhex"},{"pkg":"runtime","name":"printint"},{"pkg":"runtime","name":"printlock"},{"pkg":"runtime","name":"printnl"},{"pkg":"runtime","name":"printpanics"},{"pkg":"runtime","name":"printpointer"},{"pkg":"runtime","name":"printslice"},{"pkg":"runtime","name":"printsp"},{"pkg":"runtime","name":"printstring"},{"pkg":"runtime","name":"printuint"},{"pkg":"runtime","name":"printuintptr"},{"pkg":"runtime","name":"printunlock"},{"pkg":"runtime","name":"procPin"},{"pkg":"runtime","name":"procUnpin"},{"pkg":"runtime","name":"procresize"},{"pkg":"runtime","name":"procyield"},{"pkg":"runtime","name":"profAtomic.cas"},{"pkg":"runtime","name":"profAtomic.load"},{"pkg":"runtime","name":"profBuf.canWriteRecord"},{"pkg":"runtime","name":"profBuf.canWriteTwoRecords"},{"pkg":"runtime","name":"profBuf.hasOverflow"},{"pkg":"runtime","name":"profBuf.incrementOverflow"},{"pkg":"runtime","name":"profBuf.takeOverflow"},{"pkg":"runtime","name":"profBuf.wakeupExtra"},{"pkg":"runtime","name":"profBuf.write"},{"pkg":"runtime","name":"profIndex.addCountsAndClearFlags"},{"pkg":"runtime","name":"profIndex.tagCount"},{"pkg":"runtime","name":"profilealloc"},{"pkg":"runtime","name":"progToPointerMask"},{"pkg":"runtime","name":"publicationBarrier"},{"pkg":"runtime","name":"puintptr.ptr"},{"pkg":"runtime","name":"puintptr.set"},{"pkg":"runtime","name":"putempty"},{"pkg":"runtime","name":"putfull"},{"pkg":"runtime","name":"queuefinalizer"},{"pkg":"runtime","name":"r4"},{"pkg":"runtime","name":"r8"},{"pkg":"runtime","name":"raise"},{"pkg":"runtime","name":"raisebadsignal"},{"pkg":"runtime","name":"raiseproc"},{"pkg":"runtime","name":"randomEnum.done"},{"pkg":"runtime","name":"randomEnum.next"},{"pkg":"runtime","name":"randomEnum.position"},{"pkg":"runtime","name":"randomOrder.reset"},{"pkg":"runtime","name":"randomOrder.start"},{"pkg":"runtime","name":"rawbyteslice"},{"pkg":"runtime","name":"rawruneslice"},{"pkg":"runtime","name":"rawstring"},{"pkg":"runtime","name":"rawstringtmp"},{"pkg":"runtime","name":"read"},{"pkg":"runtime","name":"readGOGC"},{"pkg":"runtime","name":"readGOMEMLIMIT"},{"pkg":"runtime","name":"readUintptr"},{"pkg":"runtime","name":"readUnaligned32"},{"pkg":"runtime","name":"readUnaligned64"},{"pkg":"runtime","name":"readgstatus"},{"pkg":"runtime","name":"readvarint"},{"pkg":"runtime","name":"readvarintUnsafe"},{"pkg":"runtime","name":"ready"},{"pkg":"runtime","name":"readyWithTime"},{"pkg":"runtime","name":"recordForPanic"},{"pkg":"runtime","name":"recordspan"},{"pkg":"runtime","name":"recovery"},{"pkg":"runtime","name":"recv"},{"pkg":"runtime","name":"recvDirect"},{"pkg":"runtime","name":"reentersyscall"},{"pkg":"runtime","name":"reentersyscall.func1"},{"pkg":"runtime","name":"reflectOffsLock"},{"pkg":"runtime","name":"reflectOffsUnlock"},{"pkg":"runtime","name":"reflectcall"},{"pkg":"runtime","name":"reflectcallmove"},{"pkg":"runtime","name":"releaseSudog"},{"pkg":"runtime","name":"releasem"},{"pkg":"runtime","name":"releasep"},{"pkg":"runtime","name":"removefinalizer"},{"pkg":"runtime","name":"removespecial"},{"pkg":"runtime","name":"resetspinning"},{"pkg":"runtime","name":"resettimer"},{"pkg":"runtime","name":"resolveNameOff"},{"pkg":"runtime","name":"resolveTypeOff"},{"pkg":"runtime","name":"restoreGsignalStack"},{"pkg":"runtime","name":"resumeG"},{"pkg":"runtime","name":"retake"},{"pkg":"runtime","name":"retryOnEAGAIN"},{"pkg":"runtime","name":"return0"},{"pkg":"runtime","name":"round2"},{"pkg":"runtime","name":"roundupsize"},{"pkg":"runtime","name":"rt0_go"},{"pkg":"runtime","name":"rt_sigaction"},{"pkg":"runtime","name":"rtsigprocmask"},{"pkg":"runtime","name":"runExitHooks"},{"pkg":"runtime","name":"runExitHooks.func1"},{"pkg":"runtime","name":"runExitHooks.func1.1"},{"pkg":"runtime","name":"runGCProg"},{"pkg":"runtime","name":"runOneTimer"},{"pkg":"runtime","name":"runOpenDeferFrame"},{"pkg":"runtime","name":"runPerThreadSyscall"},{"pkg":"runtime","name":"runSafePointFn"},{"pkg":"runtime","name":"runfinq"},{"pkg":"runtime","name":"runqdrain"},{"pkg":"runtime","name":"runqempty"},{"pkg":"runtime","name":"runqget"},{"pkg":"runtime","name":"runqgrab"},{"pkg":"runtime","name":"runqput"},{"pkg":"runtime","name":"runqputbatch"},{"pkg":"runtime","name":"runqputslow"},{"pkg":"runtime","name":"runqsteal"},{"pkg":"runtime","name":"runtimer"},{"pkg":"runtime","name":"rwmutex).rlock.func1"},{"pkg":"runtime","name":"rwmutex.rlock"},{"pkg":"runtime","name":"rwmutex.runlock"},{"pkg":"runtime","name":"save"},{"pkg":"runtime","name":"saveAncestors"},{"pkg":"runtime","name":"saveblockevent"},{"pkg":"runtime","name":"saveg"},{"pkg":"runtime","name":"scanConservative"},{"pkg":"runtime","name":"scanblock"},{"pkg":"runtime","name":"scanframeworker"},{"pkg":"runtime","name":"scanobject"},{"pkg":"runtime","name":"scanstack"},{"pkg":"runtime","name":"scanstack.func1"},{"pkg":"runtime","name":"scavengeIndex.clear"},{"pkg":"runtime","name":"scavengeIndex.find"},{"pkg":"runtime","name":"scavengeIndex.grow"},{"pkg":"runtime","name":"scavengeIndex.mark"},{"pkg":"runtime","name":"scavengerState).init.func1"},{"pkg":"runtime","name":"scavengerState).init.func2"},{"pkg":"runtime","name":"scavengerState).init.func3"},{"pkg":"runtime","name":"scavengerState).init.func4"},{"pkg":"runtime","name":"scavengerState.controllerFailed"},{"pkg":"runtime","name":"scavengerState.init"},{"pkg":"runtime","name":"scavengerState.park"},{"pkg":"runtime","name":"scavengerState.ready"},{"pkg":"runtime","name":"scavengerState.run"},{"pkg":"runtime","name":"scavengerState.sleep"},{"pkg":"runtime","name":"scavengerState.wake"},{"pkg":"runtime","name":"schedEnableUser"},{"pkg":"runtime","name":"schedEnabled"},{"pkg":"runtime","name":"sched_getaffinity"},{"pkg":"runtime","name":"schedinit"},{"pkg":"runtime","name":"schedtrace"},{"pkg":"runtime","name":"schedtrace.func1"},{"pkg":"runtime","name":"schedule"},{"pkg":"runtime","name":"semTable.rootFor"},{"pkg":"runtime","name":"semaRoot.dequeue"},{"pkg":"runtime","name":"semaRoot.queue"},{"pkg":"runtime","name":"semaRoot.rotateLeft"},{"pkg":"runtime","name":"semaRoot.rotateRight"},{"pkg":"runtime","name":"semacquire"},{"pkg":"runtime","name":"semacquire1"},{"pkg":"runtime","name":"semrelease"},{"pkg":"runtime","name":"semrelease1"},{"pkg":"runtime","name":"send"},{"pkg":"runtime","name":"sendDirect"},{"pkg":"runtime","name":"setCheckmark"},{"pkg":"runtime","name":"setGCPhase"},{"pkg":"runtime","name":"setGNoWB"},{"pkg":"runtime","name":"setGsignalStack"},{"pkg":"runtime","name":"setMNoWB"},{"pkg":"runtime","name":"setSignalstackSP"},{"pkg":"runtime","name":"setThreadCPUProfiler"},{"pkg":"runtime","name":"setg"},{"pkg":"runtime","name":"setprofilebucket"},{"pkg":"runtime","name":"setsig"},{"pkg":"runtime","name":"setsigstack"},{"pkg":"runtime","name":"settls"},{"pkg":"runtime","name":"shade"},{"pkg":"runtime","name":"shouldPushSigpanic"},{"pkg":"runtime","name":"showframe"},{"pkg":"runtime","name":"showfuncinfo"},{"pkg":"runtime","name":"shrinkstack"},{"pkg":"runtime","name":"siftdownTimer"},{"pkg":"runtime","name":"siftupTimer"},{"pkg":"runtime","name":"sigFetchG"},{"pkg":"runtime","name":"sigInitIgnored"},{"pkg":"runtime","name":"sigInstallGoHandler"},{"pkg":"runtime","name":"sigNotOnStack"},{"pkg":"runtime","name":"sigaction"},{"pkg":"runtime","name":"sigaction.func1"},{"pkg":"runtime","name":"sigaddset"},{"pkg":"runtime","name":"sigaltstack"},{"pkg":"runtime","name":"sigblock"},{"pkg":"runtime","name":"sigctxt.cs"},{"pkg":"runtime","name":"sigctxt.fault"},{"pkg":"runtime","name":"sigctxt.fs"},{"pkg":"runtime","name":"sigctxt.gs"},{"pkg":"runtime","name":"sigctxt.preparePanic"},{"pkg":"runtime","name":"sigctxt.pushCall"},{"pkg":"runtime","name":"sigctxt.r10"},{"pkg":"runtime","name":"sigctxt.r11"},{"pkg":"runtime","name":"sigctxt.r12"},{"pkg":"runtime","name":"sigctxt.r13"},{"pkg":"runtime","name":"sigctxt.r14"},{"pkg":"runtime","name":"sigctxt.r15"},{"pkg":"runtime","name":"sigctxt.r8"},{"pkg":"runtime","name":"sigctxt.r9"},{"pkg":"runtime","name":"sigctxt.rax"},{"pkg":"runtime","name":"sigctxt.rbp"},{"pkg":"runtime","name":"sigctxt.rbx"},{"pkg":"runtime","name":"sigctxt.rcx"},{"pkg":"runtime","name":"sigctxt.rdi"},{"pkg":"runtime","name":"sigctxt.rdx"},{"pkg":"runtime","name":"sigctxt.regs"},{"pkg":"runtime","name":"sigctxt.rflags"},{"pkg":"runtime","name":"sigctxt.rip"},{"pkg":"runtime","name":"sigctxt.rsi"},{"pkg":"runtime","name":"sigctxt.rsp"},{"pkg":"runtime","name":"sigctxt.set_rip"},{"pkg":"runtime","name":"sigctxt.set_rsp"},{"pkg":"runtime","name":"sigctxt.sigFromUser"},{"pkg":"runtime","name":"sigctxt.sigaddr"},{"pkg":"runtime","name":"sigctxt.sigcode"},{"pkg":"runtime","name":"sigctxt.sigpc"},{"pkg":"runtime","name":"sigctxt.sigsp"},{"pkg":"runtime","name":"sigdelset"},{"pkg":"runtime","name":"sigfillset"},{"pkg":"runtime","name":"sigfwd"},{"pkg":"runtime","name":"sigfwdgo"},{"pkg":"runtime","name":"sighandler"},{"pkg":"runtime","name":"signalDuringFork"},{"pkg":"runtime","name":"signalM"},{"pkg":"runtime","name":"signalstack"},{"pkg":"runtime","name":"signame"},{"pkg":"runtime","name":"sigpanic"},{"pkg":"runtime","name":"sigpanic0"},{"pkg":"runtime","name":"sigpipe"},{"pkg":"runtime","name":"sigprocmask"},{"pkg":"runtime","name":"sigprof"},{"pkg":"runtime","name":"sigprofNonGo"},{"pkg":"runtime","name":"sigprofNonGoPC"},{"pkg":"runtime","name":"sigprofNonGoWrapper"},{"pkg":"runtime","name":"sigreturn"},{"pkg":"runtime","name":"sigsave"},{"pkg":"runtime","name":"sigsend"},{"pkg":"runtime","name":"sigtramp"},{"pkg":"runtime","name":"sigtrampgo"},{"pkg":"runtime","name":"slicebytetostring"},{"pkg":"runtime","name":"slicecopy"},{"pkg":"runtime","name":"slicerunetostring"},{"pkg":"runtime","name":"spanAllocType.manual"},{"pkg":"runtime","name":"spanClass.noscan"},{"pkg":"runtime","name":"spanClass.sizeclass"},{"pkg":"runtime","name":"spanHasNoSpecials"},{"pkg":"runtime","name":"spanHasSpecials"},{"pkg":"runtime","name":"spanOf"},{"pkg":"runtime","name":"spanOfHeap"},{"pkg":"runtime","name":"spanOfUnchecked"},{"pkg":"runtime","name":"spanSet.pop"},{"pkg":"runtime","name":"spanSet.push"},{"pkg":"runtime","name":"spanSet.reset"},{"pkg":"runtime","name":"spanSetBlockAlloc.alloc"},{"pkg":"runtime","name":"spanSetBlockAlloc.free"},{"pkg":"runtime","name":"specialsIter.next"},{"pkg":"runtime","name":"specialsIter.unlinkAndNext"},{"pkg":"runtime","name":"specialsIter.valid"},{"pkg":"runtime","name":"spillArgs"},{"pkg":"runtime","name":"stackObject.setRecord"},{"pkg":"runtime","name":"stackObjectRecord.gcdata"},{"pkg":"runtime","name":"stackObjectRecord.ptrdata"},{"pkg":"runtime","name":"stackObjectRecord.useGCProg"},{"pkg":"runtime","name":"stackScanState.addObject"},{"pkg":"runtime","name":"stackScanState.buildIndex"},{"pkg":"runtime","name":"stackScanState.findObject"},{"pkg":"runtime","name":"stackScanState.getPtr"},{"pkg":"runtime","name":"stackScanState.putPtr"},{"pkg":"runtime","name":"stackalloc"},{"pkg":"runtime","name":"stackcache_clear"},{"pkg":"runtime","name":"stackcacherefill"},{"pkg":"runtime","name":"stackcacherelease"},{"pkg":"runtime","name":"stackcheck"},{"pkg":"runtime","name":"stackfree"},{"pkg":"runtime","name":"stackinit"},{"pkg":"runtime","name":"stacklog2"},{"pkg":"runtime","name":"stackmapdata"},{"pkg":"runtime","name":"stackpoolalloc"},{"pkg":"runtime","name":"stackpoolfree"},{"pkg":"runtime","name":"startCheckmarks"},{"pkg":"runtime","name":"startPCforTrace"},{"pkg":"runtime","name":"startTemplateThread"},{"pkg":"runtime","name":"startTheWorld"},{"pkg":"runtime","name":"startTheWorld.func1"},{"pkg":"runtime","name":"startTheWorldGC"},{"pkg":"runtime","name":"startTheWorldWithSema"},{"pkg":"runtime","name":"startlockedm"},{"pkg":"runtime","name":"startm"},{"pkg":"runtime","name":"startpanic_m"},{"pkg":"runtime","name":"stealWork"},{"pkg":"runtime","name":"step"},{"pkg":"runtime","name":"stkbucket"},{"pkg":"runtime","name":"stkframe.argBytes"},{"pkg":"runtime","name":"stkframe.argMapInternal"},{"pkg":"runtime","name":"stkframe.getStackMap"},{"pkg":"runtime","name":"stkobjinit"},{"pkg":"runtime","name":"stopTheWorld"},{"pkg":"runtime","name":"stopTheWorld.func1"},{"pkg":"runtime","name":"stopTheWorldGC"},{"pkg":"runtime","name":"stopTheWorldWithSema"},{"pkg":"runtime","name":"stoplockedm"},{"pkg":"runtime","name":"stopm"},{"pkg":"runtime","name":"strequal"},{"pkg":"runtime","name":"strhash"},{"pkg":"runtime","name":"strhashFallback"},{"pkg":"runtime","name":"stringDataOnStack"},{"pkg":"runtime","name":"stringtoslicebyte"},{"pkg":"runtime","name":"stringtoslicerune"},{"pkg":"runtime","name":"subtract1"},{"pkg":"runtime","name":"subtractb"},{"pkg":"runtime","name":"suspendG"},{"pkg":"runtime","name":"sweepClass.clear"},{"pkg":"runtime","name":"sweepClass.load"},{"pkg":"runtime","name":"sweepClass.split"},{"pkg":"runtime","name":"sweepClass.update"},{"pkg":"runtime","name":"sweepLocked).sweep.func1"},{"pkg":"runtime","name":"sweepLocked.sweep"},{"pkg":"runtime","name":"sweepLocker.tryAcquire"},{"pkg":"runtime","name":"sweepone"},{"pkg":"runtime","name":"sweepone.func1"},{"pkg":"runtime","name":"syncadjustsudogs"},{"pkg":"runtime","name":"sysAlloc"},{"pkg":"runtime","name":"sysAllocOS"},{"pkg":"runtime","name":"sysFault"},{"pkg":"runtime","name":"sysFaultOS"},{"pkg":"runtime","name":"sysFree"},{"pkg":"runtime","name":"sysFreeOS"},{"pkg":"runtime","name":"sysHugePageOS"},{"pkg":"runtime","name":"sysMap"},{"pkg":"runtime","name":"sysMapOS"},{"pkg":"runtime","name":"sysMemStat.add"},{"pkg":"runtime","name":"sysMemStat.load"},{"pkg":"runtime","name":"sysMmap"},{"pkg":"runtime","name":"sysMunmap"},{"pkg":"runtime","name":"sysReserve"},{"pkg":"runtime","name":"sysReserveAligned"},{"pkg":"runtime","name":"sysReserveOS"},{"pkg":"runtime","name":"sysSigaction"},{"pkg":"runtime","name":"sysSigaction.func1"},{"pkg":"runtime","name":"sysUnused"},{"pkg":"runtime","name":"sysUnusedOS"},{"pkg":"runtime","name":"sysUsed"},{"pkg":"runtime","name":"sysUsedOS"},{"pkg":"runtime","name":"sysargs"},{"pkg":"runtime","name":"sysauxv"},{"pkg":"runtime","name":"sysmon"},{"pkg":"runtime","name":"systemstack"},{"pkg":"runtime","name":"systemstack_switch"},{"pkg":"runtime","name":"templateThread"},{"pkg":"runtime","name":"testAtomic64"},{"pkg":"runtime","name":"tgkill"},{"pkg":"runtime","name":"throw"},{"pkg":"runtime","name":"throw.func1"},{"pkg":"runtime","name":"timeHistogram.record"},{"pkg":"runtime","name":"timeSleepUntil"},{"pkg":"runtime","name":"timediv"},{"pkg":"runtime","name":"timer_create"},{"pkg":"runtime","name":"timer_delete"},{"pkg":"runtime","name":"timer_settime"},{"pkg":"runtime","name":"timespec.setNsec"},{"pkg":"runtime","name":"tooManyOverflowBuckets"},{"pkg":"runtime","name":"tophash"},{"pkg":"runtime","name":"traceAcquireBuffer"},{"pkg":"runtime","name":"traceAlloc.alloc"},{"pkg":"runtime","name":"traceAllocBlockPtr.set"},{"pkg":"runtime","name":"traceBuf.byte"},{"pkg":"runtime","name":"traceBuf.varint"},{"pkg":"runtime","name":"traceBufPtr.ptr"},{"pkg":"runtime","name":"traceBufPtr.set"},{"pkg":"runtime","name":"traceCPUSample"},{"pkg":"runtime","name":"traceEvent"},{"pkg":"runtime","name":"traceEventLocked"},{"pkg":"runtime","name":"traceEventLocked.func1"},{"pkg":"runtime","name":"traceFlush"},{"pkg":"runtime","name":"traceFullQueue"},{"pkg":"runtime","name":"traceGCDone"},{"pkg":"runtime","name":"traceGCMarkAssistDone"},{"pkg":"runtime","name":"traceGCMarkAssistStart"},{"pkg":"runtime","name":"traceGCSTWDone"},{"pkg":"runtime","name":"traceGCSTWStart"},{"pkg":"runtime","name":"traceGCStart"},{"pkg":"runtime","name":"traceGCSweepDone"},{"pkg":"runtime","name":"traceGCSweepSpan"},{"pkg":"runtime","name":"traceGCSweepStart"},{"pkg":"runtime","name":"traceGoCreate"},{"pkg":"runtime","name":"traceGoEnd"},{"pkg":"runtime","name":"traceGoPark"},{"pkg":"runtime","name":"traceGoPreempt"},{"pkg":"runtime","name":"traceGoSched"},{"pkg":"runtime","name":"traceGoStart"},{"pkg":"runtime","name":"traceGoSysBlock"},{"pkg":"runtime","name":"traceGoSysCall"},{"pkg":"runtime","name":"traceGoSysExit"},{"pkg":"runtime","name":"traceGoUnpark"},{"pkg":"runtime","name":"traceGomaxprocs"},{"pkg":"runtime","name":"traceHeapAlloc"},{"pkg":"runtime","name":"traceHeapGoal"},{"pkg":"runtime","name":"traceProcFree"},{"pkg":"runtime","name":"traceProcStart"},{"pkg":"runtime","name":"traceProcStop"},{"pkg":"runtime","name":"traceReader"},{"pkg":"runtime","name":"traceReaderAvailable"},{"pkg":"runtime","name":"traceReleaseBuffer"},{"pkg":"runtime","name":"traceStack.stack"},{"pkg":"runtime","name":"traceStackID"},{"pkg":"runtime","name":"traceStackTable).put.func1"},{"pkg":"runtime","name":"traceStackTable.find"},{"pkg":"runtime","name":"traceStackTable.newStack"},{"pkg":"runtime","name":"traceStackTable.put"},{"pkg":"runtime","name":"tracealloc"},{"pkg":"runtime","name":"tracealloc.func1"},{"pkg":"runtime","name":"traceback"},{"pkg":"runtime","name":"traceback1"},{"pkg":"runtime","name":"tracebackCgoContext"},{"pkg":"runtime","name":"tracebackHexdump"},{"pkg":"runtime","name":"tracebackHexdump.func1"},{"pkg":"runtime","name":"tracebackothers"},{"pkg":"runtime","name":"tracebackothers.func1"},{"pkg":"runtime","name":"tracebacktrap"},{"pkg":"runtime","name":"tracefree"},{"pkg":"runtime","name":"tracefree.func1"},{"pkg":"runtime","name":"tracegc"},{"pkg":"runtime","name":"tryRecordGoroutineProfile"},{"pkg":"runtime","name":"tryRecordGoroutineProfileWB"},{"pkg":"runtime","name":"trygetfull"},{"pkg":"runtime","name":"typeBitsBulkBarrier"},{"pkg":"runtime","name":"typedmemclr"},{"pkg":"runtime","name":"typedmemmove"},{"pkg":"runtime","name":"typedslicecopy"},{"pkg":"runtime","name":"typehash"},{"pkg":"runtime","name":"typelinksinit"},{"pkg":"runtime","name":"typesEqual"},{"pkg":"runtime","name":"unblocksig"},{"pkg":"runtime","name":"unlock"},{"pkg":"runtime","name":"unlock2"},{"pkg":"runtime","name":"unlockOSThread"},{"pkg":"runtime","name":"unlockWithRank"},{"pkg":"runtime","name":"unlockextra"},{"pkg":"runtime","name":"unminit"},{"pkg":"runtime","name":"unminitSignals"},{"pkg":"runtime","name":"unreachableMethod"},{"pkg":"runtime","name":"unspillArgs"},{"pkg":"runtime","name":"updateTimer0When"},{"pkg":"runtime","name":"updateTimerModifiedEarliest"},{"pkg":"runtime","name":"updateTimerPMask"},{"pkg":"runtime","name":"usleep"},{"pkg":"runtime","name":"usleep_no_g"},{"pkg":"runtime","name":"validSIGPROF"},{"pkg":"runtime","name":"vdsoFindVersion"},{"pkg":"runtime","name":"vdsoInitFromSysinfoEhdr"},{"pkg":"runtime","name":"vdsoParseSymbols"},{"pkg":"runtime","name":"vdsoParseSymbols.func1"},{"pkg":"runtime","name":"vdsoauxv"},{"pkg":"runtime","name":"waitReason.String"},{"pkg":"runtime","name":"waitReason.isMutexWait"},{"pkg":"runtime","name":"waitq.dequeue"},{"pkg":"runtime","name":"waitq.enqueue"},{"pkg":"runtime","name":"wakeNetPoller"},{"pkg":"runtime","name":"wakefing"},{"pkg":"runtime","name":"wakep"},{"pkg":"runtime","name":"wantAsyncPreempt"},{"pkg":"runtime","name":"wbBuf.discard"},{"pkg":"runtime","name":"wbBuf.putFast"},{"pkg":"runtime","name":"wbBuf.reset"},{"pkg":"runtime","name":"wbBufFlush"},{"pkg":"runtime","name":"wbBufFlush.func1"},{"pkg":"runtime","name":"wbBufFlush1"},{"pkg":"runtime","name":"wirep"},{"pkg":"runtime","name":"workbuf.checkempty"},{"pkg":"runtime","name":"workbuf.checknonempty"},{"pkg":"runtime","name":"write"},{"pkg":"runtime","name":"write1"},{"pkg":"runtime","name":"writeErr"},{"pkg":"runtime","name":"writeErrStr"},{"pkg":"runtime","name":"writeHeapBits.flush"},{"pkg":"runtime","name":"writeHeapBits.pad"},{"pkg":"runtime","name":"writeHeapBits.write"},{"pkg":"runtime","name":"writeHeapBitsForAddr"},{"pkg":"runtime/debug","name":"SetTraceback"},{"pkg":"runtime/internal/atomic","name":"Bool.Load"},{"pkg":"runtime/internal/atomic","name":"Bool.Store"},{"pkg":"runtime/internal/atomic","name":"Float64.Load"},{"pkg":"runtime/internal/atomic","name":"Float64.Store"},{"pkg":"runtime/internal/atomic","name":"Int32.Add"},{"pkg":"runtime/internal/atomic","name":"Int32.CompareAndSwap"},{"pkg":"runtime/internal/atomic","name":"Int32.Load"},{"pkg":"runtime/internal/atomic","name":"Int32.Store"},{"pkg":"runtime/internal/atomic","name":"Int64.Add"},{"pkg":"runtime/internal/atomic","name":"Int64.CompareAndSwap"},{"pkg":"runtime/internal/atomic","name":"Int64.Load"},{"pkg":"runtime/internal/atomic","name":"Int64.Store"},{"pkg":"runtime/internal/atomic","name":"Int64.Swap"},{"pkg":"runtime/internal/atomic","name":"Pointer[...].CompareAndSwapNoWB"},{"pkg":"runtime/internal/atomic","name":"Pointer[...].Load"},{"pkg":"runtime/internal/atomic","name":"Pointer[...].StoreNoWB"},{"pkg":"runtime/internal/atomic","name":"Uint32.Add"},{"pkg":"runtime/internal/atomic","name":"Uint32.And"},{"pkg":"runtime/internal/atomic","name":"Uint32.CompareAndSwap"},{"pkg":"runtime/internal/atomic","name":"Uint32.Load"},{"pkg":"runtime/internal/atomic","name":"Uint32.Or"},{"pkg":"runtime/internal/atomic","name":"Uint32.Store"},{"pkg":"runtime/internal/atomic","name":"Uint32.Swap"},{"pkg":"runtime/internal/atomic","name":"Uint64.Add"},{"pkg":"runtime/internal/atomic","name":"Uint64.CompareAndSwap"},{"pkg":"runtime/internal/atomic","name":"Uint64.Load"},{"pkg":"runtime/internal/atomic","name":"Uint64.Store"},{"pkg":"runtime/internal/atomic","name":"Uint8.And"},{"pkg":"runtime/internal/atomic","name":"Uint8.Load"},{"pkg":"runtime/internal/atomic","name":"Uint8.Or"},{"pkg":"runtime/internal/atomic","name":"Uint8.Store"},{"pkg":"runtime/internal/atomic","name":"Uintptr.Add"},{"pkg":"runtime/internal/atomic","name":"Uintptr.CompareAndSwap"},{"pkg":"runtime/internal/atomic","name":"Uintptr.Load"},{"pkg":"runtime/internal/atomic","name":"Uintptr.Store"},{"pkg":"runtime/internal/atomic","name":"Uintptr.Swap"},{"pkg":"runtime/internal/atomic","name":"UnsafePointer.CompareAndSwapNoWB"},{"pkg":"runtime/internal/atomic","name":"UnsafePointer.Load"},{"pkg":"runtime/internal/atomic","name":"UnsafePointer.StoreNoWB"},{"pkg":"runtime/internal/sys","name":"LeadingZeros64"},{"pkg":"runtime/internal/sys","name":"LeadingZeros8"},{"pkg":"runtime/internal/sys","name":"OnesCount64"},{"pkg":"runtime/internal/syscall","name":"EpollCreate1"},{"pkg":"runtime/internal/syscall","name":"EpollCtl"},{"pkg":"runtime/internal/syscall","name":"EpollWait"},{"pkg":"runtime/internal/syscall","name":"Syscall6"},{"pkg":"sort","name":"IntSlice.Len"},{"pkg":"sort","name":"IntSlice.Less"},{"pkg":"sort","name":"IntSlice.Swap"},{"pkg":"sort","name":"Ints"},{"pkg":"sort","name":"Search"},{"pkg":"sort","name":"Slice"},{"pkg":"sort","name":"Sort"},{"pkg":"sort","name":"Stable"},{"pkg":"sort","name":"breakPatterns"},{"pkg":"sort","name":"breakPatterns_func"},{"pkg":"sort","name":"choosePivot"},{"pkg":"sort","name":"choosePivot_func"},{"pkg":"sort","name":"heapSort"},{"pkg":"sort","name":"heapSort_func"},{"pkg":"sort","name":"insertionSort"},{"pkg":"sort","name":"insertionSort_func"},{"pkg":"sort","name":"median"},{"pkg":"sort","name":"medianAdjacent"},{"pkg":"sort","name":"medianAdjacent_func"},{"pkg":"sort","name":"median_func"},{"pkg":"sort","name":"nextPowerOfTwo"},{"pkg":"sort","name":"order2"},{"pkg":"sort","name":"order2_func"},{"pkg":"sort","name":"partialInsertionSort"},{"pkg":"sort","name":"partialInsertionSort_func"},{"pkg":"sort","name":"partition"},{"pkg":"sort","name":"partitionEqual"},{"pkg":"sort","name":"partitionEqual_func"},{"pkg":"sort","name":"partition_func"},{"pkg":"sort","name":"pdqsort"},{"pkg":"sort","name":"pdqsort_func"},{"pkg":"sort","name":"reverseRange"},{"pkg":"sort","name":"reverseRange_func"},{"pkg":"sort","name":"rotate"},{"pkg":"sort","name":"siftDown"},{"pkg":"sort","name":"siftDown_func"},{"pkg":"sort","name":"stable"},{"pkg":"sort","name":"swapRange"},{"pkg":"sort","name":"symMerge"},{"pkg":"sort","name":"xorshift.Next"},{"pkg":"strconv","name":"AppendFloat"},{"pkg":"strconv","name":"AppendInt"},{"pkg":"strconv","name":"AppendQuote"},{"pkg":"strconv","name":"AppendQuoteRune"},{"pkg":"strconv","name":"AppendQuoteRuneToASCII"},{"pkg":"strconv","name":"AppendQuoteToASCII"},{"pkg":"strconv","name":"AppendUint"},{"pkg":"strconv","name":"CanBackquote"},{"pkg":"strconv","name":"FormatFloat"},{"pkg":"strconv","name":"FormatInt"},{"pkg":"strconv","name":"FormatUint"},{"pkg":"strconv","name":"IsPrint"},{"pkg":"strconv","name":"Itoa"},{"pkg":"strconv","name":"NumError.Error"},{"pkg":"strconv","name":"ParseBool"},{"pkg":"strconv","name":"ParseFloat"},{"pkg":"strconv","name":"ParseInt"},{"pkg":"strconv","name":"ParseUint"},{"pkg":"strconv","name":"Quote"},{"pkg":"strconv","name":"Unquote"},{"pkg":"strconv","name":"UnquoteChar"},{"pkg":"strconv","name":"appendEscapedRune"},{"pkg":"strconv","name":"appendQuotedRuneWith"},{"pkg":"strconv","name":"appendQuotedWith"},{"pkg":"strconv","name":"atof32"},{"pkg":"strconv","name":"atof32exact"},{"pkg":"strconv","name":"atof64"},{"pkg":"strconv","name":"atof64exact"},{"pkg":"strconv","name":"atofHex"},{"pkg":"strconv","name":"baseError"},{"pkg":"strconv","name":"bigFtoa"},{"pkg":"strconv","name":"bitSizeError"},{"pkg":"strconv","name":"bsearch16"},{"pkg":"strconv","name":"bsearch32"},{"pkg":"strconv","name":"cloneString"},{"pkg":"strconv","name":"commonPrefixLenIgnoreCase"},{"pkg":"strconv","name":"computeBounds"},{"pkg":"strconv","name":"contains"},{"pkg":"strconv","name":"decimal.Assign"},{"pkg":"strconv","name":"decimal.Round"},{"pkg":"strconv","name":"decimal.RoundDown"},{"pkg":"strconv","name":"decimal.RoundUp"},{"pkg":"strconv","name":"decimal.RoundedInteger"},{"pkg":"strconv","name":"decimal.Shift"},{"pkg":"strconv","name":"decimal.floatBits"},{"pkg":"strconv","name":"decimal.set"},{"pkg":"strconv","name":"divisibleByPower5"},{"pkg":"strconv","name":"divmod1e9"},{"pkg":"strconv","name":"eiselLemire32"},{"pkg":"strconv","name":"eiselLemire64"},{"pkg":"strconv","name":"fmtB"},{"pkg":"strconv","name":"fmtE"},{"pkg":"strconv","name":"fmtF"},{"pkg":"strconv","name":"fmtX"},{"pkg":"strconv","name":"formatBits"},{"pkg":"strconv","name":"formatDecimal"},{"pkg":"strconv","name":"formatDigits"},{"pkg":"strconv","name":"genericFtoa"},{"pkg":"strconv","name":"index"},{"pkg":"strconv","name":"init"},{"pkg":"strconv","name":"isInGraphicList"},{"pkg":"strconv","name":"isPowerOfTwo"},{"pkg":"strconv","name":"leftShift"},{"pkg":"strconv","name":"lower"},{"pkg":"strconv","name":"max"},{"pkg":"strconv","name":"min"},{"pkg":"strconv","name":"mulByLog10Log2"},{"pkg":"strconv","name":"mulByLog2Log10"},{"pkg":"strconv","name":"mult128bitPow10"},{"pkg":"strconv","name":"mult64bitPow10"},{"pkg":"strconv","name":"parseFloatPrefix"},{"pkg":"strconv","name":"prefixIsLessThan"},{"pkg":"strconv","name":"quoteWith"},{"pkg":"strconv","name":"rangeError"},{"pkg":"strconv","name":"readFloat"},{"pkg":"strconv","name":"rightShift"},{"pkg":"strconv","name":"roundShortest"},{"pkg":"strconv","name":"ryuDigits"},{"pkg":"strconv","name":"ryuDigits32"},{"pkg":"strconv","name":"ryuFtoaFixed32"},{"pkg":"strconv","name":"ryuFtoaFixed64"},{"pkg":"strconv","name":"ryuFtoaShortest"},{"pkg":"strconv","name":"shouldRoundUp"},{"pkg":"strconv","name":"small"},{"pkg":"strconv","name":"special"},{"pkg":"strconv","name":"syntaxError"},{"pkg":"strconv","name":"trim"},{"pkg":"strconv","name":"underscoreOK"},{"pkg":"strconv","name":"unhex"},{"pkg":"strconv","name":"unquote"},{"pkg":"strings","name":"Builder.Cap"},{"pkg":"strings","name":"Builder.Grow"},{"pkg":"strings","name":"Builder.String"},{"pkg":"strings","name":"Builder.WriteByte"},{"pkg":"strings","name":"Builder.WriteRune"},{"pkg":"strings","name":"Builder.WriteString"},{"pkg":"strings","name":"Builder.copyCheck"},{"pkg":"strings","name":"Builder.grow"},{"pkg":"strings","name":"ContainsRune"},{"pkg":"strings","name":"Cut"},{"pkg":"strings","name":"HasPrefix"},{"pkg":"strings","name":"Index"},{"pkg":"strings","name":"IndexByte"},{"pkg":"strings","name":"IndexRune"},{"pkg":"strings","name":"Join"},{"pkg":"strings","name":"Map"},{"pkg":"strings","name":"ToLower"},{"pkg":"sync","name":"Map.Load"},{"pkg":"sync","name":"Map.LoadOrStore"},{"pkg":"sync","name":"Map.Store"},{"pkg":"sync","name":"Map.Swap"},{"pkg":"sync","name":"Map.dirtyLocked"},{"pkg":"sync","name":"Map.loadReadOnly"},{"pkg":"sync","name":"Map.missLocked"},{"pkg":"sync","name":"Mutex.Lock"},{"pkg":"sync","name":"Mutex.Unlock"},{"pkg":"sync","name":"Mutex.lockSlow"},{"pkg":"sync","name":"Mutex.unlockSlow"},{"pkg":"sync","name":"Once).doSlow.func1"},{"pkg":"sync","name":"Once).doSlow.func2"},{"pkg":"sync","name":"Once.Do"},{"pkg":"sync","name":"Once.doSlow"},{"pkg":"sync","name":"Pool).pinSlow.func1"},{"pkg":"sync","name":"Pool.Get"},{"pkg":"sync","name":"Pool.Put"},{"pkg":"sync","name":"Pool.getSlow"},{"pkg":"sync","name":"Pool.pin"},{"pkg":"sync","name":"Pool.pinSlow"},{"pkg":"sync","name":"WaitGroup.Add"},{"pkg":"sync","name":"WaitGroup.Done"},{"pkg":"sync","name":"WaitGroup.Wait"},{"pkg":"sync","name":"entry.load"},{"pkg":"sync","name":"entry.swapLocked"},{"pkg":"sync","name":"entry.tryExpungeLocked"},{"pkg":"sync","name":"entry.tryLoadOrStore"},{"pkg":"sync","name":"entry.trySwap"},{"pkg":"sync","name":"entry.unexpungeLocked"},{"pkg":"sync","name":"event"},{"pkg":"sync","name":"fatal"},{"pkg":"sync","name":"indexLocal"},{"pkg":"sync","name":"init"},{"pkg":"sync","name":"init.0"},{"pkg":"sync","name":"init.1"},{"pkg":"sync","name":"loadPoolChainElt"},{"pkg":"sync","name":"newEntry"},{"pkg":"sync","name":"poolChain.popHead"},{"pkg":"sync","name":"poolChain.popTail"},{"pkg":"sync","name":"poolChain.pushHead"},{"pkg":"sync","name":"poolCleanup"},{"pkg":"sync","name":"poolDequeue.pack"},{"pkg":"sync","name":"poolDequeue.popHead"},{"pkg":"sync","name":"poolDequeue.popTail"},{"pkg":"sync","name":"poolDequeue.pushHead"},{"pkg":"sync","name":"poolDequeue.unpack"},{"pkg":"sync","name":"runtime_Semacquire"},{"pkg":"sync","name":"runtime_SemacquireMutex"},{"pkg":"sync","name":"runtime_Semrelease"},{"pkg":"sync","name":"runtime_canSpin"},{"pkg":"sync","name":"runtime_doSpin"},{"pkg":"sync","name":"runtime_nanotime"},{"pkg":"sync","name":"runtime_notifyListCheck"},{"pkg":"sync","name":"runtime_procPin"},{"pkg":"sync","name":"runtime_procUnpin"},{"pkg":"sync","name":"runtime_registerPoolCleanup"},{"pkg":"sync","name":"storePoolChainElt"},{"pkg":"sync","name":"throw"},{"pkg":"sync/atomic","name":"CompareAndSwapPointer"},{"pkg":"sync/atomic","name":"CompareAndSwapUintptr"},{"pkg":"sync/atomic","name":"Pointer[...].CompareAndSwap"},{"pkg":"sync/atomic","name":"Pointer[...].Load"},{"pkg":"sync/atomic","name":"Pointer[...].Store"},{"pkg":"sync/atomic","name":"Pointer[...].Swap"},{"pkg":"sync/atomic","name":"StorePointer"},{"pkg":"sync/atomic","name":"StoreUint32"},{"pkg":"sync/atomic","name":"StoreUintptr"},{"pkg":"sync/atomic","name":"SwapPointer"},{"pkg":"sync/atomic","name":"SwapUintptr"},{"pkg":"sync/atomic","name":"Uint64.Add"},{"pkg":"sync/atomic","name":"Uint64.CompareAndSwap"},{"pkg":"sync/atomic","name":"Uint64.Load"},{"pkg":"sync/atomic","name":"Uint64.Store"},{"pkg":"syscall","name":"Close"},{"pkg":"syscall","name":"Errno.Error"},{"pkg":"syscall","name":"Getrlimit"},{"pkg":"syscall","name":"RawSyscall"},{"pkg":"syscall","name":"RawSyscall6"},{"pkg":"syscall","name":"SetNonblock"},{"pkg":"syscall","name":"Setrlimit"},{"pkg":"syscall","name":"Syscall"},{"pkg":"syscall","name":"Syscall6"},{"pkg":"syscall","name":"Write"},{"pkg":"syscall","name":"errnoErr"},{"pkg":"syscall","name":"fcntl"},{"pkg":"syscall","name":"init"},{"pkg":"syscall","name":"mmap"},{"pkg":"syscall","name":"munmap"},{"pkg":"syscall","name":"runtime_envs"},{"pkg":"syscall","name":"write"},{"pkg":"time","name":"init"},{"pkg":"time","name":"now"},{"pkg":"time","name":"resetTimer"},{"pkg":"time","name":"stopTimer"},{"pkg":"unicode","name":"IsDigit"},{"pkg":"unicode","name":"IsLetter"},{"pkg":"unicode","name":"IsSpace"},{"pkg":"unicode","name":"SimpleFold"},{"pkg":"unicode","name":"To"},{"pkg":"unicode","name":"ToLower"},{"pkg":"unicode","name":"ToUpper"},{"pkg":"unicode","name":"init"},{"pkg":"unicode","name":"is16"},{"pkg":"unicode","name":"is32"},{"pkg":"unicode","name":"isExcludingLatin"},{"pkg":"unicode","name":"to"},{"pkg":"unicode/utf16","name":"DecodeRune"},{"pkg":"unicode/utf16","name":"IsSurrogate"},{"pkg":"unicode/utf8","name":"AppendRune"},{"pkg":"unicode/utf8","name":"DecodeLastRune"},{"pkg":"unicode/utf8","name":"DecodeLastRuneInString"},{"pkg":"unicode/utf8","name":"DecodeRune"},{"pkg":"unicode/utf8","name":"DecodeRuneInString"},{"pkg":"unicode/utf8","name":"EncodeRune"},{"pkg":"unicode/utf8","name":"RuneCount"},{"pkg":"unicode/utf8","name":"RuneCountInString"},{"pkg":"unicode/utf8","name":"RuneLen"},{"pkg":"unicode/utf8","name":"RuneStart"},{"pkg":"unicode/utf8","name":"ValidRune"},{"pkg":"unicode/utf8","name":"ValidString"},{"pkg":"unicode/utf8","name":"appendRuneNonASCII"}],"goVersion":"go1.20.3","goos":"linux","goarch":"amd64"}
|
binary-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-call/binary_sarif.ct
|
#####
# Test basic binary scanning with sarif output
$ govulncheck -format sarif -mode binary ${common_vuln_binary}
{
"version": "2.1.0",
"$schema": "https://json.schemastore.org/sarif-2.1.0.json",
"runs": [
{
"tool": {
"driver": {
"name": "govulncheck",
"semanticVersion": "v0.0.0",
"informationUri": "https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck",
"properties": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"scan_level": "symbol",
"scan_mode": "binary"
},
"rules": [
{
"id": "GO-2020-0015",
"shortDescription": {
"text": "[GO-2020-0015] Infinite loop when decoding some inputs in golang.org/x/text"
},
"fullDescription": {
"text": "Infinite loop when decoding some inputs in golang.org/x/text"
},
"help": {
"text": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector."
},
"helpUri": "https://pkg.go.dev/vuln/GO-2020-0015",
"properties": {
"tags": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
]
}
},
{
"id": "GO-2021-0054",
"shortDescription": {
"text": "[GO-2021-0054] Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector."
},
"fullDescription": {
"text": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector."
},
"help": {
"text": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector."
},
"helpUri": "https://pkg.go.dev/vuln/GO-2021-0054",
"properties": {
"tags": [
"CVE-2020-36067",
"GHSA-p64j-r5f4-pwwx"
]
}
},
{
"id": "GO-2021-0113",
"shortDescription": {
"text": "[GO-2021-0113] Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack."
},
"fullDescription": {
"text": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack."
},
"help": {
"text": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack."
},
"helpUri": "https://pkg.go.dev/vuln/GO-2021-0113",
"properties": {
"tags": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
]
}
},
{
"id": "GO-2021-0265",
"shortDescription": {
"text": "[GO-2021-0265] A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time."
},
"fullDescription": {
"text": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time."
},
"help": {
"text": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time."
},
"helpUri": "https://pkg.go.dev/vuln/GO-2021-0265",
"properties": {
"tags": [
"CVE-2021-42248",
"CVE-2021-42836",
"GHSA-c9gm-7rfj-8w5h",
"GHSA-ppj4-34rq-v8j9"
]
}
}
]
}
},
"results": [
{
"ruleId": "GO-2020-0015",
"level": "note",
"message": {
"text": "Your code depends on 1 vulnerable module (golang.org/x/text), but doesn't appear to call any of the vulnerable symbols."
}
},
{
"ruleId": "GO-2021-0054",
"level": "error",
"message": {
"text": "Your code calls vulnerable functions in 1 package (github.com/tidwall/gjson)."
},
"codeFlows": [
{
"threadFlows": [
{
"locations": [
{
"module": "github.com/tidwall/gjson@v1.6.5",
"location": {
"physicalLocation": {
"artifactLocation": {},
"region": {}
},
"message": {
"text": "github.com/tidwall/gjson.Result.ForEach"
}
}
}
]
}
],
"message": {
"text": "A summarized code flow for vulnerable function github.com/tidwall/gjson.Result.ForEach"
}
}
],
"stacks": [
{
"message": {
"text": "A call stack for vulnerable function github.com/tidwall/gjson.Result.ForEach"
},
"frames": [
{
"module": "github.com/tidwall/gjson@v1.6.5",
"location": {
"physicalLocation": {
"artifactLocation": {},
"region": {}
},
"message": {
"text": "github.com/tidwall/gjson.Result.ForEach"
}
}
}
]
}
]
},
{
"ruleId": "GO-2021-0113",
"level": "error",
"message": {
"text": "Your code calls vulnerable functions in 1 package (golang.org/x/text/language)."
},
"codeFlows": [
{
"threadFlows": [
{
"locations": [
{
"module": "golang.org/x/text@v0.3.0",
"location": {
"physicalLocation": {
"artifactLocation": {},
"region": {}
},
"message": {
"text": "golang.org/x/text/language.Parse"
}
}
}
]
}
],
"message": {
"text": "A summarized code flow for vulnerable function golang.org/x/text/language.Parse"
}
}
],
"stacks": [
{
"message": {
"text": "A call stack for vulnerable function golang.org/x/text/language.Parse"
},
"frames": [
{
"module": "golang.org/x/text@v0.3.0",
"location": {
"physicalLocation": {
"artifactLocation": {},
"region": {}
},
"message": {
"text": "golang.org/x/text/language.Parse"
}
}
}
]
}
]
},
{
"ruleId": "GO-2021-0265",
"level": "error",
"message": {
"text": "Your code calls vulnerable functions in 1 package (github.com/tidwall/gjson)."
},
"codeFlows": [
{
"threadFlows": [
{
"locations": [
{
"module": "github.com/tidwall/gjson@v1.6.5",
"location": {
"physicalLocation": {
"artifactLocation": {},
"region": {}
},
"message": {
"text": "github.com/tidwall/gjson.Get"
}
}
}
]
}
],
"message": {
"text": "A summarized code flow for vulnerable function github.com/tidwall/gjson.Get"
}
},
{
"threadFlows": [
{
"locations": [
{
"module": "github.com/tidwall/gjson@v1.6.5",
"location": {
"physicalLocation": {
"artifactLocation": {},
"region": {}
},
"message": {
"text": "github.com/tidwall/gjson.Result.Get"
}
}
}
]
}
],
"message": {
"text": "A summarized code flow for vulnerable function github.com/tidwall/gjson.Result.Get"
}
}
],
"stacks": [
{
"message": {
"text": "A call stack for vulnerable function github.com/tidwall/gjson.Get"
},
"frames": [
{
"module": "github.com/tidwall/gjson@v1.6.5",
"location": {
"physicalLocation": {
"artifactLocation": {},
"region": {}
},
"message": {
"text": "github.com/tidwall/gjson.Get"
}
}
}
]
},
{
"message": {
"text": "A call stack for vulnerable function github.com/tidwall/gjson.Result.Get"
},
"frames": [
{
"module": "github.com/tidwall/gjson@v1.6.5",
"location": {
"physicalLocation": {
"artifactLocation": {},
"region": {}
},
"message": {
"text": "github.com/tidwall/gjson.Result.Get"
}
}
}
]
}
]
}
]
}
]
}
|
binary-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-call/binary_vendored_json.ct
|
#####
# Test basic binary scanning with json output
$ govulncheck -format json -mode binary ${common_vendored_binary}
{
"config": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"scan_level": "symbol",
"scan_mode": "binary"
}
}
{
"progress": {
"message": "Scanning your binary for known vulnerabilities..."
}
}
{
"progress": {
"message": "Fetching vulnerabilities from the database..."
}
}
{
"progress": {
"message": "Checking the binary against the vulnerabilities..."
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0265",
"modified": "2023-04-03T15:57:51Z",
"published": "2022-08-15T18:06:07Z",
"aliases": [
"CVE-2021-42248",
"CVE-2021-42836",
"GHSA-c9gm-7rfj-8w5h",
"GHSA-ppj4-34rq-v8j9"
],
"details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Get",
"GetBytes",
"GetMany",
"GetManyBytes",
"Result.Get",
"parseObject",
"queryMatches"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/237"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/236"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0265"
}
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson",
"function": "Get"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson",
"function": "Get",
"receiver": "Result"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0113",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-10-06T17:51:21Z",
"aliases": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
],
"details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/language",
"symbols": [
"MatchStrings",
"MustParse",
"Parse",
"ParseAcceptLanguage"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/340830"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f"
}
],
"credits": [
{
"name": "Guido Vranken"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0113"
}
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0",
"package": "golang.org/x/text/language"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0",
"package": "golang.org/x/text/language",
"function": "Parse"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0054",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-36067",
"GHSA-p64j-r5f4-pwwx"
],
"details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.6"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Result.ForEach",
"unwrap"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/196"
}
],
"credits": [
{
"name": "@toptotu"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0054"
}
}
}
{
"finding": {
"osv": "GO-2021-0054",
"fixed_version": "v1.6.6",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0054",
"fixed_version": "v1.6.6",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2020-0015",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
],
"summary": "Infinite loop when decoding some inputs in golang.org/x/text",
"details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/encoding/unicode",
"symbols": [
"bomOverride.Transform",
"utf16Decoder.Transform"
]
},
{
"path": "golang.org/x/text/transform",
"symbols": [
"String"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/238238"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/39491"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0"
}
],
"credits": [
{
"name": "@abacabadabacaba and Anton Gyllenberg"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0015"
}
}
}
{
"finding": {
"osv": "GO-2020-0015",
"fixed_version": "v0.3.3",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0059",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-35380",
"GHSA-w942-gw6m-p62c"
],
"details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.4"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Get",
"GetBytes",
"GetMany",
"GetManyBytes",
"Result.Array",
"Result.Get",
"Result.Map",
"Result.Value",
"squash"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/192"
}
],
"credits": [
{
"name": "@toptotu"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0059"
}
}
}
|
binary-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-call/binary_vex.ct
|
#####
# Test basic binary scanning with vex output
$ govulncheck -format openvex -mode binary ${common_vuln_binary}
{
"@context": "https://openvex.dev/ns/v0.2.0",
"@id": "govulncheck/vex:12f16e1541f93ab0d46d78966849d71bc20932795108f69d0df5a415a2c3a5e6",
"author": "Unknown Author",
"timestamp": "2024-01-01T00:00:00",
"version": 1,
"tooling": "https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck",
"statements": [
{
"vulnerability": {
"@id": "https://pkg.go.dev/vuln/GO-2020-0015",
"name": "GO-2020-0015",
"description": "Infinite loop when decoding some inputs in golang.org/x/text",
"aliases": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
]
},
"products": [
{
"@id": "Unknown Product"
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_present",
"impact_statement": "Govulncheck determined that the vulnerable code isn't called"
},
{
"vulnerability": {
"@id": "https://pkg.go.dev/vuln/GO-2021-0054",
"name": "GO-2021-0054",
"description": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"aliases": [
"CVE-2020-36067",
"GHSA-p64j-r5f4-pwwx"
]
},
"products": [
{
"@id": "Unknown Product"
}
],
"status": "affected"
},
{
"vulnerability": {
"@id": "https://pkg.go.dev/vuln/GO-2021-0113",
"name": "GO-2021-0113",
"description": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.",
"aliases": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
]
},
"products": [
{
"@id": "Unknown Product"
}
],
"status": "affected"
},
{
"vulnerability": {
"@id": "https://pkg.go.dev/vuln/GO-2021-0265",
"name": "GO-2021-0265",
"description": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.",
"aliases": [
"CVE-2021-42248",
"CVE-2021-42836",
"GHSA-c9gm-7rfj-8w5h",
"GHSA-ppj4-34rq-v8j9"
]
},
"products": [
{
"@id": "Unknown Product"
}
],
"status": "affected"
}
]
}
|
binary-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-call/binary_call_text.ct
|
#####
# Test basic binary scanning with text output
$ govulncheck -mode=binary ${common_vuln_binary} --> FAIL 3
=== Symbol Results ===
Vulnerability #1: GO-2021-0265
A maliciously crafted path can cause Get and other query functions to
consume excessive amounts of CPU and time.
More info: https://pkg.go.dev/vuln/GO-2021-0265
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.9.3
Vulnerable symbols found:
#1: gjson.Get
#2: gjson.Result.Get
Vulnerability #2: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.0
Fixed in: golang.org/x/text@v0.3.7
Vulnerable symbols found:
#1: language.Parse
Vulnerability #3: GO-2021-0054
Due to improper bounds checking, maliciously crafted JSON objects can cause
an out-of-bounds panic. If parsing user input, this may be used as a denial
of service vector.
More info: https://pkg.go.dev/vuln/GO-2021-0054
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.6.6
Vulnerable symbols found:
#1: gjson.Result.ForEach
Your code is affected by 3 vulnerabilities from 2 modules.
This scan also found 0 vulnerabilities in packages you import and 1
vulnerability in modules you require, but your code doesn't appear to call these
vulnerabilities.
Use '-show verbose' for more details.
|
binary-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-call/binary_call_json.ct
|
#####
# Test basic binary scanning with json output
$ govulncheck -format json -mode binary ${common_vuln_binary}
{
"config": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"scan_level": "symbol",
"scan_mode": "binary"
}
}
{
"progress": {
"message": "Scanning your binary for known vulnerabilities..."
}
}
{
"progress": {
"message": "Fetching vulnerabilities from the database..."
}
}
{
"progress": {
"message": "Checking the binary against the vulnerabilities..."
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0265",
"modified": "2023-04-03T15:57:51Z",
"published": "2022-08-15T18:06:07Z",
"aliases": [
"CVE-2021-42248",
"CVE-2021-42836",
"GHSA-c9gm-7rfj-8w5h",
"GHSA-ppj4-34rq-v8j9"
],
"details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Get",
"GetBytes",
"GetMany",
"GetManyBytes",
"Result.Get",
"parseObject",
"queryMatches"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/237"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/236"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0265"
}
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson",
"function": "Get"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson",
"function": "Get",
"receiver": "Result"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0113",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-10-06T17:51:21Z",
"aliases": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
],
"details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/language",
"symbols": [
"MatchStrings",
"MustParse",
"Parse",
"ParseAcceptLanguage"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/340830"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f"
}
],
"credits": [
{
"name": "Guido Vranken"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0113"
}
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0",
"package": "golang.org/x/text/language"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0",
"package": "golang.org/x/text/language",
"function": "Parse"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0054",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-36067",
"GHSA-p64j-r5f4-pwwx"
],
"details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.6"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Result.ForEach",
"unwrap"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/196"
}
],
"credits": [
{
"name": "@toptotu"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0054"
}
}
}
{
"finding": {
"osv": "GO-2021-0054",
"fixed_version": "v1.6.6",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0054",
"fixed_version": "v1.6.6",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0054",
"fixed_version": "v1.6.6",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson",
"function": "ForEach",
"receiver": "Result"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2020-0015",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
],
"summary": "Infinite loop when decoding some inputs in golang.org/x/text",
"details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/encoding/unicode",
"symbols": [
"bomOverride.Transform",
"utf16Decoder.Transform"
]
},
{
"path": "golang.org/x/text/transform",
"symbols": [
"String"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/238238"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/39491"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0"
}
],
"credits": [
{
"name": "@abacabadabacaba and Anton Gyllenberg"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0015"
}
}
}
{
"finding": {
"osv": "GO-2020-0015",
"fixed_version": "v0.3.3",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0059",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-35380",
"GHSA-w942-gw6m-p62c"
],
"details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.4"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Get",
"GetBytes",
"GetMany",
"GetManyBytes",
"Result.Array",
"Result.Get",
"Result.Map",
"Result.Value",
"squash"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/192"
}
],
"credits": [
{
"name": "@toptotu"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0059"
}
}
}
|
convert
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/convert/convert_input.json
|
{
"config": {
"protocol_version": "v0.1.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"go_version": "go1.18",
"scan_level": "symbol"
}
}
{
"progress": {
"message": "Scanning your code and P packages across M dependent modules for known vulnerabilities..."
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0265",
"modified": "2023-04-03T15:57:51Z",
"published": "2022-08-15T18:06:07Z",
"aliases": [
"CVE-2021-42248",
"CVE-2021-42836",
"GHSA-c9gm-7rfj-8w5h",
"GHSA-ppj4-34rq-v8j9"
],
"details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Get",
"GetBytes",
"GetMany",
"GetManyBytes",
"Result.Get",
"parseObject",
"queryMatches"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/237"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/236"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0265"
}
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson",
"function": "Get",
"receiver": "Result"
},
{
"module": "golang.org/vuln",
"package": "golang.org/vuln",
"function": "main",
"position": {
"filename": ".../vuln.go",
"offset": 183,
"line": 14,
"column": 20
}
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0113",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-10-06T17:51:21Z",
"aliases": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
],
"details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/language",
"symbols": [
"MatchStrings",
"MustParse",
"Parse",
"ParseAcceptLanguage"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/340830"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f"
}
],
"credits": [
{
"name": "Guido Vranken"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0113"
}
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0",
"package": "golang.org/x/text/language",
"function": "Parse"
},
{
"module": "golang.org/vuln",
"package": "golang.org/vuln",
"function": "main",
"position": {
"filename": ".../vuln.go",
"offset": 159,
"line": 13,
"column": 16
}
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0054",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-36067",
"GHSA-p64j-r5f4-pwwx"
],
"details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.6"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Result.ForEach",
"unwrap"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/196"
}
],
"credits": [
{
"name": "@toptotu"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0054"
}
}
}
{
"finding": {
"osv": "GO-2021-0054",
"fixed_version": "v1.6.6",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson"
}
]
}
}
|
convert
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/convert/convert_text.ct
|
#####
# Test using the conversion from json on stdin to text on stdout
# location of convert input is subdirectory/convert_intput
$ govulncheck -mode=convert < convert/convert_input.json --> FAIL 3
=== Symbol Results ===
Vulnerability #1: GO-2021-0265
A maliciously crafted path can cause Get and other query functions to
consume excessive amounts of CPU and time.
More info: https://pkg.go.dev/vuln/GO-2021-0265
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.9.3
Example traces found:
#1: .../vuln.go:14:20: vuln.main calls gjson.Result.Get
Vulnerability #2: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.0
Fixed in: golang.org/x/text@v0.3.7
Example traces found:
#1: .../vuln.go:13:16: vuln.main calls language.Parse
Your code is affected by 2 vulnerabilities from 2 modules.
This scan also found 1 vulnerability in packages you import and 0
vulnerabilities in modules you require, but your code doesn't appear to call
these vulnerabilities.
Use '-show verbose' for more details.
|
source-package
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif.ct
|
#####
# Test sarif output
$ govulncheck -format sarif -scan package -C ${moddir}/vuln .
{
"version": "2.1.0",
"$schema": "https://json.schemastore.org/sarif-2.1.0.json",
"runs": [
{
"tool": {
"driver": {
"name": "govulncheck",
"semanticVersion": "v0.0.0",
"informationUri": "https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck",
"properties": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"go_version": "go1.18",
"scan_level": "package",
"scan_mode": "source"
},
"rules": [
{
"id": "GO-2020-0015",
"shortDescription": {
"text": "[GO-2020-0015] Infinite loop when decoding some inputs in golang.org/x/text"
},
"fullDescription": {
"text": "Infinite loop when decoding some inputs in golang.org/x/text"
},
"help": {
"text": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector."
},
"helpUri": "https://pkg.go.dev/vuln/GO-2020-0015",
"properties": {
"tags": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
]
}
},
{
"id": "GO-2021-0054",
"shortDescription": {
"text": "[GO-2021-0054] Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector."
},
"fullDescription": {
"text": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector."
},
"help": {
"text": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector."
},
"helpUri": "https://pkg.go.dev/vuln/GO-2021-0054",
"properties": {
"tags": [
"CVE-2020-36067",
"GHSA-p64j-r5f4-pwwx"
]
}
},
{
"id": "GO-2021-0113",
"shortDescription": {
"text": "[GO-2021-0113] Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack."
},
"fullDescription": {
"text": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack."
},
"help": {
"text": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack."
},
"helpUri": "https://pkg.go.dev/vuln/GO-2021-0113",
"properties": {
"tags": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
]
}
},
{
"id": "GO-2021-0265",
"shortDescription": {
"text": "[GO-2021-0265] A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time."
},
"fullDescription": {
"text": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time."
},
"help": {
"text": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time."
},
"helpUri": "https://pkg.go.dev/vuln/GO-2021-0265",
"properties": {
"tags": [
"CVE-2021-42248",
"CVE-2021-42836",
"GHSA-c9gm-7rfj-8w5h",
"GHSA-ppj4-34rq-v8j9"
]
}
}
]
}
},
"results": [
{
"ruleId": "GO-2020-0015",
"level": "warning",
"message": {
"text": "Your code depends on 1 vulnerable module (golang.org/x/text), but doesn't appear to import any of the vulnerable symbols."
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "go.mod",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 1
}
},
"message": {
"text": "Findings for vulnerability GO-2020-0015"
}
}
]
},
{
"ruleId": "GO-2021-0054",
"level": "error",
"message": {
"text": "Your code imports 1 vulnerable package (github.com/tidwall/gjson). Run the call-level analysis to understand whether your code actually calls the vulnerabilities."
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "go.mod",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 1
}
},
"message": {
"text": "Findings for vulnerability GO-2021-0054"
}
}
]
},
{
"ruleId": "GO-2021-0113",
"level": "error",
"message": {
"text": "Your code imports 1 vulnerable package (golang.org/x/text/language). Run the call-level analysis to understand whether your code actually calls the vulnerabilities."
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "go.mod",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 1
}
},
"message": {
"text": "Findings for vulnerability GO-2021-0113"
}
}
]
},
{
"ruleId": "GO-2021-0265",
"level": "error",
"message": {
"text": "Your code imports 1 vulnerable package (github.com/tidwall/gjson). Run the call-level analysis to understand whether your code actually calls the vulnerabilities."
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "go.mod",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 1
}
},
"message": {
"text": "Findings for vulnerability GO-2021-0265"
}
}
]
}
]
}
]
}
|
source-package
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_text.ct
|
#####
# Testing that govulncheck doesn't mention calls when it doesn't have the relevant info
$ govulncheck -scan package -C ${moddir}/multientry . --> FAIL 3
=== Package Results ===
Vulnerability #1: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.5
Fixed in: golang.org/x/text@v0.3.7
Your code may be affected by 1 vulnerability.
This scan also found 0 vulnerabilities in modules you require.
Use '-scan symbol' for more fine grained vulnerability detection and '-show
verbose' for more details.
#####
# Test for package level scan with the -show verbose flag
$ govulncheck -show verbose -scan package -C ${moddir}/multientry . --> FAIL 3
Scanning your code and P packages across M dependent modules for known vulnerabilities...
Fetching vulnerabilities from the database...
Checking the code against the vulnerabilities...
=== Package Results ===
Vulnerability #1: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.5
Fixed in: golang.org/x/text@v0.3.7
=== Module Results ===
No other vulnerabilities found.
Your code may be affected by 1 vulnerability.
This scan also found 0 vulnerabilities in modules you require.
Use '-scan symbol' for more fine grained vulnerability detection.
|
source-package
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_json.ct
|
#####
# Test that findings with callstacks are not emitted in package mode
$ govulncheck -format json -scan package -C ${moddir}/multientry .
{
"config": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"go_version": "go1.18",
"scan_level": "package",
"scan_mode": "source"
}
}
{
"progress": {
"message": "Scanning your code and P packages across M dependent modules for known vulnerabilities..."
}
}
{
"progress": {
"message": "Fetching vulnerabilities from the database..."
}
}
{
"progress": {
"message": "Checking the code against the vulnerabilities..."
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0113",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-10-06T17:51:21Z",
"aliases": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
],
"details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/language",
"symbols": [
"MatchStrings",
"MustParse",
"Parse",
"ParseAcceptLanguage"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/340830"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f"
}
],
"credits": [
{
"name": "Guido Vranken"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0113"
}
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.5"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.5",
"package": "golang.org/x/text/language"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2020-0015",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
],
"summary": "Infinite loop when decoding some inputs in golang.org/x/text",
"details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/encoding/unicode",
"symbols": [
"bomOverride.Transform",
"utf16Decoder.Transform"
]
},
{
"path": "golang.org/x/text/transform",
"symbols": [
"String"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/238238"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/39491"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0"
}
],
"credits": [
{
"name": "@abacabadabacaba and Anton Gyllenberg"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0015"
}
}
}
|
source-module
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-module/source_module_json.ct
|
#####
# Test that findings with callstacks or packages are not emitted in module mode
$ govulncheck -format json -scan module -C ${moddir}/multientry
{
"config": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"go_version": "go1.18",
"scan_level": "module",
"scan_mode": "source"
}
}
{
"progress": {
"message": "Scanning your code across 2 dependent modules for known vulnerabilities..."
}
}
{
"progress": {
"message": "Fetching vulnerabilities from the database..."
}
}
{
"progress": {
"message": "Checking the code against the vulnerabilities..."
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0113",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-10-06T17:51:21Z",
"aliases": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
],
"details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/language",
"symbols": [
"MatchStrings",
"MustParse",
"Parse",
"ParseAcceptLanguage"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/340830"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f"
}
],
"credits": [
{
"name": "Guido Vranken"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0113"
}
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.5"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2020-0015",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
],
"summary": "Infinite loop when decoding some inputs in golang.org/x/text",
"details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/encoding/unicode",
"symbols": [
"bomOverride.Transform",
"utf16Decoder.Transform"
]
},
{
"path": "golang.org/x/text/transform",
"symbols": [
"String"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/238238"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/39491"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0"
}
],
"credits": [
{
"name": "@abacabadabacaba and Anton Gyllenberg"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0015"
}
}
}
|
source-module
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-module/source_module_text.ct
|
#####
# Testing that govulncheck doesn't mention calls when it doesn't
# have callstack information
$ govulncheck -scan module -C ${moddir}/multientry --> FAIL 3
=== Module Results ===
Vulnerability #1: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.5
Fixed in: golang.org/x/text@v0.3.7
Your code may be affected by 1 vulnerability.
Use '-scan symbol' for more fine grained vulnerability detection.
#####
# -show verbose flag should only show module results with scan level module
$ govulncheck -scan module -show verbose -C ${moddir}/multientry --> FAIL 3
Scanning your code across 2 dependent modules for known vulnerabilities...
Fetching vulnerabilities from the database...
Checking the code against the vulnerabilities...
=== Module Results ===
Vulnerability #1: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.5
Fixed in: golang.org/x/text@v0.3.7
Your code may be affected by 1 vulnerability.
Use '-scan symbol' for more fine grained vulnerability detection.
|
source-module
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-module/source_module_sarif.ct
|
#####
# Test sarif output
$ govulncheck -format sarif -scan module -C ${moddir}/vuln
{
"version": "2.1.0",
"$schema": "https://json.schemastore.org/sarif-2.1.0.json",
"runs": [
{
"tool": {
"driver": {
"name": "govulncheck",
"semanticVersion": "v0.0.0",
"informationUri": "https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck",
"properties": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"go_version": "go1.18",
"scan_level": "module",
"scan_mode": "source"
},
"rules": [
{
"id": "GO-2020-0015",
"shortDescription": {
"text": "[GO-2020-0015] Infinite loop when decoding some inputs in golang.org/x/text"
},
"fullDescription": {
"text": "Infinite loop when decoding some inputs in golang.org/x/text"
},
"help": {
"text": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector."
},
"helpUri": "https://pkg.go.dev/vuln/GO-2020-0015",
"properties": {
"tags": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
]
}
},
{
"id": "GO-2021-0054",
"shortDescription": {
"text": "[GO-2021-0054] Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector."
},
"fullDescription": {
"text": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector."
},
"help": {
"text": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector."
},
"helpUri": "https://pkg.go.dev/vuln/GO-2021-0054",
"properties": {
"tags": [
"CVE-2020-36067",
"GHSA-p64j-r5f4-pwwx"
]
}
},
{
"id": "GO-2021-0113",
"shortDescription": {
"text": "[GO-2021-0113] Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack."
},
"fullDescription": {
"text": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack."
},
"help": {
"text": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack."
},
"helpUri": "https://pkg.go.dev/vuln/GO-2021-0113",
"properties": {
"tags": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
]
}
},
{
"id": "GO-2021-0265",
"shortDescription": {
"text": "[GO-2021-0265] A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time."
},
"fullDescription": {
"text": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time."
},
"help": {
"text": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time."
},
"helpUri": "https://pkg.go.dev/vuln/GO-2021-0265",
"properties": {
"tags": [
"CVE-2021-42248",
"CVE-2021-42836",
"GHSA-c9gm-7rfj-8w5h",
"GHSA-ppj4-34rq-v8j9"
]
}
}
]
}
},
"results": [
{
"ruleId": "GO-2020-0015",
"level": "error",
"message": {
"text": "Your code depends on 1 vulnerable module (golang.org/x/text). Run the call-level analysis to understand whether your code actually calls the vulnerabilities."
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "go.mod",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 1
}
},
"message": {
"text": "Findings for vulnerability GO-2020-0015"
}
}
]
},
{
"ruleId": "GO-2021-0054",
"level": "error",
"message": {
"text": "Your code depends on 1 vulnerable module (github.com/tidwall/gjson). Run the call-level analysis to understand whether your code actually calls the vulnerabilities."
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "go.mod",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 1
}
},
"message": {
"text": "Findings for vulnerability GO-2021-0054"
}
}
]
},
{
"ruleId": "GO-2021-0113",
"level": "error",
"message": {
"text": "Your code depends on 1 vulnerable module (golang.org/x/text). Run the call-level analysis to understand whether your code actually calls the vulnerabilities."
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "go.mod",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 1
}
},
"message": {
"text": "Findings for vulnerability GO-2021-0113"
}
}
]
},
{
"ruleId": "GO-2021-0265",
"level": "error",
"message": {
"text": "Your code depends on 1 vulnerable module (github.com/tidwall/gjson). Run the call-level analysis to understand whether your code actually calls the vulnerabilities."
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "go.mod",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 1
}
},
"message": {
"text": "Findings for vulnerability GO-2021-0265"
}
}
]
}
]
}
]
}
|
source-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_json.ct
|
#####
$ govulncheck -C ${moddir}/vuln -format json ./...
{
"config": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"go_version": "go1.18",
"scan_level": "symbol",
"scan_mode": "source"
}
}
{
"progress": {
"message": "Scanning your code and P packages across M dependent modules for known vulnerabilities..."
}
}
{
"progress": {
"message": "Fetching vulnerabilities from the database..."
}
}
{
"progress": {
"message": "Checking the code against the vulnerabilities..."
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0265",
"modified": "2023-04-03T15:57:51Z",
"published": "2022-08-15T18:06:07Z",
"aliases": [
"CVE-2021-42248",
"CVE-2021-42836",
"GHSA-c9gm-7rfj-8w5h",
"GHSA-ppj4-34rq-v8j9"
],
"details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Get",
"GetBytes",
"GetMany",
"GetManyBytes",
"Result.Get",
"parseObject",
"queryMatches"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/237"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/236"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0265"
}
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson",
"function": "Get",
"receiver": "Result",
"position": {
"filename": "gjson.go",
"offset": 5744,
"line": 296,
"column": 17
}
},
{
"module": "golang.org/vuln",
"package": "golang.org/vuln",
"function": "main",
"position": {
"filename": "vuln.go",
"offset": 183,
"line": 14,
"column": 20
}
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0113",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-10-06T17:51:21Z",
"aliases": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
],
"details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/language",
"symbols": [
"MatchStrings",
"MustParse",
"Parse",
"ParseAcceptLanguage"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/340830"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f"
}
],
"credits": [
{
"name": "Guido Vranken"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0113"
}
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0",
"package": "golang.org/x/text/language"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0",
"package": "golang.org/x/text/language",
"function": "Parse",
"position": {
"filename": "language/parse.go",
"offset": 5808,
"line": 228,
"column": 6
}
},
{
"module": "golang.org/vuln",
"package": "golang.org/vuln",
"function": "main",
"position": {
"filename": "vuln.go",
"offset": 159,
"line": 13,
"column": 16
}
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0054",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-36067",
"GHSA-p64j-r5f4-pwwx"
],
"details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.6"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Result.ForEach",
"unwrap"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/196"
}
],
"credits": [
{
"name": "@toptotu"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0054"
}
}
}
{
"finding": {
"osv": "GO-2021-0054",
"fixed_version": "v1.6.6",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0054",
"fixed_version": "v1.6.6",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0054",
"fixed_version": "v1.6.6",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson",
"function": "ForEach",
"receiver": "Result",
"position": {
"filename": "gjson.go",
"offset": 4415,
"line": 220,
"column": 17
}
},
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson",
"function": "modPretty",
"position": {
"filename": "gjson.go",
"offset": 53718,
"line": 2631,
"column": 21
}
},
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson",
"function": "execModifier",
"position": {
"filename": "gjson.go",
"offset": 52543,
"line": 2587,
"column": 21
}
},
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson",
"function": "Get",
"position": {
"filename": "gjson.go",
"offset": 38077,
"line": 1881,
"column": 36
}
},
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson",
"function": "Get",
"receiver": "Result",
"position": {
"filename": "gjson.go",
"offset": 5781,
"line": 297,
"column": 12
}
},
{
"module": "golang.org/vuln",
"package": "golang.org/vuln",
"function": "main",
"position": {
"filename": "vuln.go",
"offset": 183,
"line": 14,
"column": 20
}
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2020-0015",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
],
"summary": "Infinite loop when decoding some inputs in golang.org/x/text",
"details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/encoding/unicode",
"symbols": [
"bomOverride.Transform",
"utf16Decoder.Transform"
]
},
{
"path": "golang.org/x/text/transform",
"symbols": [
"String"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/238238"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/39491"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0"
}
],
"credits": [
{
"name": "@abacabadabacaba and Anton Gyllenberg"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0015"
}
}
}
{
"finding": {
"osv": "GO-2020-0015",
"fixed_version": "v0.3.3",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0059",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-35380",
"GHSA-w942-gw6m-p62c"
],
"details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.4"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Get",
"GetBytes",
"GetMany",
"GetManyBytes",
"Result.Array",
"Result.Get",
"Result.Map",
"Result.Value",
"squash"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/192"
}
],
"credits": [
{
"name": "@toptotu"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0059"
}
}
}
|
source-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_vex.ct
|
#####
# Test vex json output
$ govulncheck -C ${moddir}/vuln -format openvex ./...
{
"@context": "https://openvex.dev/ns/v0.2.0",
"@id": "govulncheck/vex:12f16e1541f93ab0d46d78966849d71bc20932795108f69d0df5a415a2c3a5e6",
"author": "Unknown Author",
"timestamp": "2024-01-01T00:00:00",
"version": 1,
"tooling": "https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck",
"statements": [
{
"vulnerability": {
"@id": "https://pkg.go.dev/vuln/GO-2020-0015",
"name": "GO-2020-0015",
"description": "Infinite loop when decoding some inputs in golang.org/x/text",
"aliases": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
]
},
"products": [
{
"@id": "Unknown Product"
}
],
"status": "not_affected",
"justification": "vulnerable_code_not_present",
"impact_statement": "Govulncheck determined that the vulnerable code isn't called"
},
{
"vulnerability": {
"@id": "https://pkg.go.dev/vuln/GO-2021-0054",
"name": "GO-2021-0054",
"description": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"aliases": [
"CVE-2020-36067",
"GHSA-p64j-r5f4-pwwx"
]
},
"products": [
{
"@id": "Unknown Product"
}
],
"status": "affected"
},
{
"vulnerability": {
"@id": "https://pkg.go.dev/vuln/GO-2021-0113",
"name": "GO-2021-0113",
"description": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.",
"aliases": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
]
},
"products": [
{
"@id": "Unknown Product"
}
],
"status": "affected"
},
{
"vulnerability": {
"@id": "https://pkg.go.dev/vuln/GO-2021-0265",
"name": "GO-2021-0265",
"description": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.",
"aliases": [
"CVE-2021-42248",
"CVE-2021-42836",
"GHSA-c9gm-7rfj-8w5h",
"GHSA-ppj4-34rq-v8j9"
]
},
"products": [
{
"@id": "Unknown Product"
}
],
"status": "affected"
}
]
}
|
source-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_multientry_text.ct
|
#####
# Test for multiple call stacks in source mode
$ govulncheck -C ${moddir}/multientry . --> FAIL 3
=== Symbol Results ===
Vulnerability #1: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.5
Fixed in: golang.org/x/text@v0.3.7
Example traces found:
#1: main.go:99:20: multientry.foobar calls language.MustParse
#2: main.go:44:23: multientry.C calls language.Parse
Your code is affected by 1 vulnerability from 1 module.
This scan found no other vulnerabilities in packages you import or modules you
require.
Use '-show verbose' for more details.
#####
# Test for multple call stacks in source mode with expanded traces
$ govulncheck -show verbose -C ${moddir}/multientry -show=traces ./... --> FAIL 3
Scanning your code and P packages across M dependent modules for known vulnerabilities...
Fetching vulnerabilities from the database...
Checking the code against the vulnerabilities...
=== Symbol Results ===
Vulnerability #1: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.5
Fixed in: golang.org/x/text@v0.3.7
Example traces found:
#1: for function golang.org/x/text/language.MustParse
main.go:26:3: golang.org/multientry.main
main.go:48:8: golang.org/multientry.D
main.go:99:20: golang.org/multientry.foobar
language/tags.go:13:6: golang.org/x/text/language.MustParse
#2: for function golang.org/x/text/language.Parse
main.go:22:3: golang.org/multientry.main
main.go:44:23: golang.org/multientry.C
language/parse.go:33:6: golang.org/x/text/language.Parse
=== Package Results ===
No other vulnerabilities found.
=== Module Results ===
No other vulnerabilities found.
Your code is affected by 1 vulnerability from 1 module.
This scan found no other vulnerabilities in packages you import or modules you
require.
|
source-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_vendored_json.ct
|
#####
#
$ govulncheck -C ${moddir}/vendored -format json ./...
{
"config": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"go_version": "go1.18",
"scan_level": "symbol",
"scan_mode": "source"
}
}
{
"progress": {
"message": "Scanning your code and P packages across M dependent modules for known vulnerabilities..."
}
}
{
"progress": {
"message": "Fetching vulnerabilities from the database..."
}
}
{
"progress": {
"message": "Checking the code against the vulnerabilities..."
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0265",
"modified": "2023-04-03T15:57:51Z",
"published": "2022-08-15T18:06:07Z",
"aliases": [
"CVE-2021-42248",
"CVE-2021-42836",
"GHSA-c9gm-7rfj-8w5h",
"GHSA-ppj4-34rq-v8j9"
],
"details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Get",
"GetBytes",
"GetMany",
"GetManyBytes",
"Result.Get",
"parseObject",
"queryMatches"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/237"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/236"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0265"
}
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0265",
"fixed_version": "v1.9.3",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson",
"function": "Get",
"receiver": "Result",
"position": {
"filename": "gjson.go",
"offset": 81,
"line": 7,
"column": 15
}
},
{
"module": "private.com/privateuser/fakemod",
"version": "v1.0.0",
"package": "private.com/privateuser/fakemod",
"function": "Leave",
"position": {
"filename": "mod.go",
"offset": 86,
"line": 6,
"column": 20
}
},
{
"module": "golang.org/vendored",
"package": "golang.org/vendored",
"function": "main",
"position": {
"filename": "vendored.go",
"offset": 137,
"line": 12,
"column": 15
}
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0113",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-10-06T17:51:21Z",
"aliases": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
],
"details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/language",
"symbols": [
"MatchStrings",
"MustParse",
"Parse",
"ParseAcceptLanguage"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/340830"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f"
}
],
"credits": [
{
"name": "Guido Vranken"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0113"
}
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0",
"package": "golang.org/x/text/language"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0",
"package": "golang.org/x/text/language",
"function": "Parse",
"position": {
"filename": "language/language.go",
"offset": 53,
"line": 5,
"column": 6
}
},
{
"module": "golang.org/vendored",
"package": "golang.org/vendored",
"function": "main",
"position": {
"filename": "vendored.go",
"offset": 155,
"line": 13,
"column": 16
}
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0054",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-36067",
"GHSA-p64j-r5f4-pwwx"
],
"details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.6"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Result.ForEach",
"unwrap"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/196"
}
],
"credits": [
{
"name": "@toptotu"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0054"
}
}
}
{
"finding": {
"osv": "GO-2021-0054",
"fixed_version": "v1.6.6",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0054",
"fixed_version": "v1.6.6",
"trace": [
{
"module": "github.com/tidwall/gjson",
"version": "v1.6.5",
"package": "github.com/tidwall/gjson"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2020-0015",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
],
"summary": "Infinite loop when decoding some inputs in golang.org/x/text",
"details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/encoding/unicode",
"symbols": [
"bomOverride.Transform",
"utf16Decoder.Transform"
]
},
{
"path": "golang.org/x/text/transform",
"symbols": [
"String"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/238238"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/39491"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0"
}
],
"credits": [
{
"name": "@abacabadabacaba and Anton Gyllenberg"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0015"
}
}
}
{
"finding": {
"osv": "GO-2020-0015",
"fixed_version": "v0.3.3",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0"
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0059",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-35380",
"GHSA-w942-gw6m-p62c"
],
"details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/tidwall/gjson",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.4"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/tidwall/gjson",
"symbols": [
"Get",
"GetBytes",
"GetMany",
"GetManyBytes",
"Result.Array",
"Result.Get",
"Result.Map",
"Result.Value",
"squash"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc"
},
{
"type": "WEB",
"url": "https://github.com/tidwall/gjson/issues/192"
}
],
"credits": [
{
"name": "@toptotu"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0059"
}
}
}
|
source-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_wholemodvuln_text.ct
|
#####
# Test of govulncheck call analysis for vulns with no package info available.
# All symbols of the module are vulnerable.
$ govulncheck -C ${moddir}/wholemodvuln ./... --> FAIL 3
=== Symbol Results ===
Vulnerability #1: GO-2022-0956
Excessive resource consumption in gopkg.in/yaml.v2
More info: https://pkg.go.dev/vuln/GO-2022-0956
Module: gopkg.in/yaml.v2
Found in: gopkg.in/yaml.v2@v2.2.3
Fixed in: gopkg.in/yaml.v2@v2.2.4
Example traces found:
#1: whole_mod_vuln.go:8:21: wholemodvuln.main calls yaml.Marshal
#2: whole_mod_vuln.go:4:2: wholemodvuln.init calls yaml.init
Your code is affected by 1 vulnerability from 1 module.
This scan found no other vulnerabilities in packages you import or modules you
require.
Use '-show verbose' for more details.
|
source-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_vendored_text.ct
|
#####
# Vendored directory w text output
$ govulncheck -C ${moddir}/vendored -show verbose ./... --> FAIL 3
Scanning your code and P packages across M dependent modules for known vulnerabilities...
Fetching vulnerabilities from the database...
Checking the code against the vulnerabilities...
=== Symbol Results ===
Vulnerability #1: GO-2021-0265
A maliciously crafted path can cause Get and other query functions to
consume excessive amounts of CPU and time.
More info: https://pkg.go.dev/vuln/GO-2021-0265
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.9.3
Example traces found:
#1: vendored.go:12:15: vendored.main calls fakemod.Leave, which calls gjson.Result.Get
Vulnerability #2: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.0
Fixed in: golang.org/x/text@v0.3.7
Example traces found:
#1: vendored.go:13:16: vendored.main calls language.Parse
=== Package Results ===
Vulnerability #1: GO-2021-0054
Due to improper bounds checking, maliciously crafted JSON objects can cause
an out-of-bounds panic. If parsing user input, this may be used as a denial
of service vector.
More info: https://pkg.go.dev/vuln/GO-2021-0054
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.6.6
=== Module Results ===
Vulnerability #1: GO-2020-0015
Infinite loop when decoding some inputs in golang.org/x/text
More info: https://pkg.go.dev/vuln/GO-2020-0015
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.0
Fixed in: golang.org/x/text@v0.3.3
Your code is affected by 2 vulnerabilities from 2 modules.
This scan also found 1 vulnerability in packages you import and 1 vulnerability
in modules you require, but your code doesn't appear to call these
vulnerabilities.
|
source-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_replace_json.ct
|
#####
# Test of source mode json on a module with a replace directive.
$ govulncheck -C ${moddir}/replace -format json ./...
{
"config": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"go_version": "go1.18",
"scan_level": "symbol",
"scan_mode": "source"
}
}
{
"progress": {
"message": "Scanning your code and P packages across M dependent modules for known vulnerabilities..."
}
}
{
"progress": {
"message": "Fetching vulnerabilities from the database..."
}
}
{
"progress": {
"message": "Checking the code against the vulnerabilities..."
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0113",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-10-06T17:51:21Z",
"aliases": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
],
"details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/language",
"symbols": [
"MatchStrings",
"MustParse",
"Parse",
"ParseAcceptLanguage"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/340830"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f"
}
],
"credits": [
{
"name": "Guido Vranken"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0113"
}
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0",
"package": "golang.org/x/text/language"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0",
"package": "golang.org/x/text/language",
"function": "Parse",
"position": {
"filename": "language/parse.go",
"offset": 5808,
"line": 228,
"column": 6
}
},
{
"module": "golang.org/replace",
"package": "golang.org/replace",
"function": "main",
"position": {
"filename": "main.go",
"offset": 115,
"line": 11,
"column": 16
}
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2020-0015",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
],
"summary": "Infinite loop when decoding some inputs in golang.org/x/text",
"details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/encoding/unicode",
"symbols": [
"bomOverride.Transform",
"utf16Decoder.Transform"
]
},
{
"path": "golang.org/x/text/transform",
"symbols": [
"String"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/238238"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/39491"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0"
}
],
"credits": [
{
"name": "@abacabadabacaba and Anton Gyllenberg"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0015"
}
}
}
{
"finding": {
"osv": "GO-2020-0015",
"fixed_version": "v0.3.3",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.0"
}
]
}
}
|
source-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_text.ct
|
#####
# Test of basic govulncheck in source mode
$ govulncheck -C ${moddir}/vuln ./... --> FAIL 3
=== Symbol Results ===
Vulnerability #1: GO-2021-0265
A maliciously crafted path can cause Get and other query functions to
consume excessive amounts of CPU and time.
More info: https://pkg.go.dev/vuln/GO-2021-0265
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.9.3
Example traces found:
#1: vuln.go:14:20: vuln.main calls gjson.Result.Get
Vulnerability #2: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.0
Fixed in: golang.org/x/text@v0.3.7
Example traces found:
#1: vuln.go:13:16: vuln.main calls language.Parse
Vulnerability #3: GO-2021-0054
Due to improper bounds checking, maliciously crafted JSON objects can cause
an out-of-bounds panic. If parsing user input, this may be used as a denial
of service vector.
More info: https://pkg.go.dev/vuln/GO-2021-0054
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.6.6
Example traces found:
#1: vuln.go:14:20: vuln.main calls gjson.Result.Get, which eventually calls gjson.Result.ForEach
Your code is affected by 3 vulnerabilities from 2 modules.
This scan also found 0 vulnerabilities in packages you import and 1
vulnerability in modules you require, but your code doesn't appear to call these
vulnerabilities.
Use '-show verbose' for more details.
#####
# Test of basic govulncheck in source mode with expanded traces
$ govulncheck -C ${moddir}/vuln -show=traces ./... --> FAIL 3
=== Symbol Results ===
Vulnerability #1: GO-2021-0265
A maliciously crafted path can cause Get and other query functions to
consume excessive amounts of CPU and time.
More info: https://pkg.go.dev/vuln/GO-2021-0265
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.9.3
Example traces found:
#1: for function github.com/tidwall/gjson.Result.Get
vuln.go:14:20: golang.org/vuln.main
gjson.go:296:17: github.com/tidwall/gjson.Result.Get
Vulnerability #2: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.0
Fixed in: golang.org/x/text@v0.3.7
Example traces found:
#1: for function golang.org/x/text/language.Parse
vuln.go:13:16: golang.org/vuln.main
language/parse.go:228:6: golang.org/x/text/language.Parse
Vulnerability #3: GO-2021-0054
Due to improper bounds checking, maliciously crafted JSON objects can cause
an out-of-bounds panic. If parsing user input, this may be used as a denial
of service vector.
More info: https://pkg.go.dev/vuln/GO-2021-0054
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.6.6
Example traces found:
#1: for function github.com/tidwall/gjson.Result.ForEach
vuln.go:14:20: golang.org/vuln.main
gjson.go:297:12: github.com/tidwall/gjson.Result.Get
gjson.go:1881:36: github.com/tidwall/gjson.Get
gjson.go:2587:21: github.com/tidwall/gjson.execModifier
gjson.go:2631:21: github.com/tidwall/gjson.modPretty
gjson.go:220:17: github.com/tidwall/gjson.Result.ForEach
Your code is affected by 3 vulnerabilities from 2 modules.
This scan also found 0 vulnerabilities in packages you import and 1
vulnerability in modules you require, but your code doesn't appear to call these
vulnerabilities.
Use '-show verbose' for more details.
#####
# Test of basic govulncheck in source mode with the -show verbose flag
$ govulncheck -C ${moddir}/vuln -show verbose ./... --> FAIL 3
Scanning your code and P packages across M dependent modules for known vulnerabilities...
Fetching vulnerabilities from the database...
Checking the code against the vulnerabilities...
=== Symbol Results ===
Vulnerability #1: GO-2021-0265
A maliciously crafted path can cause Get and other query functions to
consume excessive amounts of CPU and time.
More info: https://pkg.go.dev/vuln/GO-2021-0265
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.9.3
Example traces found:
#1: vuln.go:14:20: vuln.main calls gjson.Result.Get
Vulnerability #2: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.0
Fixed in: golang.org/x/text@v0.3.7
Example traces found:
#1: vuln.go:13:16: vuln.main calls language.Parse
Vulnerability #3: GO-2021-0054
Due to improper bounds checking, maliciously crafted JSON objects can cause
an out-of-bounds panic. If parsing user input, this may be used as a denial
of service vector.
More info: https://pkg.go.dev/vuln/GO-2021-0054
Module: github.com/tidwall/gjson
Found in: github.com/tidwall/gjson@v1.6.5
Fixed in: github.com/tidwall/gjson@v1.6.6
Example traces found:
#1: vuln.go:14:20: vuln.main calls gjson.Result.Get, which eventually calls gjson.Result.ForEach
=== Package Results ===
No other vulnerabilities found.
=== Module Results ===
Vulnerability #1: GO-2020-0015
Infinite loop when decoding some inputs in golang.org/x/text
More info: https://pkg.go.dev/vuln/GO-2020-0015
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.0
Fixed in: golang.org/x/text@v0.3.3
Your code is affected by 3 vulnerabilities from 2 modules.
This scan also found 0 vulnerabilities in packages you import and 1
vulnerability in modules you require, but your code doesn't appear to call these
vulnerabilities.
|
source-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_replace_text.ct
|
#####
# Test of source mode on a module with a replace directive.
$ govulncheck -C ${moddir}/replace ./... --> FAIL 3
=== Symbol Results ===
Vulnerability #1: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.0
Fixed in: golang.org/x/text@v0.3.7
Example traces found:
#1: main.go:11:16: replace.main calls language.Parse
Your code is affected by 1 vulnerability from 1 module.
This scan also found 0 vulnerabilities in packages you import and 1
vulnerability in modules you require, but your code doesn't appear to call these
vulnerabilities.
Use '-show verbose' for more details.
|
source-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_subdir_text.ct
|
#####
# Test govulncheck runs on the subdirectory of a module
$ govulncheck -C ${moddir}/vuln/subdir . --> FAIL 3
=== Symbol Results ===
Vulnerability #1: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.0
Fixed in: golang.org/x/text@v0.3.7
Example traces found:
#1: subdir/subdir.go:8:16: subdir.Foo calls language.Parse
Your code is affected by 1 vulnerability from 1 module.
This scan also found 0 vulnerabilities in packages you import and 1
vulnerability in modules you require, but your code doesn't appear to call these
vulnerabilities.
Use '-show verbose' for more details.
#####
# Test govulncheck runs on the subdirectory of a module
$ govulncheck -C ${moddir}/vuln/subdir -show=traces . --> FAIL 3
=== Symbol Results ===
Vulnerability #1: GO-2021-0113
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
More info: https://pkg.go.dev/vuln/GO-2021-0113
Module: golang.org/x/text
Found in: golang.org/x/text@v0.3.0
Fixed in: golang.org/x/text@v0.3.7
Example traces found:
#1: for function golang.org/x/text/language.Parse
subdir/subdir.go:8:16: golang.org/vuln/subdir.Foo
language/parse.go:228:6: golang.org/x/text/language.Parse
Your code is affected by 1 vulnerability from 1 module.
This scan also found 0 vulnerabilities in packages you import and 1
vulnerability in modules you require, but your code doesn't appear to call these
vulnerabilities.
Use '-show verbose' for more details.
|
source-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_sarif.ct
|
#####
# Test sarif json output
$ govulncheck -C ${moddir}/vuln -format sarif ./...
{
"version": "2.1.0",
"$schema": "https://json.schemastore.org/sarif-2.1.0.json",
"runs": [
{
"tool": {
"driver": {
"name": "govulncheck",
"semanticVersion": "v0.0.0",
"informationUri": "https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck",
"properties": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"go_version": "go1.18",
"scan_level": "symbol",
"scan_mode": "source"
},
"rules": [
{
"id": "GO-2020-0015",
"shortDescription": {
"text": "[GO-2020-0015] Infinite loop when decoding some inputs in golang.org/x/text"
},
"fullDescription": {
"text": "Infinite loop when decoding some inputs in golang.org/x/text"
},
"help": {
"text": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector."
},
"helpUri": "https://pkg.go.dev/vuln/GO-2020-0015",
"properties": {
"tags": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
]
}
},
{
"id": "GO-2021-0054",
"shortDescription": {
"text": "[GO-2021-0054] Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector."
},
"fullDescription": {
"text": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector."
},
"help": {
"text": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector."
},
"helpUri": "https://pkg.go.dev/vuln/GO-2021-0054",
"properties": {
"tags": [
"CVE-2020-36067",
"GHSA-p64j-r5f4-pwwx"
]
}
},
{
"id": "GO-2021-0113",
"shortDescription": {
"text": "[GO-2021-0113] Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack."
},
"fullDescription": {
"text": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack."
},
"help": {
"text": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack."
},
"helpUri": "https://pkg.go.dev/vuln/GO-2021-0113",
"properties": {
"tags": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
]
}
},
{
"id": "GO-2021-0265",
"shortDescription": {
"text": "[GO-2021-0265] A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time."
},
"fullDescription": {
"text": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time."
},
"help": {
"text": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time."
},
"helpUri": "https://pkg.go.dev/vuln/GO-2021-0265",
"properties": {
"tags": [
"CVE-2021-42248",
"CVE-2021-42836",
"GHSA-c9gm-7rfj-8w5h",
"GHSA-ppj4-34rq-v8j9"
]
}
}
]
}
},
"results": [
{
"ruleId": "GO-2020-0015",
"level": "note",
"message": {
"text": "Your code depends on 1 vulnerable module (golang.org/x/text), but doesn't appear to call any of the vulnerable symbols."
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "go.mod",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 1
}
},
"message": {
"text": "Findings for vulnerability GO-2020-0015"
}
}
]
},
{
"ruleId": "GO-2021-0054",
"level": "error",
"message": {
"text": "Your code calls vulnerable functions in 1 package (github.com/tidwall/gjson)."
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "go.mod",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 1
}
},
"message": {
"text": "Findings for vulnerability GO-2021-0054"
}
}
],
"codeFlows": [
{
"threadFlows": [
{
"locations": [
{
"module": "golang.org/vuln@",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "vuln.go",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 14,
"startColumn": 20
}
},
"message": {
"text": "golang.org/vuln.main"
}
}
},
{
"module": "github.com/tidwall/gjson@v1.6.5",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "github.com/tidwall/gjson@v1.6.5/gjson.go",
"uriBaseId": "%GOMODCACHE%"
},
"region": {
"startLine": 297,
"startColumn": 12
}
},
"message": {
"text": "github.com/tidwall/gjson.Result.Get"
}
}
},
{
"module": "github.com/tidwall/gjson@v1.6.5",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "github.com/tidwall/gjson@v1.6.5/gjson.go",
"uriBaseId": "%GOMODCACHE%"
},
"region": {
"startLine": 1881,
"startColumn": 36
}
},
"message": {
"text": "github.com/tidwall/gjson.Get"
}
}
},
{
"module": "github.com/tidwall/gjson@v1.6.5",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "github.com/tidwall/gjson@v1.6.5/gjson.go",
"uriBaseId": "%GOMODCACHE%"
},
"region": {
"startLine": 220,
"startColumn": 17
}
},
"message": {
"text": "github.com/tidwall/gjson.Result.ForEach"
}
}
}
]
}
],
"message": {
"text": "A summarized code flow for vulnerable function github.com/tidwall/gjson.Result.ForEach"
}
}
],
"stacks": [
{
"message": {
"text": "A call stack for vulnerable function github.com/tidwall/gjson.Result.ForEach"
},
"frames": [
{
"module": "golang.org/vuln@",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "vuln.go",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 14,
"startColumn": 20
}
},
"message": {
"text": "golang.org/vuln.main"
}
}
},
{
"module": "github.com/tidwall/gjson@v1.6.5",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "github.com/tidwall/gjson@v1.6.5/gjson.go",
"uriBaseId": "%GOMODCACHE%"
},
"region": {
"startLine": 297,
"startColumn": 12
}
},
"message": {
"text": "github.com/tidwall/gjson.Result.Get"
}
}
},
{
"module": "github.com/tidwall/gjson@v1.6.5",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "github.com/tidwall/gjson@v1.6.5/gjson.go",
"uriBaseId": "%GOMODCACHE%"
},
"region": {
"startLine": 1881,
"startColumn": 36
}
},
"message": {
"text": "github.com/tidwall/gjson.Get"
}
}
},
{
"module": "github.com/tidwall/gjson@v1.6.5",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "github.com/tidwall/gjson@v1.6.5/gjson.go",
"uriBaseId": "%GOMODCACHE%"
},
"region": {
"startLine": 2587,
"startColumn": 21
}
},
"message": {
"text": "github.com/tidwall/gjson.execModifier"
}
}
},
{
"module": "github.com/tidwall/gjson@v1.6.5",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "github.com/tidwall/gjson@v1.6.5/gjson.go",
"uriBaseId": "%GOMODCACHE%"
},
"region": {
"startLine": 2631,
"startColumn": 21
}
},
"message": {
"text": "github.com/tidwall/gjson.modPretty"
}
}
},
{
"module": "github.com/tidwall/gjson@v1.6.5",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "github.com/tidwall/gjson@v1.6.5/gjson.go",
"uriBaseId": "%GOMODCACHE%"
},
"region": {
"startLine": 220,
"startColumn": 17
}
},
"message": {
"text": "github.com/tidwall/gjson.Result.ForEach"
}
}
}
]
}
]
},
{
"ruleId": "GO-2021-0113",
"level": "error",
"message": {
"text": "Your code calls vulnerable functions in 1 package (golang.org/x/text/language)."
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "go.mod",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 1
}
},
"message": {
"text": "Findings for vulnerability GO-2021-0113"
}
}
],
"codeFlows": [
{
"threadFlows": [
{
"locations": [
{
"module": "golang.org/vuln@",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "vuln.go",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 13,
"startColumn": 16
}
},
"message": {
"text": "golang.org/vuln.main"
}
}
},
{
"module": "golang.org/x/text@v0.3.0",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "golang.org/x/text@v0.3.0/language/parse.go",
"uriBaseId": "%GOMODCACHE%"
},
"region": {
"startLine": 228,
"startColumn": 6
}
},
"message": {
"text": "golang.org/x/text/language.Parse"
}
}
}
]
}
],
"message": {
"text": "A summarized code flow for vulnerable function golang.org/x/text/language.Parse"
}
}
],
"stacks": [
{
"message": {
"text": "A call stack for vulnerable function golang.org/x/text/language.Parse"
},
"frames": [
{
"module": "golang.org/vuln@",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "vuln.go",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 13,
"startColumn": 16
}
},
"message": {
"text": "golang.org/vuln.main"
}
}
},
{
"module": "golang.org/x/text@v0.3.0",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "golang.org/x/text@v0.3.0/language/parse.go",
"uriBaseId": "%GOMODCACHE%"
},
"region": {
"startLine": 228,
"startColumn": 6
}
},
"message": {
"text": "golang.org/x/text/language.Parse"
}
}
}
]
}
]
},
{
"ruleId": "GO-2021-0265",
"level": "error",
"message": {
"text": "Your code calls vulnerable functions in 1 package (github.com/tidwall/gjson)."
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "go.mod",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 1
}
},
"message": {
"text": "Findings for vulnerability GO-2021-0265"
}
}
],
"codeFlows": [
{
"threadFlows": [
{
"locations": [
{
"module": "golang.org/vuln@",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "vuln.go",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 14,
"startColumn": 20
}
},
"message": {
"text": "golang.org/vuln.main"
}
}
},
{
"module": "github.com/tidwall/gjson@v1.6.5",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "github.com/tidwall/gjson@v1.6.5/gjson.go",
"uriBaseId": "%GOMODCACHE%"
},
"region": {
"startLine": 296,
"startColumn": 17
}
},
"message": {
"text": "github.com/tidwall/gjson.Result.Get"
}
}
}
]
}
],
"message": {
"text": "A summarized code flow for vulnerable function github.com/tidwall/gjson.Result.Get"
}
}
],
"stacks": [
{
"message": {
"text": "A call stack for vulnerable function github.com/tidwall/gjson.Result.Get"
},
"frames": [
{
"module": "golang.org/vuln@",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "vuln.go",
"uriBaseId": "%SRCROOT%"
},
"region": {
"startLine": 14,
"startColumn": 20
}
},
"message": {
"text": "golang.org/vuln.main"
}
}
},
{
"module": "github.com/tidwall/gjson@v1.6.5",
"location": {
"physicalLocation": {
"artifactLocation": {
"uri": "github.com/tidwall/gjson@v1.6.5/gjson.go",
"uriBaseId": "%GOMODCACHE%"
},
"region": {
"startLine": 296,
"startColumn": 17
}
},
"message": {
"text": "github.com/tidwall/gjson.Result.Get"
}
}
}
]
}
]
}
]
}
]
}
|
source-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_informational_text.ct
|
#####
# Test source mode with no callstacks
$ govulncheck -C ${moddir}/informational -show=traces .
=== Symbol Results ===
No vulnerabilities found.
Your code is affected by 0 vulnerabilities.
This scan also found 1 vulnerability in packages you import and 0
vulnerabilities in modules you require, but your code doesn't appear to call
these vulnerabilities.
Use '-show verbose' for more details.
|
source-call
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_multientry_json.ct
|
#####
# Test for multiple call stacks in source mode
$ govulncheck -format json -C ${moddir}/multientry .
{
"config": {
"protocol_version": "v1.0.0",
"scanner_name": "govulncheck",
"scanner_version": "v0.0.0-00000000000-20000101010101",
"db": "testdata/vulndb-v1",
"db_last_modified": "2023-04-03T15:57:51Z",
"go_version": "go1.18",
"scan_level": "symbol",
"scan_mode": "source"
}
}
{
"progress": {
"message": "Scanning your code and P packages across M dependent modules for known vulnerabilities..."
}
}
{
"progress": {
"message": "Fetching vulnerabilities from the database..."
}
}
{
"progress": {
"message": "Checking the code against the vulnerabilities..."
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2021-0113",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-10-06T17:51:21Z",
"aliases": [
"CVE-2021-38561",
"GHSA-ppp9-7jff-5vj2"
],
"details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/language",
"symbols": [
"MatchStrings",
"MustParse",
"Parse",
"ParseAcceptLanguage"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/340830"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f"
}
],
"credits": [
{
"name": "Guido Vranken"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0113"
}
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.5"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.5",
"package": "golang.org/x/text/language"
}
]
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.5",
"package": "golang.org/x/text/language",
"function": "MustParse",
"position": {
"filename": "language/tags.go",
"offset": 427,
"line": 13,
"column": 6
}
},
{
"module": "golang.org/multientry",
"package": "golang.org/multientry",
"function": "foobar",
"position": {
"filename": "main.go",
"offset": 1694,
"line": 99,
"column": 20
}
},
{
"module": "golang.org/multientry",
"package": "golang.org/multientry",
"function": "D",
"position": {
"filename": "main.go",
"offset": 705,
"line": 48,
"column": 8
}
},
{
"module": "golang.org/multientry",
"package": "golang.org/multientry",
"function": "main",
"position": {
"filename": "main.go",
"offset": 441,
"line": 26,
"column": 3
}
}
]
}
}
{
"finding": {
"osv": "GO-2021-0113",
"fixed_version": "v0.3.7",
"trace": [
{
"module": "golang.org/x/text",
"version": "v0.3.5",
"package": "golang.org/x/text/language",
"function": "Parse",
"position": {
"filename": "language/parse.go",
"offset": 1121,
"line": 33,
"column": 6
}
},
{
"module": "golang.org/multientry",
"package": "golang.org/multientry",
"function": "C",
"position": {
"filename": "main.go",
"offset": 679,
"line": 44,
"column": 23
}
},
{
"module": "golang.org/multientry",
"package": "golang.org/multientry",
"function": "main",
"position": {
"filename": "main.go",
"offset": 340,
"line": 22,
"column": 3
}
}
]
}
}
{
"osv": {
"schema_version": "1.3.1",
"id": "GO-2020-0015",
"modified": "2023-04-03T15:57:51Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-14040",
"GHSA-5rcv-m4m3-hfh7"
],
"summary": "Infinite loop when decoding some inputs in golang.org/x/text",
"details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "golang.org/x/text",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/text/encoding/unicode",
"symbols": [
"bomOverride.Transform",
"utf16Decoder.Transform"
]
},
{
"path": "golang.org/x/text/transform",
"symbols": [
"String"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/238238"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/39491"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0"
}
],
"credits": [
{
"name": "@abacabadabacaba and Anton Gyllenberg"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0015"
}
}
}
|
main
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/main/config.json
|
{}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.