repo_id
stringclasses
927 values
file_path
stringlengths
99
214
content
stringlengths
2
4.15M
test
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/internal/test/packages.go
// Copyright 2022 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package test import ( "os/exec" "strings" "testing" "golang.org/x/tools/go/packages" ) func VerifyImports(t *testing.T, allowed ...string) { if _, err := exec.LookPath("go"); err != nil { t.Skipf("skipping: %v", err) } cfg := &packages.Config{Mode: packages.NeedImports | packages.NeedDeps} pkgs, err := packages.Load(cfg, ".") if err != nil { t.Fatal(err) } check := map[string]struct{}{} for _, imp := range allowed { check[imp] = struct{}{} } for _, p := range pkgs { for _, imp := range p.Imports { // this is an approximate stdlib check that is good enough for these tests if !strings.ContainsRune(imp.ID, '.') { continue } if _, ok := check[imp.ID]; !ok { t.Errorf("include of %s is not allowed", imp.ID) } } } }
test
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/internal/test/handler.go
// Copyright 2022 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package test import ( "sort" "golang.org/x/vuln/internal/govulncheck" "golang.org/x/vuln/internal/osv" ) // MockHandler implements govulncheck.Handler but (currently) // does nothing. // // For use in tests. type MockHandler struct { ConfigMessages []*govulncheck.Config ProgressMessages []*govulncheck.Progress OSVMessages []*osv.Entry FindingMessages []*govulncheck.Finding } func NewMockHandler() *MockHandler { return &MockHandler{} } func (h *MockHandler) Config(config *govulncheck.Config) error { h.ConfigMessages = append(h.ConfigMessages, config) return nil } func (h *MockHandler) Progress(progress *govulncheck.Progress) error { h.ProgressMessages = append(h.ProgressMessages, progress) return nil } func (h *MockHandler) OSV(entry *osv.Entry) error { h.OSVMessages = append(h.OSVMessages, entry) return nil } func (h *MockHandler) Finding(finding *govulncheck.Finding) error { h.FindingMessages = append(h.FindingMessages, finding) return nil } func (h *MockHandler) Sort() { sort.Slice(h.FindingMessages, func(i, j int) bool { if h.FindingMessages[i].OSV > h.FindingMessages[j].OSV { return true } if h.FindingMessages[i].OSV < h.FindingMessages[j].OSV { return false } iframe := h.FindingMessages[i].Trace[0] jframe := h.FindingMessages[j].Trace[0] if iframe.Module < jframe.Module { return true } if iframe.Module > jframe.Module { return false } if iframe.Package < jframe.Package { return true } if iframe.Package > jframe.Package { return false } if iframe.Receiver < jframe.Receiver { return true } if iframe.Receiver > jframe.Receiver { return false } return iframe.Function < jframe.Function }) } func (h *MockHandler) Write(to govulncheck.Handler) error { h.Sort() for _, config := range h.ConfigMessages { if err := to.Config(config); err != nil { return err } } for _, progress := range h.ProgressMessages { if err := to.Progress(progress); err != nil { return err } } seen := map[string]bool{} for _, finding := range h.FindingMessages { if !seen[finding.OSV] { seen[finding.OSV] = true // first time seeing this osv, so find and write the osv message for _, osv := range h.OSVMessages { if osv.ID == finding.OSV { if err := to.OSV(osv); err != nil { return err } } } } if err := to.Finding(finding); err != nil { return err } } for _, osv := range h.OSVMessages { if !seen[osv.ID] { if err := to.OSV(osv); err != nil { return err } } } return nil }
govulncheck
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/test_utils.go
// Copyright 2024 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package main import ( "encoding/json" "os" "path/filepath" "regexp" "runtime" "testing" ) // copyTestCase copies the test case at dir into a // temporary directory. The created files have 0644 // permission and directories 0755. It does not create // symlinks. func copyTestCase(dir string, t *testing.T) string { newDir, err := filepath.Abs(t.TempDir()) if err != nil { t.Fatalf("failed to copy test case %s: cannot create root %v", dir, err) } if err := copyDir(dir, newDir); err != nil { t.Fatalf("failed to copy test case %s: copy failure %v", dir, err) } return newDir } func copyDir(srcDir, destDir string) error { entries, err := os.ReadDir(srcDir) if err != nil { return err } for _, entry := range entries { src := filepath.Join(srcDir, entry.Name()) dest := filepath.Join(destDir, entry.Name()) fileInfo, err := os.Stat(src) if err != nil { return err } switch fileInfo.Mode() & os.ModeType { case os.ModeDir: if err := os.MkdirAll(dest, 0755); err != nil { return err } if err := copyDir(src, dest); err != nil { return err } default: if err := copyFile(src, dest); err != nil { return err } } } return nil } func copyFile(src, dest string) error { b, err := os.ReadFile(src) if err != nil { return err } return os.WriteFile(dest, b, 0644) } type config struct { // SkipGOOS is a list of GOOS to skip SkipGOOS []string `json:"skipGOOS,omitempty"` // Copy the folder to isolate it Copy bool `json:"copy,omitempty"` // SkipBuild the test case SkipBuild bool `json:"skipBuild,omitempty"` // Strip indicates if binaries should be stripped Strip bool `json:"strip,omitempty"` Fixups []fixup `json:"fixups,omitempty"` } func (c *config) skip() bool { for _, sg := range c.SkipGOOS { if runtime.GOOS == sg { return true } } return false } type fixup struct { Pattern string `json:"pattern,omitempty"` Replace string `json:"replace,omitempty"` compiled *regexp.Regexp replaceFunc func(b []byte) []byte } func (f *fixup) init() { f.compiled = regexp.MustCompile(f.Pattern) } func (f *fixup) apply(data []byte) []byte { if f.replaceFunc != nil { return f.compiled.ReplaceAllFunc(data, f.replaceFunc) } return f.compiled.ReplaceAll(data, []byte(f.Replace)) } // loadConfig loads and initializes the config from path. func loadConfig(path string) (*config, error) { b, err := os.ReadFile(path) if err != nil { return nil, err } var cfg config if err := json.Unmarshal(b, &cfg); err != nil { return nil, err } for i := range cfg.Fixups { cfg.Fixups[i].init() } return &cfg, nil }
govulncheck
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/main_test.go
// Copyright 2022 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package main import ( "bytes" "context" "flag" "fmt" "os" "path/filepath" "runtime" "sync" "testing" "unsafe" "github.com/google/go-cmdtest" "github.com/google/go-cmp/cmp" "golang.org/x/vuln/internal/govulncheck" "golang.org/x/vuln/internal/test" "golang.org/x/vuln/internal/web" "golang.org/x/vuln/scan" ) var update = flag.Bool("update", false, "update test files with results") func TestCommand(t *testing.T) { if testing.Short() { t.Skip("skipping test that uses internet in short mode") } testDir, err := os.Getwd() if err != nil { t.Fatal(err) } // test all cases in testdata subdirectory fs, err := os.ReadDir(filepath.Join(testDir, "testdata")) if err != nil { t.Fatalf("failed to read test cases: %v", err) } for _, tc := range fs { if !tc.IsDir() { continue } t.Run(tc.Name(), func(t *testing.T) { runTestCase(t, tc.Name(), testDir) }) } } func runTestCase(t *testing.T, tcName, testDir string) { testCaseDir := filepath.Join(testDir, "testdata", tcName) cfg, err := loadConfig(filepath.Join(testCaseDir, "config.json")) if err != nil { t.Fatalf("failed to load config: %v", err) } if cfg.skip() { return } if cfg.Copy { testCaseDir = copyTestCase(testCaseDir, t) } vulndbDir := filepath.Join(testCaseDir, "vulndb-v1") modulesDir := filepath.Join(testCaseDir, "modules") testfilesDir := filepath.Join(testCaseDir, "testfiles") govulndbURI, err := web.URLFromFilePath(vulndbDir) if err != nil { t.Fatalf("failed to create vulndb url: %v", err) } moduleDirs, err := filepath.Glob(filepath.Join(modulesDir, "*")) if err != nil { t.Fatal(err) } for _, md := range moduleDirs { if cfg.SkipBuild { continue } // Build test module binary. binary, cleanup := test.GoBuild(t, md, "", cfg.Strip) t.Cleanup(cleanup) // Set an environment variable to the path to the binary, so tests // can refer to it. The binary name is unique across all test cases. varName := tcName + "_" + filepath.Base(md) + "_binary" os.Setenv(varName, binary) } os.Setenv("moddir", modulesDir) os.Setenv("testdir", testfilesDir) runTestSuite(t, testfilesDir, govulndbURI.String(), cfg.Fixups, *update) } // Limit the number of concurrent scans. Scanning is implemented using // x/tools/go/ssa, which is known to be memory-hungry // (see https://go.dev/issue/14113), and by default the testing package // allows up to GOMAXPROCS parallel tests at a time. // // For now we arbitrarily limit to ⌈GOMAXPROCS/4⌉, on the theory that many Go // developer and CI machines have at least 8 logical cores and we want most // runs of the test to exercise at least a little concurrency. If that turns // out to still be too high, we may consider reducing it further. // // Since all of the scans run in the same process, we need an especially low // limit on 32-bit platforms: we may run out of virtual address space well // before we run out of system RAM. var ( parallelLimiter chan struct{} parallelLimiterInit sync.Once ) // testSuite creates a cmdtest suite from testfilesDir. It also defines // a govulncheck command on the suite that runs govulncheck against // vulnerability database available at vulndbDir. func runTestSuite(t *testing.T, testfilesDir string, vulndbDir string, fixups []fixup, update bool) { parallelLimiterInit.Do(func() { limit := (runtime.GOMAXPROCS(0) + 3) / 4 if limit > 2 && unsafe.Sizeof(uintptr(0)) < 8 { limit = 2 } parallelLimiter = make(chan struct{}, limit) }) ts, err := cmdtest.Read(filepath.Join(testfilesDir, "*")) if err != nil { t.Fatal(err) } ts.DisableLogging = true govulncheckCmd := func(args []string, inputFile string) ([]byte, error) { parallelLimiter <- struct{}{} defer func() { <-parallelLimiter }() newargs := append([]string{"-db", vulndbDir}, args...) buf := &bytes.Buffer{} cmd := scan.Command(context.Background(), newargs...) cmd.Stdout = buf cmd.Stderr = buf if inputFile != "" { input, err := os.Open(filepath.Join(testfilesDir, inputFile)) if err != nil { return nil, err } defer input.Close() cmd.Stdin = input } // We set GOVERSION to always get the same results regardless of the underlying Go build system. cmd.Env = append(os.Environ(), "GOVERSION=go1.18") if err := cmd.Start(); err != nil { return nil, err } err := cmd.Wait() switch e := err.(type) { case nil: case interface{ ExitCode() int }: err = &cmdtest.ExitCodeErr{Msg: err.Error(), Code: e.ExitCode()} if e.ExitCode() == 0 { err = nil } default: fmt.Fprintln(buf, err) err = &cmdtest.ExitCodeErr{Msg: err.Error(), Code: 1} } sorted := buf if err == nil && isJSONMode(args) { // parse, sort and reprint the output for test stability gather := test.NewMockHandler() if err := govulncheck.HandleJSON(buf, gather); err != nil { return nil, err } sorted = &bytes.Buffer{} h := govulncheck.NewJSONHandler(sorted) if err := gather.Write(h); err != nil { return nil, err } } out := sorted.Bytes() for _, fix := range fixups { out = fix.apply(out) } return out, err } ts.Commands["govulncheck"] = govulncheckCmd // govulncheck-cmp is like govulncheck except that the last argument is a file // whose contents are compared to the output of govulncheck. This command does // not output anything. ts.Commands["govulncheck-cmp"] = func(args []string, inputFile string) ([]byte, error) { l := len(args) if l == 0 { return nil, nil } cmpArg := args[l-1] gArgs := args[:l-1] out, err := govulncheckCmd(gArgs, inputFile) if err != nil { return nil, &cmdtest.ExitCodeErr{Msg: err.Error(), Code: 1} } got := string(out) file, err := os.ReadFile(cmpArg) if err != nil { return nil, &cmdtest.ExitCodeErr{Msg: err.Error(), Code: 1} } want := string(file) if diff := cmp.Diff(want, got); diff != "" { return nil, &cmdtest.ExitCodeErr{Msg: "govulncheck output not matching the file contents:\n" + diff, Code: 1} } return nil, nil } if update { ts.Run(t, true) return } ts.RunParallel(t, false) } func isJSONMode(args []string) bool { for _, arg := range args { if arg == "json" { return true } } return false }
govulncheck
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/doc.go
// Copyright 2022 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. /* Govulncheck reports known vulnerabilities that affect Go code. It uses static analysis of source code or a binary's symbol table to narrow down reports to only those that could affect the application. By default, govulncheck makes requests to the Go vulnerability database at https://vuln.go.dev. Requests to the vulnerability database contain only module paths with vulnerabilities already known to the database, not code or other properties of your program. See https://vuln.go.dev/privacy.html for more. Use the -db flag to specify a different database, which must implement the specification at https://go.dev/security/vuln/database. Govulncheck looks for vulnerabilities in Go programs using a specific build configuration. For analyzing source code, that configuration is the Go version specified by the “go” command found on the PATH. For binaries, the build configuration is the one used to build the binary. Note that different build configurations may have different known vulnerabilities. # Usage To analyze source code, run govulncheck from the module directory, using the same package path syntax that the go command uses: $ cd my-module $ govulncheck ./... If no vulnerabilities are found, govulncheck will display a short message. If there are vulnerabilities, each is displayed briefly, with a summary of a call stack. The summary shows in brief how the package calls a vulnerable function. For example, it might say main.go:[line]:[column]: mypackage.main calls golang.org/x/text/language.Parse To control which files are processed, use the -tags flag to provide a comma-separated list of build tags, and the -test flag to indicate that test files should be included. To include more detailed stack traces, pass '-show traces', this will cause it to print the full call stack for each entry. To include progress messages and more details on findings, pass '-show verbose'. To run govulncheck on a compiled binary, pass it the path to the binary file with the '-mode binary' flag: $ govulncheck -mode binary $HOME/go/bin/my-go-program Govulncheck uses the binary's symbol information to find mentions of vulnerable functions. Its output omits call stacks, which require source code analysis. Govulncheck also supports '-mode extract' on a Go binary for extraction of minimal information needed to analyze the binary. This will produce a blob, typically much smaller than the binary, that can also be passed to govulncheck as an argument with '-mode binary'. The users should not rely on the contents or representation of the blob. # Integrations Govulncheck supports streaming JSON. For more details, please see [golang.org/x/vuln/internal/govulncheck]. Govulncheck also supports Static Analysis Results Interchange Format (SARIF) output format, following the specification at https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=sarif. For more details, please see [golang.org/x/vuln/internal/sarif]. Govulncheck supports the Vulnerability EXchange (VEX) output format, following the specification at https://github.com/openvex/spec. For more details, please see [golang.org/x/vuln/internal/openvex]. # Exit codes Govulncheck exits successfully (exit code 0) if there are no vulnerabilities, and exits unsuccessfully if there are. It also exits successfully if the 'format -json' ('-json'), '-format sarif', or '-format openvex' is provided, regardless of the number of detected vulnerabilities. # Limitations Govulncheck has these limitations: - Govulncheck analyzes function pointer and interface calls conservatively, which may result in false positives or inaccurate call stacks in some cases. - Calls to functions made using package reflect are not visible to static analysis. Vulnerable code reachable only through those calls will not be reported in source scan mode. Similarly, use of the unsafe package may result in false negatives. - Because Go binaries do not contain detailed call information, govulncheck cannot show the call graphs for detected vulnerabilities. It may also report false positives for code that is in the binary but unreachable. - There is no support for silencing vulnerability findings. See https://go.dev/issue/61211 for updates. - Govulncheck reports only standard library vulnerabilities for binaries built with Go versions prior to Go 1.18. - For binaries where the symbol information cannot be extracted, govulncheck reports vulnerabilities for all modules on which the binary depends. # Feedback To share feedback, see https://go.dev/security/vuln#feedback. */ package main
govulncheck
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/main.go
// Copyright 2022 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package main import ( "context" "fmt" "os" "golang.org/x/telemetry" "golang.org/x/vuln/scan" ) func main() { telemetry.Start(telemetry.Config{ReportCrashes: true}) ctx := context.Background() cmd := scan.Command(ctx, os.Args[1:]...) err := cmd.Start() if err == nil { err = cmd.Wait() } switch err := err.(type) { case nil: case interface{ ExitCode() int }: os.Exit(err.ExitCode()) default: fmt.Fprintln(os.Stderr, err) os.Exit(1) } }
integration
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/integration/Dockerfile
FROM golang:1.22.3-alpine # This Dockerfile sets up an image for repeated integration testing. # This assumes the build context, i.e., CWD is vuln/ # ---- Step 0: Setup shared build tools. ---- RUN apk update && apk add bash git gcc musl-dev linux-headers gcompat # ---- Step 1: Build govulncheck ---- COPY . /go/src/golang.org/x/vuln WORKDIR /go/src/golang.org/x/vuln/cmd/govulncheck/integration RUN go install golang.org/x/vuln/cmd/govulncheck # ---- Step 2: Build other test binaries ---- RUN go install golang.org/x/vuln/cmd/govulncheck/integration/k8s RUN go install golang.org/x/vuln/cmd/govulncheck/integration/stackrox-scanner
integration
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/integration/integration_run.sh
#!/bin/bash # Copyright 2022 The Go Authors. All rights reserved. # Use of this source code is governed by a BSD-style # license that can be found in the LICENSE file. #!/bin/bash # List of all projects for which integration test failed, if any. failed=() # Update status of the integration script. The first argument is # the exit code for the integration run of a project and the second # argument is the project name. update_status(){ if [ "$1" -ne 0 ]; then failed+=("$2") fi } # Print go version for debugging purposes. Expected to be go1.18.8. go version # Clone kubernetes to a dedicated directory. dir="$GOPATH/src/kubernetes" if [ -d "$dir" ]; then echo "Destination kubernetes already exists. Using the existing code." else git clone https://github.com/kubernetes/kubernetes.git "${dir}" fi # Checkout kubernetes version v1.15.11 that # is known to have vulnerabilities. pushd "$dir" || exit cd pkg || exit git checkout tags/v1.15.11 govulncheck --json ./... &> k8s.txt k8s k8s.txt update_status $? "kubernetes(source)" popd || exit # Clone scanner to a dedicated directory. dir="$GOPATH/src/scanner" if [ -d "$dir" ]; then echo "Destination scanner already exists. Using the existing code." else git clone https://github.com/stackrox/scanner.git "${dir}" fi pushd "$dir" || exit # Use scanner at specific commit and tag version for reproducibility. git checkout 29b8761da747 go build -trimpath -ldflags="-X github.com/stackrox/scanner/pkg/version.Version=2.26-29-g29b8761da7-dirty" -o image/scanner/bin/scanner ./cmd/clair govulncheck -mode=binary --json ./image/scanner/bin/scanner &> scan.txt stackrox-scanner scan.txt update_status $? "stackrox-scanner(binary)" popd || exit if [ ${#failed[@]} -ne 0 ]; then echo "FAIL: integration run failed for the following projects: ${failed[*]}" exit 1 fi echo PASS
integration
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/integration/integration_test.sh
#!/bin/bash # Copyright 2022 The Go Authors. All rights reserved. # Use of this source code is governed by a BSD-style # license that can be found in the LICENSE file. # Runs the integration tests for whole program analysis. # Assumes this is run from vuln/cmd/govulncheck/integration echo "Building govulncheck docker image" # The building context is vuln/ so we can have the current # version of both govulncheck and its vuln dependencies docker build -f Dockerfile -t govulncheck-integration ../../../ echo "Running govulncheck integration tests in the docker image" docker run govulncheck-integration ./integration_run.sh
integration
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/integration/internal/integration/test.go
// Copyright 2022 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package integration import ( "bytes" "encoding/json" "errors" "fmt" "log" "os" "golang.org/x/vuln/internal/govulncheck" ) // CompareVulns checks if packages of called vulnerable symbols // out are a superset of want. func CompareVulns(out string, want map[string]bool) error { outJson, err := os.ReadFile(out) if err != nil { return fmt.Errorf("failed to read: %v", out) } calledVulnPkgs := make(map[string]bool) dec := json.NewDecoder(bytes.NewReader(outJson)) for dec.More() { msg := govulncheck.Message{} // decode the next message in the stream if err := dec.Decode(&msg); err != nil { log.Fatalf("failed to load json: %v", err) } if msg.Finding != nil { if msg.Finding.Trace[0].Function == "" { // No symbol means the vulnerability is // imported but not called. continue } // collect only called non-std packages pkgPath := msg.Finding.Trace[0].Package calledVulnPkgs[pkgPath] = true } } for pkg := range want { if _, ok := calledVulnPkgs[pkg]; !ok { e := fmt.Errorf("vulnerable symbols of expected package %s not detected", pkg) err = errors.Join(err, e) } } return err }
k8s
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/integration/k8s/k8s.go
// Copyright 2022 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package main import ( "log" "os" "golang.org/x/vuln/cmd/govulncheck/integration/internal/integration" ) const usage = `test helper for examining the output of running govulncheck on k8s@v1.15.11. Example usage: ./k8s [path to output file] ` func main() { if len(os.Args) != 2 { log.Fatal("Incorrect number of expected command line arguments", usage) } out := os.Args[1] want := map[string]bool{ "github.com/containernetworking/cni/pkg/invoke": true, "github.com/evanphx/json-patch": true, "github.com/heketi/heketi/client/api/go-client": true, "github.com/heketi/heketi/pkg/glusterfs/api": true, "github.com/heketi/heketi/pkg/utils": true, "github.com/opencontainers/selinux/go-selinux": true, "github.com/prometheus/client_golang/prometheus/promhttp": true, "golang.org/x/crypto/cryptobyte": true, "golang.org/x/crypto/salsa20/salsa": true, "golang.org/x/crypto/ssh": true, "golang.org/x/net/http/httpguts": true, "golang.org/x/net/http2": true, "golang.org/x/net/http2/hpack": true, "golang.org/x/text/encoding/unicode": true, "google.golang.org/grpc": true, } if err := integration.CompareVulns(out, want); err != nil { log.Fatal(err) } }
kokoro
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/integration/kokoro/integration.cfg
# Format: //devtools/kokoro/config/proto/build.proto build_file: "vuln/cmd/govulncheck/integration/kokoro/integration.sh"
kokoro
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/integration/kokoro/integration.sh
#!/bin/bash # Copyright 2022 The Go Authors. All rights reserved. # Use of this source code is governed by a BSD-style # license that can be found in the LICENSE file. # Run integration_test.sh on kokoro. # Fail on any error. set -e # Code under repo is checked out to ${KOKORO_ARTIFACTS_DIR}/git. # The main directory name in this path is determined by the scm name specified # in the job configuration, which in this case is "vuln". cd "${KOKORO_ARTIFACTS_DIR}/git/vuln/cmd/govulncheck/integration" # Run integration_test.sh ./integration_test.sh
stackrox-scanner
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/integration/stackrox-scanner/scanner.go
// Copyright 2022 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package main import ( "log" "os" "golang.org/x/vuln/cmd/govulncheck/integration/internal/integration" ) const usage = `test helper for examining the output of running govulncheck on stackrox-io/scanner binary (https://quay.io/repository/stackrox-io/scanner). Example usage: ./stackrox-scanner [path to output file] ` func main() { if len(os.Args) != 2 { log.Fatal("Incorrect number of expected command line arguments", usage) } out := os.Args[1] want := map[string]bool{ "github.com/go-git/go-git/v5": true, "github.com/go-git/go-git/v5/config": true, "github.com/go-git/go-git/v5/plumbing/object": true, "github.com/go-git/go-git/v5/storage/filesystem": true, "github.com/go-git/go-git/v5/storage/filesystem/dotgit": true, "github.com/mholt/archiver/v3": true, "golang.org/x/crypto/ssh": true, "golang.org/x/net/http2": true, "golang.org/x/net/http2/hpack": true, "google.golang.org/grpc": true, "google.golang.org/grpc/internal/transport": true, } if err := integration.CompareVulns(out, want); err != nil { log.Fatal(err) } }
common
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/config.json
{ "fixups": [ { "pattern": "Scanning your code and (\\d+) packages across (\\d+)", "replace": "Scanning your code and P packages across M" }, { "pattern": "Scanner: govulncheck@v.*", "replace": "Scanner: govulncheck@v1.0.0" }, { "pattern": "\"([^\"]*\") is a file", "replace": "govulncheck: myfile is a file" }, { "pattern": "\"scanner_version\": \"[^\"]*\"", "replace": "\"scanner_version\": \"v0.0.0-00000000000-20000101010101\"" }, { "pattern": "file:///(.*)/testdata/(.*)/vulndb", "replace": "testdata/vulndb" }, { "pattern": "package (.*) is not in (GOROOT|std) (.*)", "replace": "package foo is not in GOROOT (/tmp/foo)" }, { "pattern": "modified (.*)\\)", "replace": "modified 01 Jan 21 00:00 UTC)" }, { "pattern": "Go: (go1.[\\.\\d]*|devel).*", "replace": "Go: go1.18" }, { "pattern": "\"go_version\": \"go[^\\s\"]*\"", "replace": "\"go_version\": \"go1.18\"" }, { "pattern": "\"timestamp\": (.*),", "replace": "\"timestamp\": \"2024-01-01T00:00:00\"," } ] }
multientry
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/multientry/go.mod
module golang.org/multientry go 1.18 require golang.org/x/text v0.3.5
multientry
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/multientry/go.sum
golang.org/x/text v0.3.5 h1:i6eZZ+zk0SOf0xgBpEpPD18qWcJda6q1sxt3S0kzyUQ= golang.org/x/text v0.3.5/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
multientry
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/multientry/main.go
package main import ( "fmt" "os" "golang.org/x/text/language" ) func main() { args := os.Args[1:] // Calls foo which directly calls language.Parse. A() // Also calls foo which directly calls language.Parse. B() // Calls language.Parse directly. // // This will be displayed by govulncheck, since it is the shortest path. C() // Calls foobar which eventually calls language.MustParse (different // symbol, same report) D() // Calls moreFoo which directly calls language.Parse. E(args) // Calls stillMoreFoo which directly calls language.Parse. F(args) } func A() { foo(os.Args[1:]) } func B() { foo(os.Args[1:]) } func C() { _, _ = language.Parse("") } func D() { foobar() } func E(args []string) { moreFoo(args) } func F(args []string) { stillMoreFoo(args) } func foo(args []string) { for _, arg := range args { tag, err := language.Parse(arg) if err != nil { fmt.Printf("%s: error: %v\n", arg, err) } else if tag == language.Und { fmt.Printf("%s: undefined\n", arg) } else { fmt.Printf("%s: tag %s\n", arg, tag) } } } func moreFoo(args []string) { for _, arg := range args { tag, err := language.Parse(arg) if err != nil { fmt.Printf("%s: error: %v\n", arg, err) } else if tag == language.Und { fmt.Printf("%s: undefined\n", arg) } else { fmt.Printf("%s: tag %s\n", arg, tag) } } } func stillMoreFoo(args []string) { for _, arg := range args { tag, err := language.Parse(arg) if err != nil { fmt.Printf("%s: error: %v\n", arg, err) } else if tag == language.Und { fmt.Printf("%s: undefined\n", arg) } else { fmt.Printf("%s: tag %s\n", arg, tag) } } } func foobar() { language.MustParse("") }
replace
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/replace/go.mod
module golang.org/replace go 1.20 replace golang.org/x/text v0.9.0 => golang.org/x/text v0.3.0 require golang.org/x/text v0.9.0
replace
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/replace/go.sum
golang.org/x/text v0.3.0 h1:g61tztE5qeGQ89tm6NTjjM9VPIm088od1l6aSorWRWg= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
replace
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/replace/main.go
package main import ( "fmt" "golang.org/x/text/language" ) func main() { fmt.Println("hello") language.Parse("") }
vendored
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vendored/go.mod
module golang.org/vendored go 1.18 require ( // This version has one vulnerability that is imported, and // one that is called. github.com/tidwall/gjson v1.6.5 // This version has a vulnerability that is called. golang.org/x/text v0.3.0 private.com/privateuser/fakemod v1.0.0 ) require ( github.com/tidwall/match v1.1.0 // indirect github.com/tidwall/pretty v1.2.0 // indirect )
vendored
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vendored/go.sum
github.com/tidwall/gjson v1.6.5 h1:P/K9r+1pt9AK54uap7HcoIp6T3a7AoMg3v18tUis+Cg= github.com/tidwall/gjson v1.6.5/go.mod h1:zeFuBCIqD4sN/gmqBzZ4j7Jd6UcA2Fc56x7QFsv+8fI= github.com/tidwall/match v1.0.3/go.mod h1:eRSPERbgtNPcGhD8UCthc6PmLEQXEWd3PRB5JTxsfmM= github.com/tidwall/match v1.1.0 h1:VfI2e2aXLvytih7WUVyO9uvRC+RcXlaTrMbHuQWnFmk= github.com/tidwall/match v1.1.0/go.mod h1:eRSPERbgtNPcGhD8UCthc6PmLEQXEWd3PRB5JTxsfmM= github.com/tidwall/pretty v1.0.2/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk= github.com/tidwall/pretty v1.2.0 h1:RWIZEg2iJ8/g6fDDYzMpobmaoGh5OLl4AXtGUGPcqCs= github.com/tidwall/pretty v1.2.0/go.mod h1:ITEVvHYasfjBbM0u2Pg8T2nJnzm8xPwvNhhsoaGGjNU= golang.org/x/text v0.3.0 h1:g61tztE5qeGQ89tm6NTjjM9VPIm088od1l6aSorWRWg= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
vendored
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vendored/vendored.go
package main import ( "encoding/pem" "private.com/privateuser/fakemod" "golang.org/x/text/language" ) func main() { fakemod.Leave() language.Parse("") _, _ = pem.Decode([]byte("test")) }
vendor
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vendored/vendor/modules.txt
# github.com/tidwall/gjson v1.6.5 ## explicit; go 1.12 github.com/tidwall/gjson # github.com/tidwall/match v1.1.0 ## explicit; go 1.15 github.com/tidwall/match # github.com/tidwall/pretty v1.2.0 ## explicit; go 1.16 github.com/tidwall/pretty # golang.org/x/text v0.3.0 ## explicit golang.org/x/text/internal/tag golang.org/x/text/language # private.com/privateuser/fakemod v1.0.0 ## explicit private.com/privateuser/fakemod
language
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vendored/vendor/golang.org/x/text/language/language.go
package language var prevent_optimization int func Parse(string) { prevent_optimization++ }
gjson
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vendored/vendor/github.com/tidwall/gjson/gjson.go
package gjson var prevent_optimization int type Result struct{} func (Result) Get(string) { Get("", "") } func Get(json, path string) Result { prevent_optimization++ return Result{} }
fakemod
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vendored/vendor/private.com/privateuser/fakemod/mod.go
package fakemod import "github.com/tidwall/gjson" func Leave() { gjson.Result{}.Get("") }
subdir
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vendored/subdir/subdir.go
package subdir import ( "golang.org/x/text/language" ) func Foo() { language.Parse("") }
wholemodvuln
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/wholemodvuln/go.mod
module golang.org/wholemodvuln go 1.18 require gopkg.in/yaml.v2 v2.2.3
wholemodvuln
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/wholemodvuln/whole_mod_vuln.go
package main import ( "gopkg.in/yaml.v2" ) func main() { _, _ = yaml.Marshal(nil) }
wholemodvuln
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/wholemodvuln/go.sum
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405 h1:yhCVgyC4o1eVCa2tZl7eS0r+SDo693bJlVdllGtEeKM= gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= gopkg.in/yaml.v2 v2.2.3 h1:fvjTMHxHEw/mxHbtzPi3JCcKXQRAnQTBRo6YCJSVHKI= gopkg.in/yaml.v2 v2.2.3/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
vuln
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vuln/go.mod
module golang.org/vuln go 1.18 require ( // This version has one vulnerability that is imported, and // one that is called. github.com/tidwall/gjson v1.6.5 // This version has a vulnerability that is called. golang.org/x/text v0.3.0 ) require ( github.com/tidwall/match v1.1.0 // indirect github.com/tidwall/pretty v1.2.0 // indirect )
vuln
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vuln/vuln.go
package main import ( "encoding/pem" "fmt" "github.com/tidwall/gjson" "golang.org/x/text/language" ) func main() { fmt.Println("hello") language.Parse("") gjson.Result{}.Get("") _, _ = pem.Decode([]byte("test")) }
vuln
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vuln/go.sum
github.com/tidwall/gjson v1.6.5 h1:P/K9r+1pt9AK54uap7HcoIp6T3a7AoMg3v18tUis+Cg= github.com/tidwall/gjson v1.6.5/go.mod h1:zeFuBCIqD4sN/gmqBzZ4j7Jd6UcA2Fc56x7QFsv+8fI= github.com/tidwall/match v1.0.3/go.mod h1:eRSPERbgtNPcGhD8UCthc6PmLEQXEWd3PRB5JTxsfmM= github.com/tidwall/match v1.1.0 h1:VfI2e2aXLvytih7WUVyO9uvRC+RcXlaTrMbHuQWnFmk= github.com/tidwall/match v1.1.0/go.mod h1:eRSPERbgtNPcGhD8UCthc6PmLEQXEWd3PRB5JTxsfmM= github.com/tidwall/pretty v1.0.2/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk= github.com/tidwall/pretty v1.2.0 h1:RWIZEg2iJ8/g6fDDYzMpobmaoGh5OLl4AXtGUGPcqCs= github.com/tidwall/pretty v1.2.0/go.mod h1:ITEVvHYasfjBbM0u2Pg8T2nJnzm8xPwvNhhsoaGGjNU= golang.org/x/text v0.3.0 h1:g61tztE5qeGQ89tm6NTjjM9VPIm088od1l6aSorWRWg= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
subdir
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/vuln/subdir/subdir.go
package subdir import ( "golang.org/x/text/language" ) func Foo() { language.Parse("") }
informational
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/informational/go.mod
module golang.org/vuln go 1.18 // This version has a vulnerability that is imported. require github.com/tidwall/gjson v1.9.2 require ( github.com/tidwall/match v1.1.0 // indirect github.com/tidwall/pretty v1.2.0 // indirect )
informational
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/informational/vuln.go
package main import ( "fmt" "github.com/tidwall/gjson" ) func main() { fmt.Println("hello") gjson.Valid("{hello: world}") }
informational
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/modules/informational/go.sum
github.com/tidwall/gjson v1.9.2 h1:SJQc2IgWWKL5V+YGJrr95hjNXFeZzHT2L9Wv1aAb51Q= github.com/tidwall/gjson v1.9.2/go.mod h1:2tcKM/KQ/GjiTN7mfTL/HdNmef9Q6AZLaSK2RdfvSjw= github.com/tidwall/match v1.1.0 h1:VfI2e2aXLvytih7WUVyO9uvRC+RcXlaTrMbHuQWnFmk= github.com/tidwall/match v1.1.0/go.mod h1:eRSPERbgtNPcGhD8UCthc6PmLEQXEWd3PRB5JTxsfmM= github.com/tidwall/pretty v1.2.0 h1:RWIZEg2iJ8/g6fDDYzMpobmaoGh5OLl4AXtGUGPcqCs= github.com/tidwall/pretty v1.2.0/go.mod h1:ITEVvHYasfjBbM0u2Pg8T2nJnzm8xPwvNhhsoaGGjNU=
ID
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/ID/GO-2021-0113.json
{"schema_version":"1.3.1","id":"GO-2021-0113","modified":"2023-04-03T15:57:51Z","published":"2021-10-06T17:51:21Z","aliases":["CVE-2021-38561","GHSA-ppp9-7jff-5vj2"],"details":"Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.","affected":[{"package":{"name":"golang.org/x/text","ecosystem":"Go"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.3.7"}]}],"ecosystem_specific":{"imports":[{"path":"golang.org/x/text/language","symbols":["MatchStrings","MustParse","Parse","ParseAcceptLanguage"]}]}}],"references":[{"type":"FIX","url":"https://go.dev/cl/340830"},{"type":"FIX","url":"https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f"}],"credits":[{"name":"Guido Vranken"}],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2021-0113"}}
ID
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/ID/GO-2020-0015.json
{"schema_version":"1.3.1","id":"GO-2020-0015","modified":"2023-04-03T15:57:51Z","published":"2021-04-14T20:04:52Z","aliases":["CVE-2020-14040","GHSA-5rcv-m4m3-hfh7"],"summary":"Infinite loop when decoding some inputs in golang.org/x/text","details":"An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.","affected":[{"package":{"name":"golang.org/x/text","ecosystem":"Go"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.3.3"}]}],"ecosystem_specific":{"imports":[{"path":"golang.org/x/text/encoding/unicode","symbols":["bomOverride.Transform","utf16Decoder.Transform"]},{"path":"golang.org/x/text/transform","symbols":["String"]}]}}],"references":[{"type":"FIX","url":"https://go.dev/cl/238238"},{"type":"FIX","url":"https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e"},{"type":"REPORT","url":"https://go.dev/issue/39491"},{"type":"WEB","url":"https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0"}],"credits":[{"name":"@abacabadabacaba and Anton Gyllenberg"}],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2020-0015"}}
ID
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/ID/GO-2021-0054.json
{"schema_version":"1.3.1","id":"GO-2021-0054","modified":"2023-04-03T15:57:51Z","published":"2021-04-14T20:04:52Z","aliases":["CVE-2020-36067","GHSA-p64j-r5f4-pwwx"],"details":"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.","affected":[{"package":{"name":"github.com/tidwall/gjson","ecosystem":"Go"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.6.6"}]}],"ecosystem_specific":{"imports":[{"path":"github.com/tidwall/gjson","symbols":["Result.ForEach","unwrap"]}]}}],"references":[{"type":"FIX","url":"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b"},{"type":"WEB","url":"https://github.com/tidwall/gjson/issues/196"}],"credits":[{"name":"@toptotu"}],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2021-0054"}}
ID
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/ID/GO-2021-0265.json
{"schema_version":"1.3.1","id":"GO-2021-0265","modified":"2023-04-03T15:57:51Z","published":"2022-08-15T18:06:07Z","aliases":["CVE-2021-42248","CVE-2021-42836","GHSA-c9gm-7rfj-8w5h","GHSA-ppj4-34rq-v8j9"],"details":"A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.","affected":[{"package":{"name":"github.com/tidwall/gjson","ecosystem":"Go"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.9.3"}]}],"ecosystem_specific":{"imports":[{"path":"github.com/tidwall/gjson","symbols":["Get","GetBytes","GetMany","GetManyBytes","Result.Get","parseObject","queryMatches"]}]}}],"references":[{"type":"FIX","url":"https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96"},{"type":"WEB","url":"https://github.com/tidwall/gjson/issues/237"},{"type":"WEB","url":"https://github.com/tidwall/gjson/issues/236"},{"type":"WEB","url":"https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944"}],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2021-0265"}}
ID
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/ID/GO-2022-0956.json
{ "schema_version": "1.3.1", "id": "GO-2022-0956", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-29T22:15:46Z", "aliases": [ "CVE-2022-3064", "GHSA-6q6q-88xp-6f2r" ], "summary": "Excessive resource consumption in gopkg.in/yaml.v2", "details": "Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.", "affected": [ { "package": { "name": "gopkg.in/yaml.v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.2.4" } ] } ] } ], "references": [ { "type": "FIX", "url": "https://github.com/go-yaml/yaml/commit/f221b8435cfb71e54062f6c6e99e9ade30b124d5" }, { "type": "WEB", "url": "https://github.com/go-yaml/yaml/releases/tag/v2.2.4" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0956" } }
ID
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/ID/GO-2022-0969.json
{"schema_version":"1.3.1","id":"GO-2022-0969","modified":"2023-04-03T15:57:51Z","published":"2022-09-12T20:23:06Z","aliases":["CVE-2022-27664","GHSA-69cg-p879-7622"],"details":"HTTP/2 server connections can hang forever waiting for a clean shutdown that was preempted by a fatal error. This condition can be exploited by a malicious client to cause a denial of service.","affected":[{"package":{"name":"golang.org/x/net","ecosystem":"Go"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.0.0-20220906165146-f3363e06e74c"}]}],"ecosystem_specific":{"imports":[{"path":"golang.org/x/net/http2","symbols":["Server.ServeConn","serverConn.goAway"]}]}}],"references":[{"type":"WEB","url":"https://groups.google.com/g/golang-announce/c/x49AQzIVX-s"},{"type":"REPORT","url":"https://go.dev/issue/54658"},{"type":"FIX","url":"https://go.dev/cl/428735"}],"credits":[{"name":"Bahruz Jabiyev, Tommaso Innocenti, Anthony Gavazzi, Steven Sprecher, and Kaan Onarlioglu"}],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2022-0969"}}
ID
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/ID/GO-2021-0059.json
{"schema_version":"1.3.1","id":"GO-2021-0059","modified":"2023-04-03T15:57:51Z","published":"2021-04-14T20:04:52Z","aliases":["CVE-2020-35380","GHSA-w942-gw6m-p62c"],"details":"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.","affected":[{"package":{"name":"github.com/tidwall/gjson","ecosystem":"Go"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.6.4"}]}],"ecosystem_specific":{"imports":[{"path":"github.com/tidwall/gjson","symbols":["Get","GetBytes","GetMany","GetManyBytes","Result.Array","Result.Get","Result.Map","Result.Value","squash"]}]}}],"references":[{"type":"FIX","url":"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc"},{"type":"WEB","url":"https://github.com/tidwall/gjson/issues/192"}],"credits":[{"name":"@toptotu"}],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2021-0059"}}
index
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/index/modules.json
[{"path":"github.com/tidwall/gjson","vulns":[{"id":"GO-2021-0054","modified":"2023-04-03T15:57:51Z","fixed":"1.6.6"},{"id":"GO-2021-0059","modified":"2023-04-03T15:57:51Z","fixed":"1.6.4"},{"id":"GO-2021-0265","modified":"2023-04-03T15:57:51Z","fixed":"1.9.3"}]},{"path":"golang.org/x/net","vulns":[{"id":"GO-2022-0969","modified":"2023-04-03T15:57:51Z","fixed":"0.0.0-20220906165146-f3363e06e74c"}]},{"path":"golang.org/x/text","vulns":[{"id":"GO-2020-0015","modified":"2023-04-03T15:57:51Z","fixed":"0.3.3"},{"id":"GO-2021-0113","modified":"2023-04-03T15:57:51Z","fixed":"0.3.7"}]},{"path":"gopkg.in/yaml.v2","vulns":[{"id":"GO-2022-0956","modified":"0001-01-01T00:00:00Z","fixed":"2.2.4"}]}]
index
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/index/vulns.json
[{"id":"GO-2020-0015","modified":"2023-04-03T15:57:51Z","aliases":["CVE-2020-14040","GHSA-5rcv-m4m3-hfh7"]},{"id":"GO-2021-0054","modified":"2023-04-03T15:57:51Z","aliases":["CVE-2020-36067","GHSA-p64j-r5f4-pwwx"]},{"id":"GO-2021-0059","modified":"2023-04-03T15:57:51Z","aliases":["CVE-2020-35380","GHSA-w942-gw6m-p62c"]},{"id":"GO-2021-0113","modified":"2023-04-03T15:57:51Z","aliases":["CVE-2021-38561","GHSA-ppp9-7jff-5vj2"]},{"id":"GO-2021-0265","modified":"2023-04-03T15:57:51Z","aliases":["CVE-2021-42248","CVE-2021-42836","GHSA-c9gm-7rfj-8w5h","GHSA-ppj4-34rq-v8j9"]},{"id":"GO-2022-0969","modified":"2023-04-03T15:57:51Z","aliases":["CVE-2022-27664","GHSA-69cg-p879-7622"]},{"id":"GO-2022-0956","modified":"0001-01-01T00:00:00Z","aliases":["CVE-2022-3064","GHSA-6q6q-88xp-6f2r"]}]
index
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/vulndb-v1/index/db.json
{"modified":"2023-04-03T15:57:51Z"}
failures
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/no_header.blob
{"modules":[{"Path":"github.com/tidwall/gjson","Version":"v1.6.5","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null}]}
failures
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/usage_fail.ct
##### # Test of invalid input to -mode $ govulncheck -mode=invalid ./... --> FAIL 2 invalid value "invalid" for flag -mode: see -help for details ##### # Test of trying to run -json with -show flag $ govulncheck -C ${moddir}/vuln -show=traces -json . --> FAIL 2 the -show flag is not supported for json output ##### # Test of invalid input to -scan $ govulncheck -scan=invalid ./... --> FAIL 2 invalid value "invalid" for flag -scan: see -help for details ##### # Test of invalid flag $ govulncheck -flag go ./... --> FAIL 2 flag provided but not defined: -flag ##### # Test of invalid show flag list value $ govulncheck -show traces,color,verbose,something ./... --> FAIL 2 invalid value "traces,color,verbose,something" for flag -show: see -help for details ##### # Test of invalid show flag value $ govulncheck -show everything ./... --> FAIL 2 invalid value "everything" for flag -show: see -help for details ##### # Test of invalid -format value $ govulncheck -format invalid ./... --> FAIL 2 invalid value "invalid" for flag -format: see -help for details ##### # Test of trying to run -json with '-format text' flag $ govulncheck -C ${moddir}/vuln -json -format text . --> FAIL 2 the -json flag cannot be used with -format flag ##### # Test of explicit format use together with -json flag $ govulncheck -C ${moddir}/vuln -format json -json . --> FAIL 2 the -json flag cannot be used with -format flag ##### # Test of trying to run -format sarif with -show flag $ govulncheck -C ${moddir}/vuln -show=traces -format sarif . --> FAIL 2 the -show flag is not supported for sarif output ##### # Test that -json and -format sarif are not allowed together $ govulncheck -format sarif -json ./... --> FAIL 2 the -json flag cannot be used with -format flag
failures
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/binary_fail.ct
##### # Test of passing a non-file to -mode=binary $ govulncheck -mode=binary notafile --> FAIL 2 "notafile" is not a file ##### # Test of passing a non-binary and non-blob file to -mode=binary $ govulncheck -mode=binary ${moddir}/vuln/go.mod --> FAIL 1 govulncheck: unrecognized binary format ##### # Test of passing a blob with invalid header id $ govulncheck -mode=binary ${testdir}/failures/invalid_header_name.blob --> FAIL 1 govulncheck: unrecognized binary format ##### # Test of passing a blob with invalid header version $ govulncheck -mode=binary ${testdir}/failures/invalid_header_version.blob --> FAIL 1 govulncheck: unrecognized binary format ##### # Test of passing a blob with no header $ govulncheck -mode=binary ${testdir}/failures/no_header.blob --> FAIL 1 govulncheck: unrecognized binary format ##### # Test of passing a blob with invalid header, i.e., no header $ govulncheck -mode=binary ${testdir}/failures/no_header.blob --> FAIL 1 govulncheck: unrecognized binary format ##### # Test of passing a blob with no body $ govulncheck -mode=binary ${testdir}/failures/no_body.blob --> FAIL 1 govulncheck: unrecognized binary format ##### # Test of passing an empty blob/file $ govulncheck -mode=binary ${testdir}/failures/empty.blob --> FAIL 1 govulncheck: unrecognized binary format ##### # Test of passing an empty blob message $ govulncheck -mode=binary ${testdir}/failures/empty_message.blob --> FAIL 1 govulncheck: unrecognized binary format ##### # Test of passing blob message with multiple headers $ govulncheck -mode=binary ${testdir}/failures/multi_header.blob --> FAIL 1 govulncheck: unrecognized binary format ##### # Test of passing blob message with something after the body $ govulncheck -mode=binary ${testdir}/failures/multi_header.blob --> FAIL 1 govulncheck: unrecognized binary format ##### # Test of trying to analyze multiple binaries $ govulncheck -mode=binary ${common_vuln_binary} ${common_vuln_binary} --> FAIL 2 only 1 binary can be analyzed at a time ##### # Test of trying to run -mode=binary with -tags flag $ govulncheck -tags=foo -mode=binary ${common_vuln_binary} --> FAIL 2 the -tags flag is not supported in binary mode ##### # Test of trying to run -mode=binary with the -test flag $ govulncheck -test -mode=binary ${common_vuln_binary} --> FAIL 2 the -test flag is not supported in binary mode
failures
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/no_body.blob
{"name":"govulncheck-extract","version":"0.1.0"}
failures
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/invalid_header.blob
{"id":"invalid-name","protocol":"0.1.0"}{"modules":[{"Path":"github.com/tidwall/gjson","Version":"v1.6.5","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null}]}
failures
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/extract_fail.ct
##### # Test extraction of an unsupported file format $ govulncheck -mode=extract ${moddir}/vuln/go.mod --> FAIL 1 govulncheck: unrecognized binary format
failures
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/invalid_header_version.blob
{"name":"govulncheck-extract","version":"8.8.8"}{"modules":[{"Path":"github.com/tidwall/gjson","Version":"v1.6.5","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null}]}
failures
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/multi_header.blob
{"name":"govulncheck-extract","version":"0.1.0"}{"name":"govulncheck-extract","version":"0.1.0"}{"modules":[]}
failures
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/source_fail.ct
##### # Test of handing a binary to source mode $ govulncheck ${common_vuln_binary} --> FAIL 2 govulncheck: myfile is a file. By default, govulncheck runs source analysis on Go modules. Did you mean to run govulncheck with -mode=binary? For details, run govulncheck -h. ##### # Test of handing an invalid package pattern to source mode $ govulncheck -C ${moddir}/vuln blah --> FAIL 1 govulncheck: loading packages: There are errors with the provided package patterns: -: package foo is not in GOROOT (/tmp/foo) For details on package patterns, see https://pkg.go.dev/cmd/go#hdr-Package_lists_and_patterns. ##### # Test of handing a package pattern to scan level module $ govulncheck -scan module -C ${moddir}/vuln pattern --> FAIL 2 patterns are not accepted for module only scanning
failures
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/empty_message.blob
{}
failures
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/invalid_header_name.blob
{"name":"invalid-name","version":"0.1.0"}{"modules":[{"Path":"github.com/tidwall/gjson","Version":"v1.6.5","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null}]}
failures
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/after_body.blob
{"name":"govulncheck-extract","version":"0.1.0"}{"modules":[]}{"name":"govulncheck-extract","version":"0.1.0"}
failures
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/failures/query_fail.ct
##### # Test of query mode with invalid input. $ govulncheck -mode=query -format json example.com/module@ --> FAIL 2 invalid query example.com/module@: must be of the form module@version
binary-module
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-module/binary_module_text.ct
##### # Test binary scanning at the module level $ govulncheck -mode=binary -scan module ${common_vuln_binary} --> FAIL 3 === Module Results === Vulnerability #1: GO-2021-0265 A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time. More info: https://pkg.go.dev/vuln/GO-2021-0265 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.9.3 Vulnerability #2: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.0 Fixed in: golang.org/x/text@v0.3.7 Vulnerability #3: GO-2021-0054 Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector. More info: https://pkg.go.dev/vuln/GO-2021-0054 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.6.6 Vulnerability #4: GO-2020-0015 Infinite loop when decoding some inputs in golang.org/x/text More info: https://pkg.go.dev/vuln/GO-2020-0015 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.0 Fixed in: golang.org/x/text@v0.3.3 Your code may be affected by 4 vulnerabilities. Use '-scan symbol' for more fine grained vulnerability detection.
binary-module
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-module/binary_module_json.ct
##### # Test binary scanning at the module level with json output $ govulncheck -format json -mode binary -scan module ${common_vuln_binary} { "config": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "scan_level": "module", "scan_mode": "binary" } } { "progress": { "message": "Scanning your binary for known vulnerabilities..." } } { "progress": { "message": "Fetching vulnerabilities from the database..." } } { "progress": { "message": "Checking the binary against the vulnerabilities..." } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0265", "modified": "2023-04-03T15:57:51Z", "published": "2022-08-15T18:06:07Z", "aliases": [ "CVE-2021-42248", "CVE-2021-42836", "GHSA-c9gm-7rfj-8w5h", "GHSA-ppj4-34rq-v8j9" ], "details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.9.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Get", "parseObject", "queryMatches" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/237" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/236" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0265" } } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0113", "modified": "2023-04-03T15:57:51Z", "published": "2021-10-06T17:51:21Z", "aliases": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ], "details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/language", "symbols": [ "MatchStrings", "MustParse", "Parse", "ParseAcceptLanguage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/340830" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f" } ], "credits": [ { "name": "Guido Vranken" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0113" } } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0054", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36067", "GHSA-p64j-r5f4-pwwx" ], "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Result.ForEach", "unwrap" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/196" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0054" } } } { "finding": { "osv": "GO-2021-0054", "fixed_version": "v1.6.6", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2020-0015", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ], "summary": "Infinite loop when decoding some inputs in golang.org/x/text", "details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/encoding/unicode", "symbols": [ "bomOverride.Transform", "utf16Decoder.Transform" ] }, { "path": "golang.org/x/text/transform", "symbols": [ "String" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/238238" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e" }, { "type": "REPORT", "url": "https://go.dev/issue/39491" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0" } ], "credits": [ { "name": "@abacabadabacaba and Anton Gyllenberg" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0015" } } } { "finding": { "osv": "GO-2020-0015", "fixed_version": "v0.3.3", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0059", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-35380", "GHSA-w942-gw6m-p62c" ], "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Array", "Result.Get", "Result.Map", "Result.Value", "squash" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/192" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0059" } } }
query
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/query/query_json.ct
##### # Test of query mode for a third party module. $ govulncheck -mode=query -format json github.com/tidwall/gjson@v1.6.5 { "config": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "scan_level": "symbol", "scan_mode": "query" } } { "progress": { "message": "Looking up vulnerabilities in github.com/tidwall/gjson at v1.6.5..." } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0054", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36067", "GHSA-p64j-r5f4-pwwx" ], "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Result.ForEach", "unwrap" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/196" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0054" } } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0265", "modified": "2023-04-03T15:57:51Z", "published": "2022-08-15T18:06:07Z", "aliases": [ "CVE-2021-42248", "CVE-2021-42836", "GHSA-c9gm-7rfj-8w5h", "GHSA-ppj4-34rq-v8j9" ], "details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.9.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Get", "parseObject", "queryMatches" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/237" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/236" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0265" } } }
query
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/query/query_multi_json.ct
##### # Test of query mode with multiple inputs. $ govulncheck -mode=query -format json golang.org/x/text@v0.3.0 github.com/tidwall/gjson@v1.6.5 { "config": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "scan_level": "symbol", "scan_mode": "query" } } { "progress": { "message": "Looking up vulnerabilities in golang.org/x/text at v0.3.0..." } } { "progress": { "message": "Looking up vulnerabilities in github.com/tidwall/gjson at v1.6.5..." } } { "osv": { "schema_version": "1.3.1", "id": "GO-2020-0015", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ], "summary": "Infinite loop when decoding some inputs in golang.org/x/text", "details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/encoding/unicode", "symbols": [ "bomOverride.Transform", "utf16Decoder.Transform" ] }, { "path": "golang.org/x/text/transform", "symbols": [ "String" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/238238" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e" }, { "type": "REPORT", "url": "https://go.dev/issue/39491" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0" } ], "credits": [ { "name": "@abacabadabacaba and Anton Gyllenberg" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0015" } } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0113", "modified": "2023-04-03T15:57:51Z", "published": "2021-10-06T17:51:21Z", "aliases": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ], "details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/language", "symbols": [ "MatchStrings", "MustParse", "Parse", "ParseAcceptLanguage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/340830" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f" } ], "credits": [ { "name": "Guido Vranken" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0113" } } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0054", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36067", "GHSA-p64j-r5f4-pwwx" ], "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Result.ForEach", "unwrap" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/196" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0054" } } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0265", "modified": "2023-04-03T15:57:51Z", "published": "2022-08-15T18:06:07Z", "aliases": [ "CVE-2021-42248", "CVE-2021-42836", "GHSA-c9gm-7rfj-8w5h", "GHSA-ppj4-34rq-v8j9" ], "details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.9.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Get", "parseObject", "queryMatches" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/237" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/236" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0265" } } }
binary-package
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_json.ct
##### # Test binary scanning at the package level with json output $ govulncheck -format json -mode binary -scan package ${common_vuln_binary} { "config": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "scan_level": "package", "scan_mode": "binary" } } { "progress": { "message": "Scanning your binary for known vulnerabilities..." } } { "progress": { "message": "Fetching vulnerabilities from the database..." } } { "progress": { "message": "Checking the binary against the vulnerabilities..." } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0265", "modified": "2023-04-03T15:57:51Z", "published": "2022-08-15T18:06:07Z", "aliases": [ "CVE-2021-42248", "CVE-2021-42836", "GHSA-c9gm-7rfj-8w5h", "GHSA-ppj4-34rq-v8j9" ], "details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.9.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Get", "parseObject", "queryMatches" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/237" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/236" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0265" } } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5" } ] } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0113", "modified": "2023-04-03T15:57:51Z", "published": "2021-10-06T17:51:21Z", "aliases": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ], "details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/language", "symbols": [ "MatchStrings", "MustParse", "Parse", "ParseAcceptLanguage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/340830" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f" } ], "credits": [ { "name": "Guido Vranken" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0113" } } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0" } ] } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0", "package": "golang.org/x/text/language" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0054", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36067", "GHSA-p64j-r5f4-pwwx" ], "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Result.ForEach", "unwrap" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/196" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0054" } } } { "finding": { "osv": "GO-2021-0054", "fixed_version": "v1.6.6", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5" } ] } } { "finding": { "osv": "GO-2021-0054", "fixed_version": "v1.6.6", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2020-0015", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ], "summary": "Infinite loop when decoding some inputs in golang.org/x/text", "details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/encoding/unicode", "symbols": [ "bomOverride.Transform", "utf16Decoder.Transform" ] }, { "path": "golang.org/x/text/transform", "symbols": [ "String" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/238238" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e" }, { "type": "REPORT", "url": "https://go.dev/issue/39491" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0" } ], "credits": [ { "name": "@abacabadabacaba and Anton Gyllenberg" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0015" } } } { "finding": { "osv": "GO-2020-0015", "fixed_version": "v0.3.3", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0059", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-35380", "GHSA-w942-gw6m-p62c" ], "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Array", "Result.Get", "Result.Map", "Result.Value", "squash" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/192" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0059" } } }
binary-package
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-package/binary_package_text.ct
# Test binary scanning at the package level. $ govulncheck -mode=binary -scan package ${common_vuln_binary} --> FAIL 3 === Package Results === Vulnerability #1: GO-2021-0265 A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time. More info: https://pkg.go.dev/vuln/GO-2021-0265 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.9.3 Vulnerability #2: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.0 Fixed in: golang.org/x/text@v0.3.7 Vulnerability #3: GO-2021-0054 Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector. More info: https://pkg.go.dev/vuln/GO-2021-0054 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.6.6 Your code may be affected by 3 vulnerabilities. This scan also found 1 vulnerability in modules you require. Use '-scan symbol' for more fine grained vulnerability detection and '-show verbose' for more details.
usage
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/usage/format.ct
##### # Test of explicit text format $ govulncheck -C ${moddir}/informational -format text . === Symbol Results === No vulnerabilities found. Your code is affected by 0 vulnerabilities. This scan also found 1 vulnerability in packages you import and 0 vulnerabilities in modules you require, but your code doesn't appear to call these vulnerabilities. Use '-show verbose' for more details. # Test of explicit json format $ govulncheck -C ${moddir}/informational -format json { "config": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "go_version": "go1.18", "scan_level": "symbol", "scan_mode": "source" } }
usage
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/usage/source_no_packages.ct
##### # Test message when there are no packages matching the provided pattern (#59623). $ govulncheck -C ${moddir}/vuln pkg/no-govulncheck/... No vulnerabilities found.
usage
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/usage/usage.ct
##### # Test of govulncheck help output $ govulncheck -h Govulncheck reports known vulnerabilities in dependencies. Usage: govulncheck [flags] [patterns] govulncheck -mode=binary [flags] [binary] -C dir change to dir before running govulncheck -db url vulnerability database url (default "https://vuln.go.dev") -format value specify format output The supported values are 'text', 'json', 'sarif', and 'openvex' (default 'text') -json output JSON (Go compatible legacy flag, see format flag) -mode value supports 'source', 'binary', and 'extract' (default 'source') -scan value set the scanning level desired, one of 'module', 'package', or 'symbol' (default 'symbol') -show list enable display of additional information specified by the comma separated list The supported values are 'traces','color', 'version', and 'verbose' -tags list comma-separated list of build tags -test analyze test files (only valid for source mode, default false) -version print the version information For details, see https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck. ##### # Not scanning anything. $ govulncheck No vulnerabilities found. ##### # Reporting version without scanning anything. $ govulncheck -version Go: go1.18 Scanner: govulncheck@v1.0.0 DB: testdata/vulndb-v1 DB updated: 2023-04-03 15:57:51 +0000 UTC No vulnerabilities found.
extract
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/extract/binary_extract.ct
##### # Test binary mode using the extracted binary blob. $ govulncheck -mode=binary ${testdir}/extract/vuln.blob --> FAIL 3 === Symbol Results === Vulnerability #1: GO-2021-0265 A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time. More info: https://pkg.go.dev/vuln/GO-2021-0265 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.9.3 Vulnerable symbols found: #1: gjson.Get #2: gjson.Result.Get Vulnerability #2: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.0 Fixed in: golang.org/x/text@v0.3.7 Vulnerable symbols found: #1: language.Parse Vulnerability #3: GO-2021-0054 Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector. More info: https://pkg.go.dev/vuln/GO-2021-0054 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.6.6 Vulnerable symbols found: #1: gjson.Result.ForEach Your code is affected by 3 vulnerabilities from 2 modules. This scan also found 0 vulnerabilities in packages you import and 1 vulnerability in modules you require, but your code doesn't appear to call these vulnerabilities. Use '-show verbose' for more details. # Test extract mode. Due to the size of the blob even for smallest programs, we # directly compare its output to a target vuln_blob.json file. $ govulncheck-cmp -mode=extract ${moddir}/vuln/vuln_dont_run_me ${testdir}/extract/vuln.blob
extract
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/extract/vuln.blob
{"name":"govulncheck-extract","version":"0.1.0"} {"path":"golang.org/vuln","main":{"Path":"golang.org/vuln","Version":"(devel)","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null},"modules":[{"Path":"github.com/tidwall/gjson","Version":"v1.6.5","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null},{"Path":"github.com/tidwall/match","Version":"v1.1.0","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null},{"Path":"github.com/tidwall/pretty","Version":"v1.2.0","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null},{"Path":"golang.org/x/text","Version":"v0.3.0","Replace":null,"Time":null,"Main":false,"Indirect":false,"Dir":"","GoMod":"","GoVersion":"","Error":null}],"pkgSymbols":[{"name":"Encoding"},{"name":"FD"},{"name":"Int64"},{"name":"MarshalerError"},{"name":"NotInHeap"},{"name":"PathError"},{"name":"Pointer[...]"},{"name":"RegArgs"},{"name":"Result"},{"name":"SyntaxError"},{"name":"Uint64"},{"name":"UnmarshalTypeError"},{"name":"UnsupportedValueError"},{"name":"ValueError"},{"name":"_rt0_amd64"},{"name":"_rt0_amd64_linux"},{"name":"aeshashbody"},{"name":"callRet"},{"name":"cmpbody"},{"name":"debugCall1024"},{"name":"debugCall128"},{"name":"debugCall16384"},{"name":"debugCall2048"},{"name":"debugCall256"},{"name":"debugCall32"},{"name":"debugCall32768"},{"name":"debugCall4096"},{"name":"debugCall512"},{"name":"debugCall64"},{"name":"debugCall65536"},{"name":"debugCall8192"},{"name":"encoder"},{"name":"eq.[...[...]string"},{"name":"eq.[...]runtime.Frame"},{"name":"eq.fmt.fmt"},{"name":"eq.fmt.wrapError"},{"name":"eq.os.file"},{"name":"eq.reflect.Method"},{"name":"eq.reflect.ValueError"},{"name":"eq.reflect.makeFuncCtxt"},{"name":"eq.reflect.methodValue"},{"name":"eq.reflect.uncommonType"},{"name":"eq.runtime.Frame"},{"name":"eq.runtime.TypeAssertionError"},{"name":"eq.runtime._func"},{"name":"eq.runtime._panic"},{"name":"eq.runtime.bitvector"},{"name":"eq.runtime.boundsError"},{"name":"eq.runtime.errorAddressString"},{"name":"eq.runtime.gcBits"},{"name":"eq.runtime.gcWork"},{"name":"eq.runtime.hchan"},{"name":"eq.runtime.itab"},{"name":"eq.runtime.limiterEvent"},{"name":"eq.runtime.mOS"},{"name":"eq.runtime.mSpanList"},{"name":"eq.runtime.mcache"},{"name":"eq.runtime.modulehash"},{"name":"eq.runtime.mspan"},{"name":"eq.runtime.notInHeap"},{"name":"eq.runtime.piController"},{"name":"eq.runtime.special"},{"name":"eq.runtime.sudog"},{"name":"eq.runtime.sysmontick"},{"name":"eq.runtime.workbuf"},{"name":"eq.strconv.NumError"},{"name":"eq.struct { runtime.gList; runtime.n int32 }"},{"name":"eq.sync.WaitGroup"},{"name":"eq.sync.entry"},{"name":"eq.sync.poolLocal"},{"name":"eq.sync.poolLocalInternal"},{"name":"gogo"},{"name":"gosave_systemstack_switch"},{"name":"indexbody"},{"name":"indexbytebody"},{"name":"len int }"},{"name":"memeqbody"},{"name":"option"},{"name":"reflectWithString"},{"name":"setg_gcc"},{"name":"subSelector"},{"name":"uncommonType"},{"pkg":"bytes","name":"Buffer.Bytes"},{"pkg":"bytes","name":"Buffer.Len"},{"pkg":"bytes","name":"Buffer.Reset"},{"pkg":"bytes","name":"Buffer.String"},{"pkg":"bytes","name":"Buffer.Truncate"},{"pkg":"bytes","name":"Buffer.Write"},{"pkg":"bytes","name":"Buffer.WriteByte"},{"pkg":"bytes","name":"Buffer.WriteString"},{"pkg":"bytes","name":"Buffer.grow"},{"pkg":"bytes","name":"Buffer.tryGrowByReslice"},{"pkg":"bytes","name":"Compare"},{"pkg":"bytes","name":"ContainsAny"},{"pkg":"bytes","name":"Cut"},{"pkg":"bytes","name":"Equal"},{"pkg":"bytes","name":"EqualFold"},{"pkg":"bytes","name":"HasPrefix"},{"pkg":"bytes","name":"HasSuffix"},{"pkg":"bytes","name":"Index"},{"pkg":"bytes","name":"IndexAny"},{"pkg":"bytes","name":"IndexByte"},{"pkg":"bytes","name":"IndexRune"},{"pkg":"bytes","name":"Join"},{"pkg":"bytes","name":"NewBuffer"},{"pkg":"bytes","name":"TrimFunc"},{"pkg":"bytes","name":"TrimLeftFunc"},{"pkg":"bytes","name":"TrimRight"},{"pkg":"bytes","name":"TrimRightFunc"},{"pkg":"bytes","name":"TrimSpace"},{"pkg":"bytes","name":"asciiSet.contains"},{"pkg":"bytes","name":"containsRune"},{"pkg":"bytes","name":"growSlice"},{"pkg":"bytes","name":"growSlice.func1"},{"pkg":"bytes","name":"indexFunc"},{"pkg":"bytes","name":"init"},{"pkg":"bytes","name":"lastIndexFunc"},{"pkg":"bytes","name":"makeASCIISet"},{"pkg":"bytes","name":"trimRightASCII"},{"pkg":"bytes","name":"trimRightByte"},{"pkg":"bytes","name":"trimRightUnicode"},{"pkg":"encoding/base64","name":"CorruptInputError.Error"},{"pkg":"encoding/base64","name":"Encoding.Decode"},{"pkg":"encoding/base64","name":"Encoding.DecodedLen"},{"pkg":"encoding/base64","name":"Encoding.Encode"},{"pkg":"encoding/base64","name":"Encoding.EncodedLen"},{"pkg":"encoding/base64","name":"Encoding.WithPadding"},{"pkg":"encoding/base64","name":"Encoding.decodeQuantum"},{"pkg":"encoding/base64","name":"NewEncoder"},{"pkg":"encoding/base64","name":"NewEncoding"},{"pkg":"encoding/base64","name":"assemble32"},{"pkg":"encoding/base64","name":"assemble64"},{"pkg":"encoding/base64","name":"encoder.Close"},{"pkg":"encoding/base64","name":"encoder.Write"},{"pkg":"encoding/base64","name":"init"},{"pkg":"encoding/binary","name":"bigEndian.PutUint32"},{"pkg":"encoding/binary","name":"bigEndian.PutUint64"},{"pkg":"encoding/binary","name":"init"},{"pkg":"encoding/json","name":"HTMLEscape"},{"pkg":"encoding/json","name":"InvalidUnmarshalError.Error"},{"pkg":"encoding/json","name":"Marshal"},{"pkg":"encoding/json","name":"Marshal.func1"},{"pkg":"encoding/json","name":"MarshalerError.Error"},{"pkg":"encoding/json","name":"Number.String"},{"pkg":"encoding/json","name":"SyntaxError.Error"},{"pkg":"encoding/json","name":"Unmarshal"},{"pkg":"encoding/json","name":"UnmarshalTypeError.Error"},{"pkg":"encoding/json","name":"UnsupportedTypeError.Error"},{"pkg":"encoding/json","name":"UnsupportedValueError.Error"},{"pkg":"encoding/json","name":"addrMarshalerEncoder"},{"pkg":"encoding/json","name":"addrTextMarshalerEncoder"},{"pkg":"encoding/json","name":"arrayEncoder.encode"},{"pkg":"encoding/json","name":"arrayEncoder.encode-fm"},{"pkg":"encoding/json","name":"asciiEqualFold"},{"pkg":"encoding/json","name":"boolEncoder"},{"pkg":"encoding/json","name":"byIndex.Len"},{"pkg":"encoding/json","name":"byIndex.Less"},{"pkg":"encoding/json","name":"byIndex.Swap"},{"pkg":"encoding/json","name":"cachedTypeFields"},{"pkg":"encoding/json","name":"checkValid"},{"pkg":"encoding/json","name":"compact"},{"pkg":"encoding/json","name":"compact.func1"},{"pkg":"encoding/json","name":"condAddrEncoder.encode"},{"pkg":"encoding/json","name":"condAddrEncoder.encode-fm"},{"pkg":"encoding/json","name":"decodeState.addErrorContext"},{"pkg":"encoding/json","name":"decodeState.array"},{"pkg":"encoding/json","name":"decodeState.arrayInterface"},{"pkg":"encoding/json","name":"decodeState.convertNumber"},{"pkg":"encoding/json","name":"decodeState.init"},{"pkg":"encoding/json","name":"decodeState.literalInterface"},{"pkg":"encoding/json","name":"decodeState.literalStore"},{"pkg":"encoding/json","name":"decodeState.object"},{"pkg":"encoding/json","name":"decodeState.objectInterface"},{"pkg":"encoding/json","name":"decodeState.readIndex"},{"pkg":"encoding/json","name":"decodeState.rescanLiteral"},{"pkg":"encoding/json","name":"decodeState.saveError"},{"pkg":"encoding/json","name":"decodeState.scanNext"},{"pkg":"encoding/json","name":"decodeState.scanWhile"},{"pkg":"encoding/json","name":"decodeState.skip"},{"pkg":"encoding/json","name":"decodeState.unmarshal"},{"pkg":"encoding/json","name":"decodeState.value"},{"pkg":"encoding/json","name":"decodeState.valueInterface"},{"pkg":"encoding/json","name":"decodeState.valueQuoted"},{"pkg":"encoding/json","name":"dominantField"},{"pkg":"encoding/json","name":"encodeByteSlice"},{"pkg":"encoding/json","name":"encodeState).marshal.func1"},{"pkg":"encoding/json","name":"encodeState.Len"},{"pkg":"encoding/json","name":"encodeState.String"},{"pkg":"encoding/json","name":"encodeState.Write"},{"pkg":"encoding/json","name":"encodeState.error"},{"pkg":"encoding/json","name":"encodeState.marshal"},{"pkg":"encoding/json","name":"encodeState.reflectValue"},{"pkg":"encoding/json","name":"encodeState.string"},{"pkg":"encoding/json","name":"encodeState.stringBytes"},{"pkg":"encoding/json","name":"equalFoldRight"},{"pkg":"encoding/json","name":"floatEncoder.encode"},{"pkg":"encoding/json","name":"floatEncoder.encode-fm"},{"pkg":"encoding/json","name":"foldFunc"},{"pkg":"encoding/json","name":"freeScanner"},{"pkg":"encoding/json","name":"getu4"},{"pkg":"encoding/json","name":"glob..func1"},{"pkg":"encoding/json","name":"indirect"},{"pkg":"encoding/json","name":"init"},{"pkg":"encoding/json","name":"intEncoder"},{"pkg":"encoding/json","name":"interfaceEncoder"},{"pkg":"encoding/json","name":"invalidValueEncoder"},{"pkg":"encoding/json","name":"isEmptyValue"},{"pkg":"encoding/json","name":"isSpace"},{"pkg":"encoding/json","name":"isValidNumber"},{"pkg":"encoding/json","name":"isValidTag"},{"pkg":"encoding/json","name":"jsonError.Error"},{"pkg":"encoding/json","name":"mapEncoder.encode"},{"pkg":"encoding/json","name":"mapEncoder.encode-fm"},{"pkg":"encoding/json","name":"mapEncoder.encode.func1"},{"pkg":"encoding/json","name":"mapEncoder.encode.func2"},{"pkg":"encoding/json","name":"marshalerEncoder"},{"pkg":"encoding/json","name":"newArrayEncoder"},{"pkg":"encoding/json","name":"newCondAddrEncoder"},{"pkg":"encoding/json","name":"newEncodeState"},{"pkg":"encoding/json","name":"newMapEncoder"},{"pkg":"encoding/json","name":"newPtrEncoder"},{"pkg":"encoding/json","name":"newScanner"},{"pkg":"encoding/json","name":"newSliceEncoder"},{"pkg":"encoding/json","name":"newStructEncoder"},{"pkg":"encoding/json","name":"newTypeEncoder"},{"pkg":"encoding/json","name":"parseTag"},{"pkg":"encoding/json","name":"ptrEncoder.encode"},{"pkg":"encoding/json","name":"ptrEncoder.encode-fm"},{"pkg":"encoding/json","name":"ptrEncoder.encode.func1"},{"pkg":"encoding/json","name":"quoteChar"},{"pkg":"encoding/json","name":"reflectWithString.resolve"},{"pkg":"encoding/json","name":"scanner.eof"},{"pkg":"encoding/json","name":"scanner.error"},{"pkg":"encoding/json","name":"scanner.popParseState"},{"pkg":"encoding/json","name":"scanner.pushParseState"},{"pkg":"encoding/json","name":"scanner.reset"},{"pkg":"encoding/json","name":"simpleLetterEqualFold"},{"pkg":"encoding/json","name":"sliceEncoder.encode"},{"pkg":"encoding/json","name":"sliceEncoder.encode-fm"},{"pkg":"encoding/json","name":"sliceEncoder.encode.func1"},{"pkg":"encoding/json","name":"state0"},{"pkg":"encoding/json","name":"state1"},{"pkg":"encoding/json","name":"stateBeginString"},{"pkg":"encoding/json","name":"stateBeginStringOrEmpty"},{"pkg":"encoding/json","name":"stateBeginValue"},{"pkg":"encoding/json","name":"stateBeginValueOrEmpty"},{"pkg":"encoding/json","name":"stateDot"},{"pkg":"encoding/json","name":"stateDot0"},{"pkg":"encoding/json","name":"stateE"},{"pkg":"encoding/json","name":"stateE0"},{"pkg":"encoding/json","name":"stateESign"},{"pkg":"encoding/json","name":"stateEndTop"},{"pkg":"encoding/json","name":"stateEndValue"},{"pkg":"encoding/json","name":"stateError"},{"pkg":"encoding/json","name":"stateF"},{"pkg":"encoding/json","name":"stateFa"},{"pkg":"encoding/json","name":"stateFal"},{"pkg":"encoding/json","name":"stateFals"},{"pkg":"encoding/json","name":"stateInString"},{"pkg":"encoding/json","name":"stateInStringEsc"},{"pkg":"encoding/json","name":"stateInStringEscU"},{"pkg":"encoding/json","name":"stateInStringEscU1"},{"pkg":"encoding/json","name":"stateInStringEscU12"},{"pkg":"encoding/json","name":"stateInStringEscU123"},{"pkg":"encoding/json","name":"stateN"},{"pkg":"encoding/json","name":"stateNeg"},{"pkg":"encoding/json","name":"stateNu"},{"pkg":"encoding/json","name":"stateNul"},{"pkg":"encoding/json","name":"stateT"},{"pkg":"encoding/json","name":"stateTr"},{"pkg":"encoding/json","name":"stateTru"},{"pkg":"encoding/json","name":"stringEncoder"},{"pkg":"encoding/json","name":"structEncoder.encode"},{"pkg":"encoding/json","name":"structEncoder.encode-fm"},{"pkg":"encoding/json","name":"tagOptions.Contains"},{"pkg":"encoding/json","name":"textMarshalerEncoder"},{"pkg":"encoding/json","name":"typeByIndex"},{"pkg":"encoding/json","name":"typeEncoder"},{"pkg":"encoding/json","name":"typeEncoder.func1"},{"pkg":"encoding/json","name":"typeFields"},{"pkg":"encoding/json","name":"typeFields.func1"},{"pkg":"encoding/json","name":"uintEncoder"},{"pkg":"encoding/json","name":"unquote"},{"pkg":"encoding/json","name":"unquoteBytes"},{"pkg":"encoding/json","name":"unsupportedTypeEncoder"},{"pkg":"encoding/json","name":"valueEncoder"},{"pkg":"encoding/pem","name":"Decode"},{"pkg":"encoding/pem","name":"getLine"},{"pkg":"encoding/pem","name":"removeSpacesAndTabs"},{"pkg":"errors","name":"New"},{"pkg":"errors","name":"errorString.Error"},{"pkg":"errors","name":"init"},{"pkg":"fmt","name":"Errorf"},{"pkg":"fmt","name":"Fprint"},{"pkg":"fmt","name":"Fprintln"},{"pkg":"fmt","name":"Println"},{"pkg":"fmt","name":"Sprintf"},{"pkg":"fmt","name":"buffer.write"},{"pkg":"fmt","name":"buffer.writeByte"},{"pkg":"fmt","name":"buffer.writeRune"},{"pkg":"fmt","name":"buffer.writeString"},{"pkg":"fmt","name":"fmt.clearflags"},{"pkg":"fmt","name":"fmt.fmtBoolean"},{"pkg":"fmt","name":"fmt.fmtBs"},{"pkg":"fmt","name":"fmt.fmtBx"},{"pkg":"fmt","name":"fmt.fmtC"},{"pkg":"fmt","name":"fmt.fmtFloat"},{"pkg":"fmt","name":"fmt.fmtInteger"},{"pkg":"fmt","name":"fmt.fmtQ"},{"pkg":"fmt","name":"fmt.fmtQc"},{"pkg":"fmt","name":"fmt.fmtS"},{"pkg":"fmt","name":"fmt.fmtSbx"},{"pkg":"fmt","name":"fmt.fmtSx"},{"pkg":"fmt","name":"fmt.fmtUnicode"},{"pkg":"fmt","name":"fmt.init"},{"pkg":"fmt","name":"fmt.pad"},{"pkg":"fmt","name":"fmt.padString"},{"pkg":"fmt","name":"fmt.truncate"},{"pkg":"fmt","name":"fmt.truncateString"},{"pkg":"fmt","name":"fmt.writePadding"},{"pkg":"fmt","name":"getField"},{"pkg":"fmt","name":"glob..func1"},{"pkg":"fmt","name":"init"},{"pkg":"fmt","name":"intFromArg"},{"pkg":"fmt","name":"newPrinter"},{"pkg":"fmt","name":"parseArgNumber"},{"pkg":"fmt","name":"parsenum"},{"pkg":"fmt","name":"pp).handleMethods.func1"},{"pkg":"fmt","name":"pp).handleMethods.func2"},{"pkg":"fmt","name":"pp).handleMethods.func3"},{"pkg":"fmt","name":"pp).handleMethods.func4"},{"pkg":"fmt","name":"pp.Write"},{"pkg":"fmt","name":"pp.argNumber"},{"pkg":"fmt","name":"pp.badArgNum"},{"pkg":"fmt","name":"pp.badVerb"},{"pkg":"fmt","name":"pp.catchPanic"},{"pkg":"fmt","name":"pp.doPrint"},{"pkg":"fmt","name":"pp.doPrintf"},{"pkg":"fmt","name":"pp.doPrintln"},{"pkg":"fmt","name":"pp.fmt0x64"},{"pkg":"fmt","name":"pp.fmtBool"},{"pkg":"fmt","name":"pp.fmtBytes"},{"pkg":"fmt","name":"pp.fmtComplex"},{"pkg":"fmt","name":"pp.fmtFloat"},{"pkg":"fmt","name":"pp.fmtInteger"},{"pkg":"fmt","name":"pp.fmtPointer"},{"pkg":"fmt","name":"pp.fmtString"},{"pkg":"fmt","name":"pp.free"},{"pkg":"fmt","name":"pp.handleMethods"},{"pkg":"fmt","name":"pp.missingArg"},{"pkg":"fmt","name":"pp.printArg"},{"pkg":"fmt","name":"pp.printValue"},{"pkg":"fmt","name":"pp.unknownType"},{"pkg":"fmt","name":"tooLarge"},{"pkg":"fmt","name":"wrapError.Error"},{"pkg":"fmt","name":"wrapErrors.Error"},{"pkg":"github.com/tidwall/gjson","name":"Get"},{"pkg":"github.com/tidwall/gjson","name":"Parse"},{"pkg":"github.com/tidwall/gjson","name":"Result.Bool"},{"pkg":"github.com/tidwall/gjson","name":"Result.Exists"},{"pkg":"github.com/tidwall/gjson","name":"Result.ForEach"},{"pkg":"github.com/tidwall/gjson","name":"Result.Get"},{"pkg":"github.com/tidwall/gjson","name":"Result.Int"},{"pkg":"github.com/tidwall/gjson","name":"Result.IsArray"},{"pkg":"github.com/tidwall/gjson","name":"Result.IsObject"},{"pkg":"github.com/tidwall/gjson","name":"Result.String"},{"pkg":"github.com/tidwall/gjson","name":"Valid"},{"pkg":"github.com/tidwall/gjson","name":"appendJSONString"},{"pkg":"github.com/tidwall/gjson","name":"execModifier"},{"pkg":"github.com/tidwall/gjson","name":"fillIndex"},{"pkg":"github.com/tidwall/gjson","name":"init"},{"pkg":"github.com/tidwall/gjson","name":"isSimpleName"},{"pkg":"github.com/tidwall/gjson","name":"modFlatten"},{"pkg":"github.com/tidwall/gjson","name":"modFlatten.func1"},{"pkg":"github.com/tidwall/gjson","name":"modFlatten.func2"},{"pkg":"github.com/tidwall/gjson","name":"modJoin"},{"pkg":"github.com/tidwall/gjson","name":"modJoin.func1"},{"pkg":"github.com/tidwall/gjson","name":"modJoin.func2"},{"pkg":"github.com/tidwall/gjson","name":"modJoin.func3"},{"pkg":"github.com/tidwall/gjson","name":"modJoin.func3.1"},{"pkg":"github.com/tidwall/gjson","name":"modPretty"},{"pkg":"github.com/tidwall/gjson","name":"modPretty.func1"},{"pkg":"github.com/tidwall/gjson","name":"modReverse"},{"pkg":"github.com/tidwall/gjson","name":"modReverse.func1"},{"pkg":"github.com/tidwall/gjson","name":"modReverse.func2"},{"pkg":"github.com/tidwall/gjson","name":"modThis"},{"pkg":"github.com/tidwall/gjson","name":"modUgly"},{"pkg":"github.com/tidwall/gjson","name":"modValid"},{"pkg":"github.com/tidwall/gjson","name":"nameOfLast"},{"pkg":"github.com/tidwall/gjson","name":"parseAny"},{"pkg":"github.com/tidwall/gjson","name":"parseArray"},{"pkg":"github.com/tidwall/gjson","name":"parseArray.func1"},{"pkg":"github.com/tidwall/gjson","name":"parseArrayPath"},{"pkg":"github.com/tidwall/gjson","name":"parseInt"},{"pkg":"github.com/tidwall/gjson","name":"parseLiteral"},{"pkg":"github.com/tidwall/gjson","name":"parseNumber"},{"pkg":"github.com/tidwall/gjson","name":"parseObject"},{"pkg":"github.com/tidwall/gjson","name":"parseObjectPath"},{"pkg":"github.com/tidwall/gjson","name":"parseQuery"},{"pkg":"github.com/tidwall/gjson","name":"parseSquash"},{"pkg":"github.com/tidwall/gjson","name":"parseString"},{"pkg":"github.com/tidwall/gjson","name":"parseSubSelectors"},{"pkg":"github.com/tidwall/gjson","name":"parseSubSelectors.func1"},{"pkg":"github.com/tidwall/gjson","name":"parseUint"},{"pkg":"github.com/tidwall/gjson","name":"queryMatches"},{"pkg":"github.com/tidwall/gjson","name":"runeit"},{"pkg":"github.com/tidwall/gjson","name":"safeInt"},{"pkg":"github.com/tidwall/gjson","name":"splitPossiblePipe"},{"pkg":"github.com/tidwall/gjson","name":"squash"},{"pkg":"github.com/tidwall/gjson","name":"stringBytes"},{"pkg":"github.com/tidwall/gjson","name":"tolit"},{"pkg":"github.com/tidwall/gjson","name":"tonum"},{"pkg":"github.com/tidwall/gjson","name":"tostr"},{"pkg":"github.com/tidwall/gjson","name":"trim"},{"pkg":"github.com/tidwall/gjson","name":"unescape"},{"pkg":"github.com/tidwall/gjson","name":"unwrap"},{"pkg":"github.com/tidwall/gjson","name":"validany"},{"pkg":"github.com/tidwall/gjson","name":"validarray"},{"pkg":"github.com/tidwall/gjson","name":"validcolon"},{"pkg":"github.com/tidwall/gjson","name":"validcomma"},{"pkg":"github.com/tidwall/gjson","name":"validfalse"},{"pkg":"github.com/tidwall/gjson","name":"validnull"},{"pkg":"github.com/tidwall/gjson","name":"validnumber"},{"pkg":"github.com/tidwall/gjson","name":"validobject"},{"pkg":"github.com/tidwall/gjson","name":"validpayload"},{"pkg":"github.com/tidwall/gjson","name":"validstring"},{"pkg":"github.com/tidwall/gjson","name":"validtrue"},{"pkg":"github.com/tidwall/match","name":"Match"},{"pkg":"github.com/tidwall/match","name":"match"},{"pkg":"github.com/tidwall/match","name":"matchTrimSuffix"},{"pkg":"github.com/tidwall/pretty","name":"Pretty"},{"pkg":"github.com/tidwall/pretty","name":"PrettyOptions"},{"pkg":"github.com/tidwall/pretty","name":"Ugly"},{"pkg":"github.com/tidwall/pretty","name":"appendPrettyAny"},{"pkg":"github.com/tidwall/pretty","name":"appendPrettyNumber"},{"pkg":"github.com/tidwall/pretty","name":"appendPrettyObject"},{"pkg":"github.com/tidwall/pretty","name":"appendPrettyString"},{"pkg":"github.com/tidwall/pretty","name":"appendTabs"},{"pkg":"github.com/tidwall/pretty","name":"byKeyVal.Len"},{"pkg":"github.com/tidwall/pretty","name":"byKeyVal.Less"},{"pkg":"github.com/tidwall/pretty","name":"byKeyVal.Swap"},{"pkg":"github.com/tidwall/pretty","name":"byKeyVal.isLess"},{"pkg":"github.com/tidwall/pretty","name":"getjtype"},{"pkg":"github.com/tidwall/pretty","name":"hexp"},{"pkg":"github.com/tidwall/pretty","name":"init.0"},{"pkg":"github.com/tidwall/pretty","name":"init.0.func1"},{"pkg":"github.com/tidwall/pretty","name":"isNaNOrInf"},{"pkg":"github.com/tidwall/pretty","name":"parsestr"},{"pkg":"github.com/tidwall/pretty","name":"sortPairs"},{"pkg":"github.com/tidwall/pretty","name":"ugly"},{"pkg":"golang.org/x/text/internal/tag","name":"Compare"},{"pkg":"golang.org/x/text/internal/tag","name":"FixCase"},{"pkg":"golang.org/x/text/internal/tag","name":"Index.Elem"},{"pkg":"golang.org/x/text/internal/tag","name":"Index.Index"},{"pkg":"golang.org/x/text/internal/tag","name":"Index.Index.func1"},{"pkg":"golang.org/x/text/internal/tag","name":"Index.Next"},{"pkg":"golang.org/x/text/internal/tag","name":"cmp"},{"pkg":"golang.org/x/text/language","name":"CanonType.Make"},{"pkg":"golang.org/x/text/language","name":"CanonType.Parse"},{"pkg":"golang.org/x/text/language","name":"Make"},{"pkg":"golang.org/x/text/language","name":"Parse"},{"pkg":"golang.org/x/text/language","name":"Tag.canonicalize"},{"pkg":"golang.org/x/text/language","name":"Tag.equalTags"},{"pkg":"golang.org/x/text/language","name":"Tag.genCoreBytes"},{"pkg":"golang.org/x/text/language","name":"Tag.private"},{"pkg":"golang.org/x/text/language","name":"Tag.remakeString"},{"pkg":"golang.org/x/text/language","name":"Tag.setUndefinedLang"},{"pkg":"golang.org/x/text/language","name":"Tag.setUndefinedRegion"},{"pkg":"golang.org/x/text/language","name":"Tag.setUndefinedScript"},{"pkg":"golang.org/x/text/language","name":"ValueError.Error"},{"pkg":"golang.org/x/text/language","name":"ValueError.tag"},{"pkg":"golang.org/x/text/language","name":"addTags"},{"pkg":"golang.org/x/text/language","name":"bytesSort.Len"},{"pkg":"golang.org/x/text/language","name":"bytesSort.Less"},{"pkg":"golang.org/x/text/language","name":"bytesSort.Swap"},{"pkg":"golang.org/x/text/language","name":"findIndex"},{"pkg":"golang.org/x/text/language","name":"getLangID"},{"pkg":"golang.org/x/text/language","name":"getLangISO2"},{"pkg":"golang.org/x/text/language","name":"getLangISO3"},{"pkg":"golang.org/x/text/language","name":"getRegionID"},{"pkg":"golang.org/x/text/language","name":"getRegionISO2"},{"pkg":"golang.org/x/text/language","name":"getRegionISO3"},{"pkg":"golang.org/x/text/language","name":"getRegionM49"},{"pkg":"golang.org/x/text/language","name":"getRegionM49.func1"},{"pkg":"golang.org/x/text/language","name":"getScriptID"},{"pkg":"golang.org/x/text/language","name":"grandfathered"},{"pkg":"golang.org/x/text/language","name":"init"},{"pkg":"golang.org/x/text/language","name":"init.0"},{"pkg":"golang.org/x/text/language","name":"intToStr"},{"pkg":"golang.org/x/text/language","name":"isAlphaNum"},{"pkg":"golang.org/x/text/language","name":"langID.String"},{"pkg":"golang.org/x/text/language","name":"langID.stringToBuf"},{"pkg":"golang.org/x/text/language","name":"makeScannerString"},{"pkg":"golang.org/x/text/language","name":"mkErrInvalid"},{"pkg":"golang.org/x/text/language","name":"normLang"},{"pkg":"golang.org/x/text/language","name":"normLang.func1"},{"pkg":"golang.org/x/text/language","name":"normRegion"},{"pkg":"golang.org/x/text/language","name":"normRegion.func1"},{"pkg":"golang.org/x/text/language","name":"parse"},{"pkg":"golang.org/x/text/language","name":"parseExtension"},{"pkg":"golang.org/x/text/language","name":"parseExtensions"},{"pkg":"golang.org/x/text/language","name":"parseTag"},{"pkg":"golang.org/x/text/language","name":"parseVariants"},{"pkg":"golang.org/x/text/language","name":"regionID.M49"},{"pkg":"golang.org/x/text/language","name":"regionID.String"},{"pkg":"golang.org/x/text/language","name":"regionID.contains"},{"pkg":"golang.org/x/text/language","name":"scanner.acceptMinSize"},{"pkg":"golang.org/x/text/language","name":"scanner.deleteRange"},{"pkg":"golang.org/x/text/language","name":"scanner.gobble"},{"pkg":"golang.org/x/text/language","name":"scanner.init"},{"pkg":"golang.org/x/text/language","name":"scanner.replace"},{"pkg":"golang.org/x/text/language","name":"scanner.resizeRange"},{"pkg":"golang.org/x/text/language","name":"scanner.scan"},{"pkg":"golang.org/x/text/language","name":"scanner.setError"},{"pkg":"golang.org/x/text/language","name":"scanner.toLower"},{"pkg":"golang.org/x/text/language","name":"scriptID.String"},{"pkg":"golang.org/x/text/language","name":"specializeRegion"},{"pkg":"golang.org/x/text/language","name":"strToInt"},{"pkg":"golang.org/x/text/language","name":"variantsSort.Len"},{"pkg":"golang.org/x/text/language","name":"variantsSort.Less"},{"pkg":"golang.org/x/text/language","name":"variantsSort.Swap"},{"pkg":"internal/abi","name":"IntArgRegBitmap.Get"},{"pkg":"internal/abi","name":"IntArgRegBitmap.Set"},{"pkg":"internal/abi","name":"RegArgs.IntRegArgAddr"},{"pkg":"internal/bytealg","name":"Compare"},{"pkg":"internal/bytealg","name":"Cutover"},{"pkg":"internal/bytealg","name":"Equal"},{"pkg":"internal/bytealg","name":"HashStr"},{"pkg":"internal/bytealg","name":"HashStrBytes"},{"pkg":"internal/bytealg","name":"Index"},{"pkg":"internal/bytealg","name":"IndexByte"},{"pkg":"internal/bytealg","name":"IndexByteString"},{"pkg":"internal/bytealg","name":"IndexRabinKarp"},{"pkg":"internal/bytealg","name":"IndexRabinKarpBytes"},{"pkg":"internal/bytealg","name":"IndexString"},{"pkg":"internal/bytealg","name":"init.0"},{"pkg":"internal/cpu","name":"Initialize"},{"pkg":"internal/cpu","name":"cpuid"},{"pkg":"internal/cpu","name":"doinit"},{"pkg":"internal/cpu","name":"getGOAMD64level"},{"pkg":"internal/cpu","name":"indexByte"},{"pkg":"internal/cpu","name":"isSet"},{"pkg":"internal/cpu","name":"processOptions"},{"pkg":"internal/cpu","name":"xgetbv"},{"pkg":"internal/fmtsort","name":"Sort"},{"pkg":"internal/fmtsort","name":"SortedMap.Len"},{"pkg":"internal/fmtsort","name":"SortedMap.Less"},{"pkg":"internal/fmtsort","name":"SortedMap.Swap"},{"pkg":"internal/fmtsort","name":"compare"},{"pkg":"internal/fmtsort","name":"floatCompare"},{"pkg":"internal/fmtsort","name":"isNaN"},{"pkg":"internal/fmtsort","name":"nilCompare"},{"pkg":"internal/itoa","name":"Itoa"},{"pkg":"internal/itoa","name":"Uitoa"},{"pkg":"internal/oserror","name":"init"},{"pkg":"internal/poll","name":"DeadlineExceededError.Error"},{"pkg":"internal/poll","name":"FD).Write.func1"},{"pkg":"internal/poll","name":"FD.Close"},{"pkg":"internal/poll","name":"FD.Init"},{"pkg":"internal/poll","name":"FD.Write"},{"pkg":"internal/poll","name":"FD.decref"},{"pkg":"internal/poll","name":"FD.destroy"},{"pkg":"internal/poll","name":"FD.writeLock"},{"pkg":"internal/poll","name":"FD.writeUnlock"},{"pkg":"internal/poll","name":"convertErr"},{"pkg":"internal/poll","name":"errClosing"},{"pkg":"internal/poll","name":"errNetClosing.Error"},{"pkg":"internal/poll","name":"errnoErr"},{"pkg":"internal/poll","name":"fdMutex.decref"},{"pkg":"internal/poll","name":"fdMutex.increfAndClose"},{"pkg":"internal/poll","name":"fdMutex.rwlock"},{"pkg":"internal/poll","name":"fdMutex.rwunlock"},{"pkg":"internal/poll","name":"ignoringEINTRIO"},{"pkg":"internal/poll","name":"init"},{"pkg":"internal/poll","name":"pollDesc.close"},{"pkg":"internal/poll","name":"pollDesc.evict"},{"pkg":"internal/poll","name":"pollDesc.init"},{"pkg":"internal/poll","name":"pollDesc.pollable"},{"pkg":"internal/poll","name":"pollDesc.prepare"},{"pkg":"internal/poll","name":"pollDesc.prepareWrite"},{"pkg":"internal/poll","name":"pollDesc.wait"},{"pkg":"internal/poll","name":"pollDesc.waitWrite"},{"pkg":"internal/poll","name":"runtime_Semacquire"},{"pkg":"internal/poll","name":"runtime_Semrelease"},{"pkg":"internal/poll","name":"runtime_pollClose"},{"pkg":"internal/poll","name":"runtime_pollOpen"},{"pkg":"internal/poll","name":"runtime_pollReset"},{"pkg":"internal/poll","name":"runtime_pollServerInit"},{"pkg":"internal/poll","name":"runtime_pollUnblock"},{"pkg":"internal/poll","name":"runtime_pollWait"},{"pkg":"internal/reflectlite","name":"Kind.String"},{"pkg":"internal/reflectlite","name":"Swapper"},{"pkg":"internal/reflectlite","name":"Swapper.func1"},{"pkg":"internal/reflectlite","name":"Swapper.func2"},{"pkg":"internal/reflectlite","name":"Swapper.func3"},{"pkg":"internal/reflectlite","name":"Swapper.func4"},{"pkg":"internal/reflectlite","name":"Swapper.func5"},{"pkg":"internal/reflectlite","name":"Swapper.func6"},{"pkg":"internal/reflectlite","name":"Swapper.func7"},{"pkg":"internal/reflectlite","name":"Swapper.func8"},{"pkg":"internal/reflectlite","name":"Swapper.func9"},{"pkg":"internal/reflectlite","name":"TypeOf"},{"pkg":"internal/reflectlite","name":"Value.Kind"},{"pkg":"internal/reflectlite","name":"Value.Len"},{"pkg":"internal/reflectlite","name":"Value.pointer"},{"pkg":"internal/reflectlite","name":"ValueError.Error"},{"pkg":"internal/reflectlite","name":"ValueOf"},{"pkg":"internal/reflectlite","name":"add"},{"pkg":"internal/reflectlite","name":"arrayAt"},{"pkg":"internal/reflectlite","name":"chanlen"},{"pkg":"internal/reflectlite","name":"escapes"},{"pkg":"internal/reflectlite","name":"flag.kind"},{"pkg":"internal/reflectlite","name":"ifaceIndir"},{"pkg":"internal/reflectlite","name":"interfaceType.NumMethod"},{"pkg":"internal/reflectlite","name":"maplen"},{"pkg":"internal/reflectlite","name":"name.data"},{"pkg":"internal/reflectlite","name":"name.name"},{"pkg":"internal/reflectlite","name":"name.readVarint"},{"pkg":"internal/reflectlite","name":"resolveNameOff"},{"pkg":"internal/reflectlite","name":"rtype.Elem"},{"pkg":"internal/reflectlite","name":"rtype.Kind"},{"pkg":"internal/reflectlite","name":"rtype.Len"},{"pkg":"internal/reflectlite","name":"rtype.Name"},{"pkg":"internal/reflectlite","name":"rtype.NumField"},{"pkg":"internal/reflectlite","name":"rtype.NumMethod"},{"pkg":"internal/reflectlite","name":"rtype.PkgPath"},{"pkg":"internal/reflectlite","name":"rtype.Size"},{"pkg":"internal/reflectlite","name":"rtype.String"},{"pkg":"internal/reflectlite","name":"rtype.exportedMethods"},{"pkg":"internal/reflectlite","name":"rtype.hasName"},{"pkg":"internal/reflectlite","name":"rtype.nameOff"},{"pkg":"internal/reflectlite","name":"rtype.pointers"},{"pkg":"internal/reflectlite","name":"rtype.uncommon"},{"pkg":"internal/reflectlite","name":"toType"},{"pkg":"internal/reflectlite","name":"typedmemmove"},{"pkg":"internal/reflectlite","name":"uncommonType.exportedMethods"},{"pkg":"internal/reflectlite","name":"unpackEface"},{"pkg":"internal/reflectlite","name":"unsafe_New"},{"pkg":"internal/safefilepath","name":"init"},{"pkg":"internal/syscall/unix","name":"IsNonblock"},{"pkg":"io","name":"init"},{"pkg":"io/fs","name":"PathError.Error"},{"pkg":"io/fs","name":"init"},{"pkg":"main","name":"main"},{"pkg":"math","name":"Abs"},{"pkg":"math","name":"Float32bits"},{"pkg":"math","name":"Float32frombits"},{"pkg":"math","name":"Float64bits"},{"pkg":"math","name":"Float64frombits"},{"pkg":"math","name":"Inf"},{"pkg":"math","name":"IsInf"},{"pkg":"math","name":"IsNaN"},{"pkg":"math","name":"NaN"},{"pkg":"math","name":"init"},{"pkg":"math/bits","name":"LeadingZeros64"},{"pkg":"math/bits","name":"TrailingZeros"},{"pkg":"os","name":"File.Name"},{"pkg":"os","name":"File.Write"},{"pkg":"os","name":"File.checkValid"},{"pkg":"os","name":"File.wrapErr"},{"pkg":"os","name":"File.write"},{"pkg":"os","name":"NewFile"},{"pkg":"os","name":"dirInfo.close"},{"pkg":"os","name":"epipecheck"},{"pkg":"os","name":"file.close"},{"pkg":"os","name":"glob..func1"},{"pkg":"os","name":"init"},{"pkg":"os","name":"init.0"},{"pkg":"os","name":"init.1"},{"pkg":"os","name":"newFile"},{"pkg":"os","name":"runtime_args"},{"pkg":"os","name":"sigpipe"},{"pkg":"os/signal","name":"signal_ignored"},{"pkg":"path","name":"init"},{"pkg":"reflect","name":"ChanDir.String"},{"pkg":"reflect","name":"Copy"},{"pkg":"reflect","name":"Kind.String"},{"pkg":"reflect","name":"MakeMap"},{"pkg":"reflect","name":"MakeMapWithSize"},{"pkg":"reflect","name":"MakeSlice"},{"pkg":"reflect","name":"MapIter.Key"},{"pkg":"reflect","name":"MapIter.Next"},{"pkg":"reflect","name":"MapIter.Value"},{"pkg":"reflect","name":"New"},{"pkg":"reflect","name":"PointerTo"},{"pkg":"reflect","name":"StructField.IsExported"},{"pkg":"reflect","name":"StructTag.Get"},{"pkg":"reflect","name":"StructTag.Lookup"},{"pkg":"reflect","name":"TypeOf"},{"pkg":"reflect","name":"Value.Addr"},{"pkg":"reflect","name":"Value.Bool"},{"pkg":"reflect","name":"Value.Bytes"},{"pkg":"reflect","name":"Value.CanAddr"},{"pkg":"reflect","name":"Value.CanInterface"},{"pkg":"reflect","name":"Value.CanSet"},{"pkg":"reflect","name":"Value.Cap"},{"pkg":"reflect","name":"Value.Complex"},{"pkg":"reflect","name":"Value.Convert"},{"pkg":"reflect","name":"Value.Elem"},{"pkg":"reflect","name":"Value.Field"},{"pkg":"reflect","name":"Value.Float"},{"pkg":"reflect","name":"Value.Index"},{"pkg":"reflect","name":"Value.Int"},{"pkg":"reflect","name":"Value.Interface"},{"pkg":"reflect","name":"Value.IsNil"},{"pkg":"reflect","name":"Value.IsValid"},{"pkg":"reflect","name":"Value.Kind"},{"pkg":"reflect","name":"Value.Len"},{"pkg":"reflect","name":"Value.MapRange"},{"pkg":"reflect","name":"Value.NumField"},{"pkg":"reflect","name":"Value.NumMethod"},{"pkg":"reflect","name":"Value.OverflowFloat"},{"pkg":"reflect","name":"Value.OverflowInt"},{"pkg":"reflect","name":"Value.OverflowUint"},{"pkg":"reflect","name":"Value.Pointer"},{"pkg":"reflect","name":"Value.Set"},{"pkg":"reflect","name":"Value.SetBool"},{"pkg":"reflect","name":"Value.SetBytes"},{"pkg":"reflect","name":"Value.SetFloat"},{"pkg":"reflect","name":"Value.SetInt"},{"pkg":"reflect","name":"Value.SetLen"},{"pkg":"reflect","name":"Value.SetMapIndex"},{"pkg":"reflect","name":"Value.SetString"},{"pkg":"reflect","name":"Value.SetUint"},{"pkg":"reflect","name":"Value.Slice"},{"pkg":"reflect","name":"Value.String"},{"pkg":"reflect","name":"Value.Type"},{"pkg":"reflect","name":"Value.Uint"},{"pkg":"reflect","name":"Value.UnsafePointer"},{"pkg":"reflect","name":"Value.assignTo"},{"pkg":"reflect","name":"Value.bytesSlow"},{"pkg":"reflect","name":"Value.lenNonSlice"},{"pkg":"reflect","name":"Value.panicNotBool"},{"pkg":"reflect","name":"Value.pointer"},{"pkg":"reflect","name":"Value.runes"},{"pkg":"reflect","name":"Value.setRunes"},{"pkg":"reflect","name":"Value.stringNonString"},{"pkg":"reflect","name":"Value.typeSlow"},{"pkg":"reflect","name":"ValueError.Error"},{"pkg":"reflect","name":"ValueOf"},{"pkg":"reflect","name":"Zero"},{"pkg":"reflect","name":"abiSeq.addArg"},{"pkg":"reflect","name":"abiSeq.addRcvr"},{"pkg":"reflect","name":"abiSeq.assignFloatN"},{"pkg":"reflect","name":"abiSeq.assignIntN"},{"pkg":"reflect","name":"abiSeq.regAssign"},{"pkg":"reflect","name":"abiSeq.stackAssign"},{"pkg":"reflect","name":"abiSeq.stepsForValue"},{"pkg":"reflect","name":"add"},{"pkg":"reflect","name":"addReflectOff"},{"pkg":"reflect","name":"addTypeBits"},{"pkg":"reflect","name":"align"},{"pkg":"reflect","name":"archFloat32ToReg"},{"pkg":"reflect","name":"arrayAt"},{"pkg":"reflect","name":"bitVector.append"},{"pkg":"reflect","name":"callMethod"},{"pkg":"reflect","name":"chanlen"},{"pkg":"reflect","name":"convertOp"},{"pkg":"reflect","name":"copyVal"},{"pkg":"reflect","name":"cvtBytesString"},{"pkg":"reflect","name":"cvtComplex"},{"pkg":"reflect","name":"cvtDirect"},{"pkg":"reflect","name":"cvtFloat"},{"pkg":"reflect","name":"cvtFloatInt"},{"pkg":"reflect","name":"cvtFloatUint"},{"pkg":"reflect","name":"cvtI2I"},{"pkg":"reflect","name":"cvtInt"},{"pkg":"reflect","name":"cvtIntFloat"},{"pkg":"reflect","name":"cvtIntString"},{"pkg":"reflect","name":"cvtRunesString"},{"pkg":"reflect","name":"cvtSliceArray"},{"pkg":"reflect","name":"cvtSliceArrayPtr"},{"pkg":"reflect","name":"cvtStringBytes"},{"pkg":"reflect","name":"cvtStringRunes"},{"pkg":"reflect","name":"cvtT2I"},{"pkg":"reflect","name":"cvtUint"},{"pkg":"reflect","name":"cvtUintFloat"},{"pkg":"reflect","name":"cvtUintString"},{"pkg":"reflect","name":"directlyAssignable"},{"pkg":"reflect","name":"escapes"},{"pkg":"reflect","name":"flag.kind"},{"pkg":"reflect","name":"flag.mustBe"},{"pkg":"reflect","name":"flag.mustBeAssignable"},{"pkg":"reflect","name":"flag.mustBeAssignableSlow"},{"pkg":"reflect","name":"flag.mustBeExported"},{"pkg":"reflect","name":"flag.mustBeExportedSlow"},{"pkg":"reflect","name":"flag.panicNotMap"},{"pkg":"reflect","name":"flag.ro"},{"pkg":"reflect","name":"floatFromReg"},{"pkg":"reflect","name":"floatToReg"},{"pkg":"reflect","name":"fnv1"},{"pkg":"reflect","name":"funcLayout"},{"pkg":"reflect","name":"funcLayout.func1"},{"pkg":"reflect","name":"funcType.Bits"},{"pkg":"reflect","name":"funcType.Elem"},{"pkg":"reflect","name":"funcType.Field"},{"pkg":"reflect","name":"funcType.Implements"},{"pkg":"reflect","name":"funcType.Key"},{"pkg":"reflect","name":"funcType.Kind"},{"pkg":"reflect","name":"funcType.Len"},{"pkg":"reflect","name":"funcType.Name"},{"pkg":"reflect","name":"funcType.NumField"},{"pkg":"reflect","name":"funcType.NumMethod"},{"pkg":"reflect","name":"funcType.PkgPath"},{"pkg":"reflect","name":"funcType.String"},{"pkg":"reflect","name":"funcType.common"},{"pkg":"reflect","name":"funcType.in"},{"pkg":"reflect","name":"funcType.out"},{"pkg":"reflect","name":"haveIdenticalType"},{"pkg":"reflect","name":"haveIdenticalUnderlyingType"},{"pkg":"reflect","name":"hiter.initialized"},{"pkg":"reflect","name":"ifaceE2I"},{"pkg":"reflect","name":"ifaceIndir"},{"pkg":"reflect","name":"implements"},{"pkg":"reflect","name":"init"},{"pkg":"reflect","name":"intFromReg"},{"pkg":"reflect","name":"intToReg"},{"pkg":"reflect","name":"interfaceType.NumMethod"},{"pkg":"reflect","name":"makeBytes"},{"pkg":"reflect","name":"makeComplex"},{"pkg":"reflect","name":"makeFloat"},{"pkg":"reflect","name":"makeFloat32"},{"pkg":"reflect","name":"makeInt"},{"pkg":"reflect","name":"makeMethodValue"},{"pkg":"reflect","name":"makeRunes"},{"pkg":"reflect","name":"makeString"},{"pkg":"reflect","name":"makemap"},{"pkg":"reflect","name":"mapassign"},{"pkg":"reflect","name":"mapassign_faststr"},{"pkg":"reflect","name":"mapdelete"},{"pkg":"reflect","name":"mapdelete_faststr"},{"pkg":"reflect","name":"mapiterelem"},{"pkg":"reflect","name":"mapiterinit"},{"pkg":"reflect","name":"mapiterkey"},{"pkg":"reflect","name":"mapiternext"},{"pkg":"reflect","name":"maplen"},{"pkg":"reflect","name":"memmove"},{"pkg":"reflect","name":"methodReceiver"},{"pkg":"reflect","name":"methodValueCall"},{"pkg":"reflect","name":"methodValueCallCodePtr"},{"pkg":"reflect","name":"moveMakeFuncArgPtrs"},{"pkg":"reflect","name":"name.data"},{"pkg":"reflect","name":"name.embedded"},{"pkg":"reflect","name":"name.hasTag"},{"pkg":"reflect","name":"name.isExported"},{"pkg":"reflect","name":"name.name"},{"pkg":"reflect","name":"name.pkgPath"},{"pkg":"reflect","name":"name.readVarint"},{"pkg":"reflect","name":"name.tag"},{"pkg":"reflect","name":"newAbiDesc"},{"pkg":"reflect","name":"newName"},{"pkg":"reflect","name":"overflowFloat32"},{"pkg":"reflect","name":"packEface"},{"pkg":"reflect","name":"ptrType.Bits"},{"pkg":"reflect","name":"ptrType.Elem"},{"pkg":"reflect","name":"ptrType.Field"},{"pkg":"reflect","name":"ptrType.Implements"},{"pkg":"reflect","name":"ptrType.Key"},{"pkg":"reflect","name":"ptrType.Kind"},{"pkg":"reflect","name":"ptrType.Len"},{"pkg":"reflect","name":"ptrType.Name"},{"pkg":"reflect","name":"ptrType.NumField"},{"pkg":"reflect","name":"ptrType.NumMethod"},{"pkg":"reflect","name":"ptrType.PkgPath"},{"pkg":"reflect","name":"ptrType.String"},{"pkg":"reflect","name":"ptrType.common"},{"pkg":"reflect","name":"resolveNameOff"},{"pkg":"reflect","name":"resolveReflectName"},{"pkg":"reflect","name":"resolveTextOff"},{"pkg":"reflect","name":"resolveTypeOff"},{"pkg":"reflect","name":"rtype.Bits"},{"pkg":"reflect","name":"rtype.ChanDir"},{"pkg":"reflect","name":"rtype.Elem"},{"pkg":"reflect","name":"rtype.Field"},{"pkg":"reflect","name":"rtype.Implements"},{"pkg":"reflect","name":"rtype.In"},{"pkg":"reflect","name":"rtype.Key"},{"pkg":"reflect","name":"rtype.Kind"},{"pkg":"reflect","name":"rtype.Len"},{"pkg":"reflect","name":"rtype.Name"},{"pkg":"reflect","name":"rtype.NumField"},{"pkg":"reflect","name":"rtype.NumIn"},{"pkg":"reflect","name":"rtype.NumMethod"},{"pkg":"reflect","name":"rtype.NumOut"},{"pkg":"reflect","name":"rtype.Out"},{"pkg":"reflect","name":"rtype.PkgPath"},{"pkg":"reflect","name":"rtype.Size"},{"pkg":"reflect","name":"rtype.String"},{"pkg":"reflect","name":"rtype.common"},{"pkg":"reflect","name":"rtype.exportedMethods"},{"pkg":"reflect","name":"rtype.hasName"},{"pkg":"reflect","name":"rtype.nameOff"},{"pkg":"reflect","name":"rtype.pointers"},{"pkg":"reflect","name":"rtype.ptrTo"},{"pkg":"reflect","name":"rtype.textOff"},{"pkg":"reflect","name":"rtype.typeOff"},{"pkg":"reflect","name":"rtype.uncommon"},{"pkg":"reflect","name":"rtypeOf"},{"pkg":"reflect","name":"rtypeOff"},{"pkg":"reflect","name":"specialChannelAssignability"},{"pkg":"reflect","name":"storeRcvr"},{"pkg":"reflect","name":"structField.embedded"},{"pkg":"reflect","name":"structType.Field"},{"pkg":"reflect","name":"toType"},{"pkg":"reflect","name":"typedmemclr"},{"pkg":"reflect","name":"typedmemmove"},{"pkg":"reflect","name":"typedslicecopy"},{"pkg":"reflect","name":"typelinks"},{"pkg":"reflect","name":"typesByString"},{"pkg":"reflect","name":"typesMustMatch"},{"pkg":"reflect","name":"uncommonType.exportedMethods"},{"pkg":"reflect","name":"uncommonType.methods"},{"pkg":"reflect","name":"unpackEface"},{"pkg":"reflect","name":"unsafe_New"},{"pkg":"reflect","name":"unsafe_NewArray"},{"pkg":"reflect","name":"valueInterface"},{"pkg":"reflect","name":"valueMethodName"},{"pkg":"reflect","name":"verifyNotInHeapPtr"},{"pkg":"reflect","name":"writeVarint"},{"pkg":"runtime","name":"Callers"},{"pkg":"runtime","name":"CallersFrames"},{"pkg":"runtime","name":"Frames.Next"},{"pkg":"runtime","name":"Func.Entry"},{"pkg":"runtime","name":"Func.startLine"},{"pkg":"runtime","name":"GOMAXPROCS"},{"pkg":"runtime","name":"Gosched"},{"pkg":"runtime","name":"SetFinalizer"},{"pkg":"runtime","name":"SetFinalizer.func1"},{"pkg":"runtime","name":"SetFinalizer.func2"},{"pkg":"runtime","name":"TypeAssertionError.Error"},{"pkg":"runtime","name":"_ELF_ST_BIND"},{"pkg":"runtime","name":"_ELF_ST_TYPE"},{"pkg":"runtime","name":"_ExternalCode"},{"pkg":"runtime","name":"_GC"},{"pkg":"runtime","name":"_LostExternalCode"},{"pkg":"runtime","name":"_LostSIGPROFDuringAtomic64"},{"pkg":"runtime","name":"_System"},{"pkg":"runtime","name":"_VDSO"},{"pkg":"runtime","name":"_func.funcInfo"},{"pkg":"runtime","name":"_func.isInlined"},{"pkg":"runtime","name":"_type.nameOff"},{"pkg":"runtime","name":"_type.pkgpath"},{"pkg":"runtime","name":"_type.string"},{"pkg":"runtime","name":"_type.textOff"},{"pkg":"runtime","name":"_type.typeOff"},{"pkg":"runtime","name":"_type.uncommon"},{"pkg":"runtime","name":"abort"},{"pkg":"runtime","name":"acquireSudog"},{"pkg":"runtime","name":"acquirem"},{"pkg":"runtime","name":"acquirep"},{"pkg":"runtime","name":"activeModules"},{"pkg":"runtime","name":"activeSweep.begin"},{"pkg":"runtime","name":"activeSweep.end"},{"pkg":"runtime","name":"activeSweep.isDone"},{"pkg":"runtime","name":"activeSweep.markDrained"},{"pkg":"runtime","name":"activeSweep.reset"},{"pkg":"runtime","name":"activeSweep.sweepers"},{"pkg":"runtime","name":"add"},{"pkg":"runtime","name":"add1"},{"pkg":"runtime","name":"addAdjustedTimers"},{"pkg":"runtime","name":"addOneOpenDeferFrame"},{"pkg":"runtime","name":"addOneOpenDeferFrame.func1"},{"pkg":"runtime","name":"addOneOpenDeferFrame.func1.1"},{"pkg":"runtime","name":"addb"},{"pkg":"runtime","name":"addfinalizer"},{"pkg":"runtime","name":"addrRange.contains"},{"pkg":"runtime","name":"addrRange.size"},{"pkg":"runtime","name":"addrRange.subtract"},{"pkg":"runtime","name":"addrRanges.add"},{"pkg":"runtime","name":"addrRanges.findAddrGreaterEqual"},{"pkg":"runtime","name":"addrRanges.findSucc"},{"pkg":"runtime","name":"addrRanges.init"},{"pkg":"runtime","name":"addrsToSummaryRange"},{"pkg":"runtime","name":"addspecial"},{"pkg":"runtime","name":"adjustSignalStack"},{"pkg":"runtime","name":"adjustctxt"},{"pkg":"runtime","name":"adjustdefers"},{"pkg":"runtime","name":"adjustframe"},{"pkg":"runtime","name":"adjustpanics"},{"pkg":"runtime","name":"adjustpointer"},{"pkg":"runtime","name":"adjustpointers"},{"pkg":"runtime","name":"adjustsudogs"},{"pkg":"runtime","name":"adjusttimers"},{"pkg":"runtime","name":"advanceEvacuationMark"},{"pkg":"runtime","name":"alginit"},{"pkg":"runtime","name":"alignDown"},{"pkg":"runtime","name":"alignUp"},{"pkg":"runtime","name":"allGsSnapshot"},{"pkg":"runtime","name":"allgadd"},{"pkg":"runtime","name":"allocm"},{"pkg":"runtime","name":"allocm.func1"},{"pkg":"runtime","name":"allocmcache"},{"pkg":"runtime","name":"allocmcache.func1"},{"pkg":"runtime","name":"appendIntStr"},{"pkg":"runtime","name":"arenaIndex"},{"pkg":"runtime","name":"args"},{"pkg":"runtime","name":"argv_index"},{"pkg":"runtime","name":"asmcgocall"},{"pkg":"runtime","name":"asminit"},{"pkg":"runtime","name":"assertE2I"},{"pkg":"runtime","name":"assertE2I2"},{"pkg":"runtime","name":"asyncPreempt"},{"pkg":"runtime","name":"asyncPreempt2"},{"pkg":"runtime","name":"atoi"},{"pkg":"runtime","name":"atoi32"},{"pkg":"runtime","name":"atoi64"},{"pkg":"runtime","name":"atomicAllG"},{"pkg":"runtime","name":"atomicAllGIndex"},{"pkg":"runtime","name":"atomicHeadTailIndex.cas"},{"pkg":"runtime","name":"atomicHeadTailIndex.incTail"},{"pkg":"runtime","name":"atomicHeadTailIndex.load"},{"pkg":"runtime","name":"atomicHeadTailIndex.reset"},{"pkg":"runtime","name":"atomicMSpanPointer.Load"},{"pkg":"runtime","name":"atomicMSpanPointer.StoreNoWB"},{"pkg":"runtime","name":"atomicOffAddr.Clear"},{"pkg":"runtime","name":"atomicOffAddr.Load"},{"pkg":"runtime","name":"atomicOffAddr.StoreMarked"},{"pkg":"runtime","name":"atomicOffAddr.StoreMin"},{"pkg":"runtime","name":"atomicOffAddr.StoreUnmark"},{"pkg":"runtime","name":"atomicSpanSetSpinePointer.Load"},{"pkg":"runtime","name":"atomicSpanSetSpinePointer.StoreNoWB"},{"pkg":"runtime","name":"atomicstorep"},{"pkg":"runtime","name":"atomicwb"},{"pkg":"runtime","name":"badPointer"},{"pkg":"runtime","name":"badTimer"},{"pkg":"runtime","name":"badctxt"},{"pkg":"runtime","name":"badmcall"},{"pkg":"runtime","name":"badmcall2"},{"pkg":"runtime","name":"badmorestackg0"},{"pkg":"runtime","name":"badmorestackgsignal"},{"pkg":"runtime","name":"badreflectcall"},{"pkg":"runtime","name":"badsignal"},{"pkg":"runtime","name":"badsystemstack"},{"pkg":"runtime","name":"badunlockosthread"},{"pkg":"runtime","name":"bgscavenge"},{"pkg":"runtime","name":"bgsweep"},{"pkg":"runtime","name":"binarySearchTree"},{"pkg":"runtime","name":"blockAlignSummaryRange"},{"pkg":"runtime","name":"blockableSig"},{"pkg":"runtime","name":"blockevent"},{"pkg":"runtime","name":"blocksampled"},{"pkg":"runtime","name":"bmap.keys"},{"pkg":"runtime","name":"bmap.overflow"},{"pkg":"runtime","name":"bmap.setoverflow"},{"pkg":"runtime","name":"bool2int"},{"pkg":"runtime","name":"boundsError.Error"},{"pkg":"runtime","name":"bucket.bp"},{"pkg":"runtime","name":"bucket.mp"},{"pkg":"runtime","name":"bucket.stk"},{"pkg":"runtime","name":"bucketEvacuated"},{"pkg":"runtime","name":"bucketMask"},{"pkg":"runtime","name":"bucketShift"},{"pkg":"runtime","name":"bulkBarrierBitmap"},{"pkg":"runtime","name":"bulkBarrierPreWrite"},{"pkg":"runtime","name":"bulkBarrierPreWriteSrcOnly"},{"pkg":"runtime","name":"bytes"},{"pkg":"runtime","name":"c128equal"},{"pkg":"runtime","name":"c128hash"},{"pkg":"runtime","name":"c64equal"},{"pkg":"runtime","name":"c64hash"},{"pkg":"runtime","name":"call1024"},{"pkg":"runtime","name":"call1048576"},{"pkg":"runtime","name":"call1073741824"},{"pkg":"runtime","name":"call128"},{"pkg":"runtime","name":"call131072"},{"pkg":"runtime","name":"call134217728"},{"pkg":"runtime","name":"call16"},{"pkg":"runtime","name":"call16384"},{"pkg":"runtime","name":"call16777216"},{"pkg":"runtime","name":"call2048"},{"pkg":"runtime","name":"call2097152"},{"pkg":"runtime","name":"call256"},{"pkg":"runtime","name":"call262144"},{"pkg":"runtime","name":"call268435456"},{"pkg":"runtime","name":"call32"},{"pkg":"runtime","name":"call32768"},{"pkg":"runtime","name":"call33554432"},{"pkg":"runtime","name":"call4096"},{"pkg":"runtime","name":"call4194304"},{"pkg":"runtime","name":"call512"},{"pkg":"runtime","name":"call524288"},{"pkg":"runtime","name":"call536870912"},{"pkg":"runtime","name":"call64"},{"pkg":"runtime","name":"call65536"},{"pkg":"runtime","name":"call67108864"},{"pkg":"runtime","name":"call8192"},{"pkg":"runtime","name":"call8388608"},{"pkg":"runtime","name":"callCgoMmap"},{"pkg":"runtime","name":"callCgoMunmap"},{"pkg":"runtime","name":"callCgoSigaction"},{"pkg":"runtime","name":"callCgoSymbolizer"},{"pkg":"runtime","name":"callers"},{"pkg":"runtime","name":"callers.func1"},{"pkg":"runtime","name":"canPreemptM"},{"pkg":"runtime","name":"canpanic"},{"pkg":"runtime","name":"cansemacquire"},{"pkg":"runtime","name":"casGFromPreempted"},{"pkg":"runtime","name":"casGToPreemptScan"},{"pkg":"runtime","name":"casGToWaiting"},{"pkg":"runtime","name":"casfrom_Gscanstatus"},{"pkg":"runtime","name":"casgstatus"},{"pkg":"runtime","name":"casgstatus.func1"},{"pkg":"runtime","name":"castogscanstatus"},{"pkg":"runtime","name":"cfuncname"},{"pkg":"runtime","name":"cfuncnameFromNameOff"},{"pkg":"runtime","name":"cgoCheckBits"},{"pkg":"runtime","name":"cgoCheckMemmove"},{"pkg":"runtime","name":"cgoCheckSliceCopy"},{"pkg":"runtime","name":"cgoCheckTypedBlock"},{"pkg":"runtime","name":"cgoCheckTypedBlock.func1"},{"pkg":"runtime","name":"cgoCheckUsingType"},{"pkg":"runtime","name":"cgoCheckWriteBarrier"},{"pkg":"runtime","name":"cgoCheckWriteBarrier.func1"},{"pkg":"runtime","name":"cgoContextPCs"},{"pkg":"runtime","name":"cgoInRange"},{"pkg":"runtime","name":"cgoIsGoPointer"},{"pkg":"runtime","name":"cgoSigtramp"},{"pkg":"runtime","name":"cgocall"},{"pkg":"runtime","name":"chanbuf"},{"pkg":"runtime","name":"chanparkcommit"},{"pkg":"runtime","name":"chanrecv"},{"pkg":"runtime","name":"chanrecv.func1"},{"pkg":"runtime","name":"chanrecv1"},{"pkg":"runtime","name":"chansend"},{"pkg":"runtime","name":"chansend.func1"},{"pkg":"runtime","name":"chansend1"},{"pkg":"runtime","name":"check"},{"pkg":"runtime","name":"checkASM"},{"pkg":"runtime","name":"checkIdleGCNoP"},{"pkg":"runtime","name":"checkRunqsNoP"},{"pkg":"runtime","name":"checkTimers"},{"pkg":"runtime","name":"checkTimersNoP"},{"pkg":"runtime","name":"checkdead"},{"pkg":"runtime","name":"checkdead.func1"},{"pkg":"runtime","name":"checkmcount"},{"pkg":"runtime","name":"chunkBase"},{"pkg":"runtime","name":"chunkIdx.l1"},{"pkg":"runtime","name":"chunkIdx.l2"},{"pkg":"runtime","name":"chunkIndex"},{"pkg":"runtime","name":"chunkPageIndex"},{"pkg":"runtime","name":"clearDeletedTimers"},{"pkg":"runtime","name":"clearpools"},{"pkg":"runtime","name":"clobberfree"},{"pkg":"runtime","name":"clone"},{"pkg":"runtime","name":"closechan"},{"pkg":"runtime","name":"closefd"},{"pkg":"runtime","name":"cmpstring"},{"pkg":"runtime","name":"concatstring2"},{"pkg":"runtime","name":"concatstring3"},{"pkg":"runtime","name":"concatstring4"},{"pkg":"runtime","name":"concatstring5"},{"pkg":"runtime","name":"concatstrings"},{"pkg":"runtime","name":"consistentHeapStats.acquire"},{"pkg":"runtime","name":"consistentHeapStats.release"},{"pkg":"runtime","name":"convT"},{"pkg":"runtime","name":"convT64"},{"pkg":"runtime","name":"convTnoptr"},{"pkg":"runtime","name":"convTslice"},{"pkg":"runtime","name":"convTstring"},{"pkg":"runtime","name":"copystack"},{"pkg":"runtime","name":"countSub"},{"pkg":"runtime","name":"cpuProfile.add"},{"pkg":"runtime","name":"cpuProfile.addExtra"},{"pkg":"runtime","name":"cpuProfile.addNonGo"},{"pkg":"runtime","name":"cpuinit"},{"pkg":"runtime","name":"cputicks"},{"pkg":"runtime","name":"crash"},{"pkg":"runtime","name":"createfing"},{"pkg":"runtime","name":"debugCallCheck"},{"pkg":"runtime","name":"debugCallCheck.func1"},{"pkg":"runtime","name":"debugCallPanicked"},{"pkg":"runtime","name":"debugCallV2"},{"pkg":"runtime","name":"debugCallWrap"},{"pkg":"runtime","name":"debugCallWrap.func1"},{"pkg":"runtime","name":"debugCallWrap.func2"},{"pkg":"runtime","name":"debugCallWrap1"},{"pkg":"runtime","name":"debugCallWrap1.func1"},{"pkg":"runtime","name":"debugCallWrap2"},{"pkg":"runtime","name":"debugCallWrap2.func1"},{"pkg":"runtime","name":"decoderune"},{"pkg":"runtime","name":"deductAssistCredit"},{"pkg":"runtime","name":"deductSweepCredit"},{"pkg":"runtime","name":"deferCallSave"},{"pkg":"runtime","name":"deferprocStack"},{"pkg":"runtime","name":"deferreturn"},{"pkg":"runtime","name":"deltimer"},{"pkg":"runtime","name":"dematerializeGCProg"},{"pkg":"runtime","name":"dieFromSignal"},{"pkg":"runtime","name":"divRoundUp"},{"pkg":"runtime","name":"doInit"},{"pkg":"runtime","name":"doRecordGoroutineProfile"},{"pkg":"runtime","name":"doRecordGoroutineProfile.func1"},{"pkg":"runtime","name":"doSigPreempt"},{"pkg":"runtime","name":"doaddtimer"},{"pkg":"runtime","name":"dodeltimer"},{"pkg":"runtime","name":"dodeltimer0"},{"pkg":"runtime","name":"dolockOSThread"},{"pkg":"runtime","name":"dopanic_m"},{"pkg":"runtime","name":"dounlockOSThread"},{"pkg":"runtime","name":"dropg"},{"pkg":"runtime","name":"dropm"},{"pkg":"runtime","name":"duffcopy"},{"pkg":"runtime","name":"duffzero"},{"pkg":"runtime","name":"dumpgstatus"},{"pkg":"runtime","name":"dumpregs"},{"pkg":"runtime","name":"efaceeq"},{"pkg":"runtime","name":"elideWrapperCalling"},{"pkg":"runtime","name":"empty"},{"pkg":"runtime","name":"encoderune"},{"pkg":"runtime","name":"endCheckmarks"},{"pkg":"runtime","name":"entersyscall"},{"pkg":"runtime","name":"entersyscall_gcwait"},{"pkg":"runtime","name":"entersyscall_sysmon"},{"pkg":"runtime","name":"entersyscallblock"},{"pkg":"runtime","name":"entersyscallblock.func1"},{"pkg":"runtime","name":"entersyscallblock.func2"},{"pkg":"runtime","name":"entersyscallblock_handoff"},{"pkg":"runtime","name":"envKeyEqual"},{"pkg":"runtime","name":"eqslice"},{"pkg":"runtime","name":"errorAddressString.Error"},{"pkg":"runtime","name":"errorString.Error"},{"pkg":"runtime","name":"evacuate"},{"pkg":"runtime","name":"evacuate_fast32"},{"pkg":"runtime","name":"evacuate_fast64"},{"pkg":"runtime","name":"evacuate_faststr"},{"pkg":"runtime","name":"evacuated"},{"pkg":"runtime","name":"execute"},{"pkg":"runtime","name":"exit"},{"pkg":"runtime","name":"exitThread"},{"pkg":"runtime","name":"exitsyscall"},{"pkg":"runtime","name":"exitsyscall.func1"},{"pkg":"runtime","name":"exitsyscall0"},{"pkg":"runtime","name":"exitsyscallfast"},{"pkg":"runtime","name":"exitsyscallfast.func1"},{"pkg":"runtime","name":"exitsyscallfast_pidle"},{"pkg":"runtime","name":"exitsyscallfast_reacquired"},{"pkg":"runtime","name":"exitsyscallfast_reacquired.func1"},{"pkg":"runtime","name":"expandCgoFrames"},{"pkg":"runtime","name":"extendRandom"},{"pkg":"runtime","name":"f32equal"},{"pkg":"runtime","name":"f32hash"},{"pkg":"runtime","name":"f64equal"},{"pkg":"runtime","name":"f64hash"},{"pkg":"runtime","name":"fastexprand"},{"pkg":"runtime","name":"fastlog2"},{"pkg":"runtime","name":"fastrand"},{"pkg":"runtime","name":"fastrand64"},{"pkg":"runtime","name":"fastrandinit"},{"pkg":"runtime","name":"fastrandn"},{"pkg":"runtime","name":"fatal"},{"pkg":"runtime","name":"fatal.func1"},{"pkg":"runtime","name":"fatalpanic"},{"pkg":"runtime","name":"fatalpanic.func1"},{"pkg":"runtime","name":"fatalpanic.func2"},{"pkg":"runtime","name":"fatalthrow"},{"pkg":"runtime","name":"fatalthrow.func1"},{"pkg":"runtime","name":"fillAligned"},{"pkg":"runtime","name":"fillAligned.func1"},{"pkg":"runtime","name":"finalizercommit"},{"pkg":"runtime","name":"findBitRange64"},{"pkg":"runtime","name":"findObject"},{"pkg":"runtime","name":"findRunnable"},{"pkg":"runtime","name":"findfunc"},{"pkg":"runtime","name":"findmoduledatap"},{"pkg":"runtime","name":"findnull"},{"pkg":"runtime","name":"findsghi"},{"pkg":"runtime","name":"finishsweep_m"},{"pkg":"runtime","name":"fixalloc.alloc"},{"pkg":"runtime","name":"fixalloc.free"},{"pkg":"runtime","name":"fixalloc.init"},{"pkg":"runtime","name":"float64bits"},{"pkg":"runtime","name":"fmtNSAsMS"},{"pkg":"runtime","name":"forEachG"},{"pkg":"runtime","name":"forEachGRace"},{"pkg":"runtime","name":"forEachP"},{"pkg":"runtime","name":"forcegchelper"},{"pkg":"runtime","name":"freeSomeWbufs"},{"pkg":"runtime","name":"freeSomeWbufs.func1"},{"pkg":"runtime","name":"freeSpecial"},{"pkg":"runtime","name":"freeStackSpans"},{"pkg":"runtime","name":"freedefer"},{"pkg":"runtime","name":"freedeferfn"},{"pkg":"runtime","name":"freedeferpanic"},{"pkg":"runtime","name":"freemcache"},{"pkg":"runtime","name":"freemcache.func1"},{"pkg":"runtime","name":"freezetheworld"},{"pkg":"runtime","name":"full"},{"pkg":"runtime","name":"funcInfo.entry"},{"pkg":"runtime","name":"funcInfo.valid"},{"pkg":"runtime","name":"funcMaxSPDelta"},{"pkg":"runtime","name":"funcdata"},{"pkg":"runtime","name":"funcfile"},{"pkg":"runtime","name":"funcline"},{"pkg":"runtime","name":"funcline1"},{"pkg":"runtime","name":"funcname"},{"pkg":"runtime","name":"funcnameFromNameOff"},{"pkg":"runtime","name":"funcpkgpath"},{"pkg":"runtime","name":"funcspdelta"},{"pkg":"runtime","name":"functype.dotdotdot"},{"pkg":"runtime","name":"functype.in"},{"pkg":"runtime","name":"functype.out"},{"pkg":"runtime","name":"futex"},{"pkg":"runtime","name":"futexsleep"},{"pkg":"runtime","name":"futexwakeup"},{"pkg":"runtime","name":"futexwakeup.func1"},{"pkg":"runtime","name":"gList.empty"},{"pkg":"runtime","name":"gList.pop"},{"pkg":"runtime","name":"gList.push"},{"pkg":"runtime","name":"gList.pushAll"},{"pkg":"runtime","name":"gQueue.empty"},{"pkg":"runtime","name":"gQueue.pop"},{"pkg":"runtime","name":"gQueue.popList"},{"pkg":"runtime","name":"gQueue.push"},{"pkg":"runtime","name":"gQueue.pushBack"},{"pkg":"runtime","name":"gQueue.pushBackAll"},{"pkg":"runtime","name":"gcAssistAlloc"},{"pkg":"runtime","name":"gcAssistAlloc.func1"},{"pkg":"runtime","name":"gcAssistAlloc1"},{"pkg":"runtime","name":"gcBgMarkPrepare"},{"pkg":"runtime","name":"gcBgMarkStartWorkers"},{"pkg":"runtime","name":"gcBgMarkWorker"},{"pkg":"runtime","name":"gcBgMarkWorker.func1"},{"pkg":"runtime","name":"gcBgMarkWorker.func2"},{"pkg":"runtime","name":"gcBits.bitp"},{"pkg":"runtime","name":"gcBits.bytep"},{"pkg":"runtime","name":"gcBitsArena.tryAlloc"},{"pkg":"runtime","name":"gcCPULimiterState.accumulate"},{"pkg":"runtime","name":"gcCPULimiterState.addAssistTime"},{"pkg":"runtime","name":"gcCPULimiterState.addIdleTime"},{"pkg":"runtime","name":"gcCPULimiterState.finishGCTransition"},{"pkg":"runtime","name":"gcCPULimiterState.limiting"},{"pkg":"runtime","name":"gcCPULimiterState.needUpdate"},{"pkg":"runtime","name":"gcCPULimiterState.resetCapacity"},{"pkg":"runtime","name":"gcCPULimiterState.startGCTransition"},{"pkg":"runtime","name":"gcCPULimiterState.tryLock"},{"pkg":"runtime","name":"gcCPULimiterState.unlock"},{"pkg":"runtime","name":"gcCPULimiterState.update"},{"pkg":"runtime","name":"gcCPULimiterState.updateLocked"},{"pkg":"runtime","name":"gcComputeStartingStackSize"},{"pkg":"runtime","name":"gcControllerCommit"},{"pkg":"runtime","name":"gcControllerState).findRunnableGCWorker.func1"},{"pkg":"runtime","name":"gcControllerState.addGlobals"},{"pkg":"runtime","name":"gcControllerState.addIdleMarkWorker"},{"pkg":"runtime","name":"gcControllerState.addScannableStack"},{"pkg":"runtime","name":"gcControllerState.commit"},{"pkg":"runtime","name":"gcControllerState.endCycle"},{"pkg":"runtime","name":"gcControllerState.enlistWorker"},{"pkg":"runtime","name":"gcControllerState.findRunnableGCWorker"},{"pkg":"runtime","name":"gcControllerState.heapGoal"},{"pkg":"runtime","name":"gcControllerState.heapGoalInternal"},{"pkg":"runtime","name":"gcControllerState.init"},{"pkg":"runtime","name":"gcControllerState.markWorkerStop"},{"pkg":"runtime","name":"gcControllerState.memoryLimitHeapGoal"},{"pkg":"runtime","name":"gcControllerState.needIdleMarkWorker"},{"pkg":"runtime","name":"gcControllerState.removeIdleMarkWorker"},{"pkg":"runtime","name":"gcControllerState.resetLive"},{"pkg":"runtime","name":"gcControllerState.revise"},{"pkg":"runtime","name":"gcControllerState.setGCPercent"},{"pkg":"runtime","name":"gcControllerState.setMaxIdleMarkWorkers"},{"pkg":"runtime","name":"gcControllerState.setMemoryLimit"},{"pkg":"runtime","name":"gcControllerState.startCycle"},{"pkg":"runtime","name":"gcControllerState.trigger"},{"pkg":"runtime","name":"gcControllerState.update"},{"pkg":"runtime","name":"gcDrain"},{"pkg":"runtime","name":"gcDrainN"},{"pkg":"runtime","name":"gcDumpObject"},{"pkg":"runtime","name":"gcFlushBgCredit"},{"pkg":"runtime","name":"gcMark"},{"pkg":"runtime","name":"gcMarkDone"},{"pkg":"runtime","name":"gcMarkDone.func1"},{"pkg":"runtime","name":"gcMarkDone.func1.1"},{"pkg":"runtime","name":"gcMarkDone.func2"},{"pkg":"runtime","name":"gcMarkDone.func3"},{"pkg":"runtime","name":"gcMarkRootCheck"},{"pkg":"runtime","name":"gcMarkRootCheck.func1"},{"pkg":"runtime","name":"gcMarkRootPrepare"},{"pkg":"runtime","name":"gcMarkRootPrepare.func1"},{"pkg":"runtime","name":"gcMarkTermination"},{"pkg":"runtime","name":"gcMarkTermination.func1"},{"pkg":"runtime","name":"gcMarkTermination.func2"},{"pkg":"runtime","name":"gcMarkTermination.func3"},{"pkg":"runtime","name":"gcMarkTermination.func4"},{"pkg":"runtime","name":"gcMarkTermination.func4.1"},{"pkg":"runtime","name":"gcMarkTinyAllocs"},{"pkg":"runtime","name":"gcMarkWorkAvailable"},{"pkg":"runtime","name":"gcPaceScavenger"},{"pkg":"runtime","name":"gcPaceSweeper"},{"pkg":"runtime","name":"gcParkAssist"},{"pkg":"runtime","name":"gcResetMarkState"},{"pkg":"runtime","name":"gcResetMarkState.func1"},{"pkg":"runtime","name":"gcStart"},{"pkg":"runtime","name":"gcStart.func1"},{"pkg":"runtime","name":"gcStart.func2"},{"pkg":"runtime","name":"gcSweep"},{"pkg":"runtime","name":"gcTrigger.test"},{"pkg":"runtime","name":"gcWakeAllAssists"},{"pkg":"runtime","name":"gcWork.balance"},{"pkg":"runtime","name":"gcWork.dispose"},{"pkg":"runtime","name":"gcWork.empty"},{"pkg":"runtime","name":"gcWork.init"},{"pkg":"runtime","name":"gcWork.put"},{"pkg":"runtime","name":"gcWork.putBatch"},{"pkg":"runtime","name":"gcWork.putFast"},{"pkg":"runtime","name":"gcWork.tryGet"},{"pkg":"runtime","name":"gcWork.tryGetFast"},{"pkg":"runtime","name":"gcWriteBarrier"},{"pkg":"runtime","name":"gcWriteBarrierBX"},{"pkg":"runtime","name":"gcWriteBarrierCX"},{"pkg":"runtime","name":"gcWriteBarrierDX"},{"pkg":"runtime","name":"gcWriteBarrierR8"},{"pkg":"runtime","name":"gcWriteBarrierR9"},{"pkg":"runtime","name":"gcWriteBarrierSI"},{"pkg":"runtime","name":"gcallers"},{"pkg":"runtime","name":"gcd"},{"pkg":"runtime","name":"gcenable"},{"pkg":"runtime","name":"gcenable.func1"},{"pkg":"runtime","name":"gcenable.func2"},{"pkg":"runtime","name":"gcinit"},{"pkg":"runtime","name":"gclinkptr.ptr"},{"pkg":"runtime","name":"gcmarknewobject"},{"pkg":"runtime","name":"gcstopm"},{"pkg":"runtime","name":"gentraceback"},{"pkg":"runtime","name":"getGodebugEarly"},{"pkg":"runtime","name":"getHugePageSize"},{"pkg":"runtime","name":"getMCache"},{"pkg":"runtime","name":"getRandomData"},{"pkg":"runtime","name":"getargp"},{"pkg":"runtime","name":"getempty"},{"pkg":"runtime","name":"getempty.func1"},{"pkg":"runtime","name":"getitab"},{"pkg":"runtime","name":"getpid"},{"pkg":"runtime","name":"getproccount"},{"pkg":"runtime","name":"getsig"},{"pkg":"runtime","name":"gettid"},{"pkg":"runtime","name":"gfget"},{"pkg":"runtime","name":"gfget.func1"},{"pkg":"runtime","name":"gfget.func2"},{"pkg":"runtime","name":"gfpurge"},{"pkg":"runtime","name":"gfput"},{"pkg":"runtime","name":"globrunqget"},{"pkg":"runtime","name":"globrunqput"},{"pkg":"runtime","name":"globrunqputbatch"},{"pkg":"runtime","name":"globrunqputhead"},{"pkg":"runtime","name":"goPanicIndex"},{"pkg":"runtime","name":"goPanicIndexU"},{"pkg":"runtime","name":"goPanicSlice3Alen"},{"pkg":"runtime","name":"goPanicSlice3AlenU"},{"pkg":"runtime","name":"goPanicSlice3C"},{"pkg":"runtime","name":"goPanicSliceAcap"},{"pkg":"runtime","name":"goPanicSliceAcapU"},{"pkg":"runtime","name":"goPanicSliceAlen"},{"pkg":"runtime","name":"goPanicSliceAlenU"},{"pkg":"runtime","name":"goPanicSliceB"},{"pkg":"runtime","name":"goPanicSliceBU"},{"pkg":"runtime","name":"goargs"},{"pkg":"runtime","name":"goenvs"},{"pkg":"runtime","name":"goenvs_unix"},{"pkg":"runtime","name":"goexit"},{"pkg":"runtime","name":"goexit0"},{"pkg":"runtime","name":"goexit1"},{"pkg":"runtime","name":"gogetenv"},{"pkg":"runtime","name":"gogo"},{"pkg":"runtime","name":"gopanic"},{"pkg":"runtime","name":"gopark"},{"pkg":"runtime","name":"goparkunlock"},{"pkg":"runtime","name":"gopreempt_m"},{"pkg":"runtime","name":"goready"},{"pkg":"runtime","name":"goready.func1"},{"pkg":"runtime","name":"gorecover"},{"pkg":"runtime","name":"goroutineProfileStateHolder.CompareAndSwap"},{"pkg":"runtime","name":"goroutineProfileStateHolder.Load"},{"pkg":"runtime","name":"goroutineProfileStateHolder.Store"},{"pkg":"runtime","name":"goroutineheader"},{"pkg":"runtime","name":"goschedIfBusy"},{"pkg":"runtime","name":"goschedImpl"},{"pkg":"runtime","name":"gosched_m"},{"pkg":"runtime","name":"goschedguarded"},{"pkg":"runtime","name":"goschedguarded_m"},{"pkg":"runtime","name":"gostartcall"},{"pkg":"runtime","name":"gostartcallfn"},{"pkg":"runtime","name":"gostring"},{"pkg":"runtime","name":"gostringnocopy"},{"pkg":"runtime","name":"gotraceback"},{"pkg":"runtime","name":"goyield"},{"pkg":"runtime","name":"goyield_m"},{"pkg":"runtime","name":"greyobject"},{"pkg":"runtime","name":"growWork"},{"pkg":"runtime","name":"growWork_fast32"},{"pkg":"runtime","name":"growWork_fast64"},{"pkg":"runtime","name":"growWork_faststr"},{"pkg":"runtime","name":"growslice"},{"pkg":"runtime","name":"guintptr.cas"},{"pkg":"runtime","name":"guintptr.ptr"},{"pkg":"runtime","name":"guintptr.set"},{"pkg":"runtime","name":"gwrite"},{"pkg":"runtime","name":"handoff"},{"pkg":"runtime","name":"handoffp"},{"pkg":"runtime","name":"hasPrefix"},{"pkg":"runtime","name":"hashGrow"},{"pkg":"runtime","name":"hchan.raceaddr"},{"pkg":"runtime","name":"headTailIndex.head"},{"pkg":"runtime","name":"headTailIndex.split"},{"pkg":"runtime","name":"heapBits.next"},{"pkg":"runtime","name":"heapBits.nextFast"},{"pkg":"runtime","name":"heapBitsForAddr"},{"pkg":"runtime","name":"heapBitsSetType"},{"pkg":"runtime","name":"heapRetained"},{"pkg":"runtime","name":"hexdumpWords"},{"pkg":"runtime","name":"hmap.createOverflow"},{"pkg":"runtime","name":"hmap.growing"},{"pkg":"runtime","name":"hmap.incrnoverflow"},{"pkg":"runtime","name":"hmap.newoverflow"},{"pkg":"runtime","name":"hmap.noldbuckets"},{"pkg":"runtime","name":"hmap.oldbucketmask"},{"pkg":"runtime","name":"hmap.sameSizeGrow"},{"pkg":"runtime","name":"ifaceeq"},{"pkg":"runtime","name":"inHeapOrStack"},{"pkg":"runtime","name":"inPersistentAlloc"},{"pkg":"runtime","name":"inUserArenaChunk"},{"pkg":"runtime","name":"inVDSOPage"},{"pkg":"runtime","name":"incidlelocked"},{"pkg":"runtime","name":"init"},{"pkg":"runtime","name":"init.0"},{"pkg":"runtime","name":"init.1"},{"pkg":"runtime","name":"init.4"},{"pkg":"runtime","name":"init.5"},{"pkg":"runtime","name":"init.6"},{"pkg":"runtime","name":"initAlgAES"},{"pkg":"runtime","name":"initsig"},{"pkg":"runtime","name":"injectglist"},{"pkg":"runtime","name":"injectglist.func1"},{"pkg":"runtime","name":"int64Hash"},{"pkg":"runtime","name":"interequal"},{"pkg":"runtime","name":"interhash"},{"pkg":"runtime","name":"intstring"},{"pkg":"runtime","name":"isAbortPC"},{"pkg":"runtime","name":"isAsyncSafePoint"},{"pkg":"runtime","name":"isDirectIface"},{"pkg":"runtime","name":"isEmpty"},{"pkg":"runtime","name":"isExportedRuntime"},{"pkg":"runtime","name":"isFinite"},{"pkg":"runtime","name":"isInf"},{"pkg":"runtime","name":"isNaN"},{"pkg":"runtime","name":"isPowerOfTwo"},{"pkg":"runtime","name":"isShrinkStackSafe"},{"pkg":"runtime","name":"isSweepDone"},{"pkg":"runtime","name":"isSystemGoroutine"},{"pkg":"runtime","name":"itab.init"},{"pkg":"runtime","name":"itabAdd"},{"pkg":"runtime","name":"itabHashFunc"},{"pkg":"runtime","name":"itabTableType.add"},{"pkg":"runtime","name":"itabTableType.add-fm"},{"pkg":"runtime","name":"itabTableType.find"},{"pkg":"runtime","name":"itabsinit"},{"pkg":"runtime","name":"iterate_itabs"},{"pkg":"runtime","name":"itoa"},{"pkg":"runtime","name":"itoaDiv"},{"pkg":"runtime","name":"levelIndexToOffAddr"},{"pkg":"runtime","name":"lfnodeValidate"},{"pkg":"runtime","name":"lfstack.empty"},{"pkg":"runtime","name":"lfstack.pop"},{"pkg":"runtime","name":"lfstack.push"},{"pkg":"runtime","name":"lfstackPack"},{"pkg":"runtime","name":"lfstackUnpack"},{"pkg":"runtime","name":"limiterEvent.consume"},{"pkg":"runtime","name":"limiterEvent.start"},{"pkg":"runtime","name":"limiterEvent.stop"},{"pkg":"runtime","name":"limiterEventStamp.duration"},{"pkg":"runtime","name":"limiterEventStamp.typ"},{"pkg":"runtime","name":"linearAlloc.alloc"},{"pkg":"runtime","name":"lock"},{"pkg":"runtime","name":"lock2"},{"pkg":"runtime","name":"lockOSThread"},{"pkg":"runtime","name":"lockRank.String"},{"pkg":"runtime","name":"lockRankMayTraceFlush"},{"pkg":"runtime","name":"lockWithRank"},{"pkg":"runtime","name":"lockextra"},{"pkg":"runtime","name":"m.becomeSpinning"},{"pkg":"runtime","name":"mPark"},{"pkg":"runtime","name":"mProfCycleHolder.increment"},{"pkg":"runtime","name":"mProfCycleHolder.read"},{"pkg":"runtime","name":"mProfCycleHolder.setFlushed"},{"pkg":"runtime","name":"mProf_Flush"},{"pkg":"runtime","name":"mProf_FlushLocked"},{"pkg":"runtime","name":"mProf_Free"},{"pkg":"runtime","name":"mProf_Malloc"},{"pkg":"runtime","name":"mProf_Malloc.func1"},{"pkg":"runtime","name":"mProf_NextCycle"},{"pkg":"runtime","name":"mReserveID"},{"pkg":"runtime","name":"mSpanList.init"},{"pkg":"runtime","name":"mSpanList.insert"},{"pkg":"runtime","name":"mSpanList.isEmpty"},{"pkg":"runtime","name":"mSpanList.remove"},{"pkg":"runtime","name":"mSpanList.takeAll"},{"pkg":"runtime","name":"mSpanStateBox.get"},{"pkg":"runtime","name":"mSpanStateBox.set"},{"pkg":"runtime","name":"madvise"},{"pkg":"runtime","name":"main"},{"pkg":"runtime","name":"main.func1"},{"pkg":"runtime","name":"main.func2"},{"pkg":"runtime","name":"makeAddrRange"},{"pkg":"runtime","name":"makeBucketArray"},{"pkg":"runtime","name":"makeHeadTailIndex"},{"pkg":"runtime","name":"makeLimiterEventStamp"},{"pkg":"runtime","name":"makeSpanClass"},{"pkg":"runtime","name":"makechan"},{"pkg":"runtime","name":"makemap"},{"pkg":"runtime","name":"makemap_small"},{"pkg":"runtime","name":"makeslice"},{"pkg":"runtime","name":"makeslicecopy"},{"pkg":"runtime","name":"malg"},{"pkg":"runtime","name":"malg.func1"},{"pkg":"runtime","name":"mallocgc"},{"pkg":"runtime","name":"mallocinit"},{"pkg":"runtime","name":"mapaccess1"},{"pkg":"runtime","name":"mapaccess1_fast32"},{"pkg":"runtime","name":"mapaccess1_faststr"},{"pkg":"runtime","name":"mapaccess2"},{"pkg":"runtime","name":"mapaccess2_fast32"},{"pkg":"runtime","name":"mapaccess2_fast64"},{"pkg":"runtime","name":"mapaccess2_faststr"},{"pkg":"runtime","name":"mapaccessK"},{"pkg":"runtime","name":"mapassign"},{"pkg":"runtime","name":"mapassign_fast32"},{"pkg":"runtime","name":"mapassign_fast64ptr"},{"pkg":"runtime","name":"mapassign_faststr"},{"pkg":"runtime","name":"mapdelete"},{"pkg":"runtime","name":"mapdelete_faststr"},{"pkg":"runtime","name":"mapiterinit"},{"pkg":"runtime","name":"mapiternext"},{"pkg":"runtime","name":"maptype.hashMightPanic"},{"pkg":"runtime","name":"maptype.indirectelem"},{"pkg":"runtime","name":"maptype.indirectkey"},{"pkg":"runtime","name":"maptype.needkeyupdate"},{"pkg":"runtime","name":"maptype.reflexivekey"},{"pkg":"runtime","name":"markBits.advance"},{"pkg":"runtime","name":"markBits.isMarked"},{"pkg":"runtime","name":"markBits.setMarked"},{"pkg":"runtime","name":"markBits.setMarkedNonAtomic"},{"pkg":"runtime","name":"markroot"},{"pkg":"runtime","name":"markroot.func1"},{"pkg":"runtime","name":"markrootBlock"},{"pkg":"runtime","name":"markrootFreeGStacks"},{"pkg":"runtime","name":"markrootSpans"},{"pkg":"runtime","name":"materializeGCProg"},{"pkg":"runtime","name":"mcache.allocLarge"},{"pkg":"runtime","name":"mcache.nextFree"},{"pkg":"runtime","name":"mcache.prepareForSweep"},{"pkg":"runtime","name":"mcache.refill"},{"pkg":"runtime","name":"mcache.releaseAll"},{"pkg":"runtime","name":"mcall"},{"pkg":"runtime","name":"mcentral.cacheSpan"},{"pkg":"runtime","name":"mcentral.fullSwept"},{"pkg":"runtime","name":"mcentral.fullUnswept"},{"pkg":"runtime","name":"mcentral.grow"},{"pkg":"runtime","name":"mcentral.init"},{"pkg":"runtime","name":"mcentral.partialSwept"},{"pkg":"runtime","name":"mcentral.partialUnswept"},{"pkg":"runtime","name":"mcentral.uncacheSpan"},{"pkg":"runtime","name":"mcommoninit"},{"pkg":"runtime","name":"mcount"},{"pkg":"runtime","name":"memRecordCycle.add"},{"pkg":"runtime","name":"memclrHasPointers"},{"pkg":"runtime","name":"memclrNoHeapPointers"},{"pkg":"runtime","name":"memclrNoHeapPointersChunked"},{"pkg":"runtime","name":"memequal"},{"pkg":"runtime","name":"memequal0"},{"pkg":"runtime","name":"memequal128"},{"pkg":"runtime","name":"memequal16"},{"pkg":"runtime","name":"memequal32"},{"pkg":"runtime","name":"memequal64"},{"pkg":"runtime","name":"memequal8"},{"pkg":"runtime","name":"memequal_varlen"},{"pkg":"runtime","name":"memhash"},{"pkg":"runtime","name":"memhash128"},{"pkg":"runtime","name":"memhash32"},{"pkg":"runtime","name":"memhash32Fallback"},{"pkg":"runtime","name":"memhash64"},{"pkg":"runtime","name":"memhash64Fallback"},{"pkg":"runtime","name":"memhashFallback"},{"pkg":"runtime","name":"memhash_varlen"},{"pkg":"runtime","name":"memmove"},{"pkg":"runtime","name":"mergeSummaries"},{"pkg":"runtime","name":"mexit"},{"pkg":"runtime","name":"mget"},{"pkg":"runtime","name":"mheap).alloc.func1"},{"pkg":"runtime","name":"mheap).allocSpan.func1"},{"pkg":"runtime","name":"mheap).freeSpan.func1"},{"pkg":"runtime","name":"mheap.alloc"},{"pkg":"runtime","name":"mheap.allocMSpanLocked"},{"pkg":"runtime","name":"mheap.allocManual"},{"pkg":"runtime","name":"mheap.allocNeedsZero"},{"pkg":"runtime","name":"mheap.allocSpan"},{"pkg":"runtime","name":"mheap.freeMSpanLocked"},{"pkg":"runtime","name":"mheap.freeManual"},{"pkg":"runtime","name":"mheap.freeSpan"},{"pkg":"runtime","name":"mheap.freeSpanLocked"},{"pkg":"runtime","name":"mheap.grow"},{"pkg":"runtime","name":"mheap.init"},{"pkg":"runtime","name":"mheap.initSpan"},{"pkg":"runtime","name":"mheap.nextSpanForSweep"},{"pkg":"runtime","name":"mheap.reclaim"},{"pkg":"runtime","name":"mheap.reclaimChunk"},{"pkg":"runtime","name":"mheap.setSpans"},{"pkg":"runtime","name":"mheap.sysAlloc"},{"pkg":"runtime","name":"mheap.tryAllocMSpan"},{"pkg":"runtime","name":"mincore"},{"pkg":"runtime","name":"minit"},{"pkg":"runtime","name":"minitSignalMask"},{"pkg":"runtime","name":"minitSignalStack"},{"pkg":"runtime","name":"minitSignals"},{"pkg":"runtime","name":"mix"},{"pkg":"runtime","name":"mmap"},{"pkg":"runtime","name":"mmap.func1"},{"pkg":"runtime","name":"modtimer"},{"pkg":"runtime","name":"moduledata.textAddr"},{"pkg":"runtime","name":"moduledata.textOff"},{"pkg":"runtime","name":"moduledataverify"},{"pkg":"runtime","name":"moduledataverify1"},{"pkg":"runtime","name":"modulesinit"},{"pkg":"runtime","name":"morestack"},{"pkg":"runtime","name":"morestack_noctxt"},{"pkg":"runtime","name":"morestackc"},{"pkg":"runtime","name":"moveTimers"},{"pkg":"runtime","name":"mpreinit"},{"pkg":"runtime","name":"mput"},{"pkg":"runtime","name":"msigrestore"},{"pkg":"runtime","name":"mspan).setUserArenaChunkToFault.func1"},{"pkg":"runtime","name":"mspan.allocBitsForIndex"},{"pkg":"runtime","name":"mspan.base"},{"pkg":"runtime","name":"mspan.countAlloc"},{"pkg":"runtime","name":"mspan.divideByElemSize"},{"pkg":"runtime","name":"mspan.ensureSwept"},{"pkg":"runtime","name":"mspan.init"},{"pkg":"runtime","name":"mspan.initHeapBits"},{"pkg":"runtime","name":"mspan.isFree"},{"pkg":"runtime","name":"mspan.markBitsForBase"},{"pkg":"runtime","name":"mspan.markBitsForIndex"},{"pkg":"runtime","name":"mspan.nextFreeIndex"},{"pkg":"runtime","name":"mspan.objIndex"},{"pkg":"runtime","name":"mspan.refillAllocCache"},{"pkg":"runtime","name":"mspan.reportZombies"},{"pkg":"runtime","name":"mspan.setUserArenaChunkToFault"},{"pkg":"runtime","name":"mspinning"},{"pkg":"runtime","name":"mstart"},{"pkg":"runtime","name":"mstart0"},{"pkg":"runtime","name":"mstart1"},{"pkg":"runtime","name":"mstartm0"},{"pkg":"runtime","name":"muintptr.ptr"},{"pkg":"runtime","name":"muintptr.set"},{"pkg":"runtime","name":"munmap"},{"pkg":"runtime","name":"munmap.func1"},{"pkg":"runtime","name":"name.data"},{"pkg":"runtime","name":"name.isBlank"},{"pkg":"runtime","name":"name.isEmbedded"},{"pkg":"runtime","name":"name.isExported"},{"pkg":"runtime","name":"name.name"},{"pkg":"runtime","name":"name.pkgPath"},{"pkg":"runtime","name":"name.readvarint"},{"pkg":"runtime","name":"name.tag"},{"pkg":"runtime","name":"nanotime"},{"pkg":"runtime","name":"nanotime1"},{"pkg":"runtime","name":"needm"},{"pkg":"runtime","name":"netpoll"},{"pkg":"runtime","name":"netpollBreak"},{"pkg":"runtime","name":"netpollGenericInit"},{"pkg":"runtime","name":"netpollblock"},{"pkg":"runtime","name":"netpollblockcommit"},{"pkg":"runtime","name":"netpollcheckerr"},{"pkg":"runtime","name":"netpollclose"},{"pkg":"runtime","name":"netpollgoready"},{"pkg":"runtime","name":"netpollinit"},{"pkg":"runtime","name":"netpollinited"},{"pkg":"runtime","name":"netpollopen"},{"pkg":"runtime","name":"netpollready"},{"pkg":"runtime","name":"netpollunblock"},{"pkg":"runtime","name":"newAllocBits"},{"pkg":"runtime","name":"newArenaMayUnlock"},{"pkg":"runtime","name":"newBucket"},{"pkg":"runtime","name":"newMarkBits"},{"pkg":"runtime","name":"newarray"},{"pkg":"runtime","name":"newdefer"},{"pkg":"runtime","name":"newextram"},{"pkg":"runtime","name":"newm"},{"pkg":"runtime","name":"newm1"},{"pkg":"runtime","name":"newobject"},{"pkg":"runtime","name":"newosproc"},{"pkg":"runtime","name":"newosproc.func1"},{"pkg":"runtime","name":"newproc"},{"pkg":"runtime","name":"newproc.func1"},{"pkg":"runtime","name":"newproc1"},{"pkg":"runtime","name":"newstack"},{"pkg":"runtime","name":"nextFreeFast"},{"pkg":"runtime","name":"nextMarkBitArenaEpoch"},{"pkg":"runtime","name":"nextSample"},{"pkg":"runtime","name":"nilfunc"},{"pkg":"runtime","name":"nilinterequal"},{"pkg":"runtime","name":"nilinterhash"},{"pkg":"runtime","name":"noSignalStack"},{"pkg":"runtime","name":"nobarrierWakeTime"},{"pkg":"runtime","name":"nonblockingPipe"},{"pkg":"runtime","name":"notInHeap.add"},{"pkg":"runtime","name":"noteclear"},{"pkg":"runtime","name":"notesleep"},{"pkg":"runtime","name":"notetsleep"},{"pkg":"runtime","name":"notetsleep_internal"},{"pkg":"runtime","name":"notetsleepg"},{"pkg":"runtime","name":"notewakeup"},{"pkg":"runtime","name":"offAddr.add"},{"pkg":"runtime","name":"offAddr.addr"},{"pkg":"runtime","name":"offAddr.diff"},{"pkg":"runtime","name":"offAddr.equal"},{"pkg":"runtime","name":"offAddr.lessEqual"},{"pkg":"runtime","name":"offAddr.lessThan"},{"pkg":"runtime","name":"offAddrToLevelIndex"},{"pkg":"runtime","name":"oneNewExtraM"},{"pkg":"runtime","name":"open"},{"pkg":"runtime","name":"osinit"},{"pkg":"runtime","name":"osyield"},{"pkg":"runtime","name":"osyield_no_g"},{"pkg":"runtime","name":"overLoadFactor"},{"pkg":"runtime","name":"p).destroy.func1"},{"pkg":"runtime","name":"p.destroy"},{"pkg":"runtime","name":"p.init"},{"pkg":"runtime","name":"pMask.clear"},{"pkg":"runtime","name":"pMask.read"},{"pkg":"runtime","name":"pMask.set"},{"pkg":"runtime","name":"packPallocSum"},{"pkg":"runtime","name":"pageAlloc).find.func1"},{"pkg":"runtime","name":"pageAlloc).scavenge.func1"},{"pkg":"runtime","name":"pageAlloc).sysGrow.func1"},{"pkg":"runtime","name":"pageAlloc).sysGrow.func2"},{"pkg":"runtime","name":"pageAlloc).sysGrow.func3"},{"pkg":"runtime","name":"pageAlloc.alloc"},{"pkg":"runtime","name":"pageAlloc.allocRange"},{"pkg":"runtime","name":"pageAlloc.allocToCache"},{"pkg":"runtime","name":"pageAlloc.chunkOf"},{"pkg":"runtime","name":"pageAlloc.find"},{"pkg":"runtime","name":"pageAlloc.findMappedAddr"},{"pkg":"runtime","name":"pageAlloc.free"},{"pkg":"runtime","name":"pageAlloc.grow"},{"pkg":"runtime","name":"pageAlloc.init"},{"pkg":"runtime","name":"pageAlloc.scavenge"},{"pkg":"runtime","name":"pageAlloc.scavengeOne"},{"pkg":"runtime","name":"pageAlloc.sysGrow"},{"pkg":"runtime","name":"pageAlloc.sysInit"},{"pkg":"runtime","name":"pageAlloc.update"},{"pkg":"runtime","name":"pageBits.block64"},{"pkg":"runtime","name":"pageBits.clear"},{"pkg":"runtime","name":"pageBits.clearAll"},{"pkg":"runtime","name":"pageBits.clearBlock64"},{"pkg":"runtime","name":"pageBits.clearRange"},{"pkg":"runtime","name":"pageBits.popcntRange"},{"pkg":"runtime","name":"pageBits.set"},{"pkg":"runtime","name":"pageBits.setAll"},{"pkg":"runtime","name":"pageBits.setBlock64"},{"pkg":"runtime","name":"pageBits.setRange"},{"pkg":"runtime","name":"pageCache.alloc"},{"pkg":"runtime","name":"pageCache.allocN"},{"pkg":"runtime","name":"pageCache.empty"},{"pkg":"runtime","name":"pageCache.flush"},{"pkg":"runtime","name":"pageIndexOf"},{"pkg":"runtime","name":"pallocBits.allocAll"},{"pkg":"runtime","name":"pallocBits.allocPages64"},{"pkg":"runtime","name":"pallocBits.allocRange"},{"pkg":"runtime","name":"pallocBits.find"},{"pkg":"runtime","name":"pallocBits.find1"},{"pkg":"runtime","name":"pallocBits.findLargeN"},{"pkg":"runtime","name":"pallocBits.findSmallN"},{"pkg":"runtime","name":"pallocBits.free"},{"pkg":"runtime","name":"pallocBits.free1"},{"pkg":"runtime","name":"pallocBits.freeAll"},{"pkg":"runtime","name":"pallocBits.pages64"},{"pkg":"runtime","name":"pallocBits.summarize"},{"pkg":"runtime","name":"pallocData.allocAll"},{"pkg":"runtime","name":"pallocData.allocRange"},{"pkg":"runtime","name":"pallocData.findScavengeCandidate"},{"pkg":"runtime","name":"pallocSum.end"},{"pkg":"runtime","name":"pallocSum.max"},{"pkg":"runtime","name":"pallocSum.start"},{"pkg":"runtime","name":"pallocSum.unpack"},{"pkg":"runtime","name":"panicCheck1"},{"pkg":"runtime","name":"panicCheck2"},{"pkg":"runtime","name":"panicIndex"},{"pkg":"runtime","name":"panicIndexU"},{"pkg":"runtime","name":"panicSlice3Alen"},{"pkg":"runtime","name":"panicSlice3AlenU"},{"pkg":"runtime","name":"panicSlice3C"},{"pkg":"runtime","name":"panicSliceAcap"},{"pkg":"runtime","name":"panicSliceAcapU"},{"pkg":"runtime","name":"panicSliceAlen"},{"pkg":"runtime","name":"panicSliceAlenU"},{"pkg":"runtime","name":"panicSliceB"},{"pkg":"runtime","name":"panicSliceBU"},{"pkg":"runtime","name":"panicdivide"},{"pkg":"runtime","name":"panicdottypeE"},{"pkg":"runtime","name":"panicdottypeI"},{"pkg":"runtime","name":"panicfloat"},{"pkg":"runtime","name":"panicmakeslicecap"},{"pkg":"runtime","name":"panicmakeslicelen"},{"pkg":"runtime","name":"panicmem"},{"pkg":"runtime","name":"panicmemAddr"},{"pkg":"runtime","name":"panicoverflow"},{"pkg":"runtime","name":"panicshift"},{"pkg":"runtime","name":"panicunsafeslicelen"},{"pkg":"runtime","name":"panicunsafeslicenilptr"},{"pkg":"runtime","name":"panicunsafestringlen"},{"pkg":"runtime","name":"panicunsafestringnilptr"},{"pkg":"runtime","name":"panicwrap"},{"pkg":"runtime","name":"park_m"},{"pkg":"runtime","name":"parkunlock_c"},{"pkg":"runtime","name":"parseByteCount"},{"pkg":"runtime","name":"parsedebugvars"},{"pkg":"runtime","name":"pcdatastart"},{"pkg":"runtime","name":"pcdatavalue"},{"pkg":"runtime","name":"pcdatavalue1"},{"pkg":"runtime","name":"pcdatavalue2"},{"pkg":"runtime","name":"pcvalue"},{"pkg":"runtime","name":"pcvalueCacheKey"},{"pkg":"runtime","name":"persistentalloc"},{"pkg":"runtime","name":"persistentalloc.func1"},{"pkg":"runtime","name":"persistentalloc1"},{"pkg":"runtime","name":"piController.next"},{"pkg":"runtime","name":"piController.reset"},{"pkg":"runtime","name":"pidleget"},{"pkg":"runtime","name":"pidlegetSpinning"},{"pkg":"runtime","name":"pidleput"},{"pkg":"runtime","name":"pipe2"},{"pkg":"runtime","name":"plainError.Error"},{"pkg":"runtime","name":"pollCache.alloc"},{"pkg":"runtime","name":"pollCache.free"},{"pkg":"runtime","name":"pollDesc.info"},{"pkg":"runtime","name":"pollDesc.publishInfo"},{"pkg":"runtime","name":"pollDesc.setEventErr"},{"pkg":"runtime","name":"pollFractionalWorkerExit"},{"pkg":"runtime","name":"pollInfo.closing"},{"pkg":"runtime","name":"pollInfo.eventErr"},{"pkg":"runtime","name":"pollInfo.expiredReadDeadline"},{"pkg":"runtime","name":"pollInfo.expiredWriteDeadline"},{"pkg":"runtime","name":"pollWork"},{"pkg":"runtime","name":"preemptM"},{"pkg":"runtime","name":"preemptPark"},{"pkg":"runtime","name":"preemptall"},{"pkg":"runtime","name":"preemptone"},{"pkg":"runtime","name":"prepareFreeWorkbufs"},{"pkg":"runtime","name":"preprintpanics"},{"pkg":"runtime","name":"preprintpanics.func1"},{"pkg":"runtime","name":"printAncestorTraceback"},{"pkg":"runtime","name":"printAncestorTracebackFuncInfo"},{"pkg":"runtime","name":"printArgs"},{"pkg":"runtime","name":"printArgs.func1"},{"pkg":"runtime","name":"printArgs.func2"},{"pkg":"runtime","name":"printArgs.func3"},{"pkg":"runtime","name":"printCgoTraceback"},{"pkg":"runtime","name":"printOneCgoTraceback"},{"pkg":"runtime","name":"printScavTrace"},{"pkg":"runtime","name":"printany"},{"pkg":"runtime","name":"printanycustomtype"},{"pkg":"runtime","name":"printbool"},{"pkg":"runtime","name":"printcomplex"},{"pkg":"runtime","name":"printcreatedby"},{"pkg":"runtime","name":"printcreatedby1"},{"pkg":"runtime","name":"printfloat"},{"pkg":"runtime","name":"printhex"},{"pkg":"runtime","name":"printint"},{"pkg":"runtime","name":"printlock"},{"pkg":"runtime","name":"printnl"},{"pkg":"runtime","name":"printpanics"},{"pkg":"runtime","name":"printpointer"},{"pkg":"runtime","name":"printslice"},{"pkg":"runtime","name":"printsp"},{"pkg":"runtime","name":"printstring"},{"pkg":"runtime","name":"printuint"},{"pkg":"runtime","name":"printuintptr"},{"pkg":"runtime","name":"printunlock"},{"pkg":"runtime","name":"procPin"},{"pkg":"runtime","name":"procUnpin"},{"pkg":"runtime","name":"procresize"},{"pkg":"runtime","name":"procyield"},{"pkg":"runtime","name":"profAtomic.cas"},{"pkg":"runtime","name":"profAtomic.load"},{"pkg":"runtime","name":"profBuf.canWriteRecord"},{"pkg":"runtime","name":"profBuf.canWriteTwoRecords"},{"pkg":"runtime","name":"profBuf.hasOverflow"},{"pkg":"runtime","name":"profBuf.incrementOverflow"},{"pkg":"runtime","name":"profBuf.takeOverflow"},{"pkg":"runtime","name":"profBuf.wakeupExtra"},{"pkg":"runtime","name":"profBuf.write"},{"pkg":"runtime","name":"profIndex.addCountsAndClearFlags"},{"pkg":"runtime","name":"profIndex.tagCount"},{"pkg":"runtime","name":"profilealloc"},{"pkg":"runtime","name":"progToPointerMask"},{"pkg":"runtime","name":"publicationBarrier"},{"pkg":"runtime","name":"puintptr.ptr"},{"pkg":"runtime","name":"puintptr.set"},{"pkg":"runtime","name":"putempty"},{"pkg":"runtime","name":"putfull"},{"pkg":"runtime","name":"queuefinalizer"},{"pkg":"runtime","name":"r4"},{"pkg":"runtime","name":"r8"},{"pkg":"runtime","name":"raise"},{"pkg":"runtime","name":"raisebadsignal"},{"pkg":"runtime","name":"raiseproc"},{"pkg":"runtime","name":"randomEnum.done"},{"pkg":"runtime","name":"randomEnum.next"},{"pkg":"runtime","name":"randomEnum.position"},{"pkg":"runtime","name":"randomOrder.reset"},{"pkg":"runtime","name":"randomOrder.start"},{"pkg":"runtime","name":"rawbyteslice"},{"pkg":"runtime","name":"rawruneslice"},{"pkg":"runtime","name":"rawstring"},{"pkg":"runtime","name":"rawstringtmp"},{"pkg":"runtime","name":"read"},{"pkg":"runtime","name":"readGOGC"},{"pkg":"runtime","name":"readGOMEMLIMIT"},{"pkg":"runtime","name":"readUintptr"},{"pkg":"runtime","name":"readUnaligned32"},{"pkg":"runtime","name":"readUnaligned64"},{"pkg":"runtime","name":"readgstatus"},{"pkg":"runtime","name":"readvarint"},{"pkg":"runtime","name":"readvarintUnsafe"},{"pkg":"runtime","name":"ready"},{"pkg":"runtime","name":"readyWithTime"},{"pkg":"runtime","name":"recordForPanic"},{"pkg":"runtime","name":"recordspan"},{"pkg":"runtime","name":"recovery"},{"pkg":"runtime","name":"recv"},{"pkg":"runtime","name":"recvDirect"},{"pkg":"runtime","name":"reentersyscall"},{"pkg":"runtime","name":"reentersyscall.func1"},{"pkg":"runtime","name":"reflectOffsLock"},{"pkg":"runtime","name":"reflectOffsUnlock"},{"pkg":"runtime","name":"reflectcall"},{"pkg":"runtime","name":"reflectcallmove"},{"pkg":"runtime","name":"releaseSudog"},{"pkg":"runtime","name":"releasem"},{"pkg":"runtime","name":"releasep"},{"pkg":"runtime","name":"removefinalizer"},{"pkg":"runtime","name":"removespecial"},{"pkg":"runtime","name":"resetspinning"},{"pkg":"runtime","name":"resettimer"},{"pkg":"runtime","name":"resolveNameOff"},{"pkg":"runtime","name":"resolveTypeOff"},{"pkg":"runtime","name":"restoreGsignalStack"},{"pkg":"runtime","name":"resumeG"},{"pkg":"runtime","name":"retake"},{"pkg":"runtime","name":"retryOnEAGAIN"},{"pkg":"runtime","name":"return0"},{"pkg":"runtime","name":"round2"},{"pkg":"runtime","name":"roundupsize"},{"pkg":"runtime","name":"rt0_go"},{"pkg":"runtime","name":"rt_sigaction"},{"pkg":"runtime","name":"rtsigprocmask"},{"pkg":"runtime","name":"runExitHooks"},{"pkg":"runtime","name":"runExitHooks.func1"},{"pkg":"runtime","name":"runExitHooks.func1.1"},{"pkg":"runtime","name":"runGCProg"},{"pkg":"runtime","name":"runOneTimer"},{"pkg":"runtime","name":"runOpenDeferFrame"},{"pkg":"runtime","name":"runPerThreadSyscall"},{"pkg":"runtime","name":"runSafePointFn"},{"pkg":"runtime","name":"runfinq"},{"pkg":"runtime","name":"runqdrain"},{"pkg":"runtime","name":"runqempty"},{"pkg":"runtime","name":"runqget"},{"pkg":"runtime","name":"runqgrab"},{"pkg":"runtime","name":"runqput"},{"pkg":"runtime","name":"runqputbatch"},{"pkg":"runtime","name":"runqputslow"},{"pkg":"runtime","name":"runqsteal"},{"pkg":"runtime","name":"runtimer"},{"pkg":"runtime","name":"rwmutex).rlock.func1"},{"pkg":"runtime","name":"rwmutex.rlock"},{"pkg":"runtime","name":"rwmutex.runlock"},{"pkg":"runtime","name":"save"},{"pkg":"runtime","name":"saveAncestors"},{"pkg":"runtime","name":"saveblockevent"},{"pkg":"runtime","name":"saveg"},{"pkg":"runtime","name":"scanConservative"},{"pkg":"runtime","name":"scanblock"},{"pkg":"runtime","name":"scanframeworker"},{"pkg":"runtime","name":"scanobject"},{"pkg":"runtime","name":"scanstack"},{"pkg":"runtime","name":"scanstack.func1"},{"pkg":"runtime","name":"scavengeIndex.clear"},{"pkg":"runtime","name":"scavengeIndex.find"},{"pkg":"runtime","name":"scavengeIndex.grow"},{"pkg":"runtime","name":"scavengeIndex.mark"},{"pkg":"runtime","name":"scavengerState).init.func1"},{"pkg":"runtime","name":"scavengerState).init.func2"},{"pkg":"runtime","name":"scavengerState).init.func3"},{"pkg":"runtime","name":"scavengerState).init.func4"},{"pkg":"runtime","name":"scavengerState.controllerFailed"},{"pkg":"runtime","name":"scavengerState.init"},{"pkg":"runtime","name":"scavengerState.park"},{"pkg":"runtime","name":"scavengerState.ready"},{"pkg":"runtime","name":"scavengerState.run"},{"pkg":"runtime","name":"scavengerState.sleep"},{"pkg":"runtime","name":"scavengerState.wake"},{"pkg":"runtime","name":"schedEnableUser"},{"pkg":"runtime","name":"schedEnabled"},{"pkg":"runtime","name":"sched_getaffinity"},{"pkg":"runtime","name":"schedinit"},{"pkg":"runtime","name":"schedtrace"},{"pkg":"runtime","name":"schedtrace.func1"},{"pkg":"runtime","name":"schedule"},{"pkg":"runtime","name":"semTable.rootFor"},{"pkg":"runtime","name":"semaRoot.dequeue"},{"pkg":"runtime","name":"semaRoot.queue"},{"pkg":"runtime","name":"semaRoot.rotateLeft"},{"pkg":"runtime","name":"semaRoot.rotateRight"},{"pkg":"runtime","name":"semacquire"},{"pkg":"runtime","name":"semacquire1"},{"pkg":"runtime","name":"semrelease"},{"pkg":"runtime","name":"semrelease1"},{"pkg":"runtime","name":"send"},{"pkg":"runtime","name":"sendDirect"},{"pkg":"runtime","name":"setCheckmark"},{"pkg":"runtime","name":"setGCPhase"},{"pkg":"runtime","name":"setGNoWB"},{"pkg":"runtime","name":"setGsignalStack"},{"pkg":"runtime","name":"setMNoWB"},{"pkg":"runtime","name":"setSignalstackSP"},{"pkg":"runtime","name":"setThreadCPUProfiler"},{"pkg":"runtime","name":"setg"},{"pkg":"runtime","name":"setprofilebucket"},{"pkg":"runtime","name":"setsig"},{"pkg":"runtime","name":"setsigstack"},{"pkg":"runtime","name":"settls"},{"pkg":"runtime","name":"shade"},{"pkg":"runtime","name":"shouldPushSigpanic"},{"pkg":"runtime","name":"showframe"},{"pkg":"runtime","name":"showfuncinfo"},{"pkg":"runtime","name":"shrinkstack"},{"pkg":"runtime","name":"siftdownTimer"},{"pkg":"runtime","name":"siftupTimer"},{"pkg":"runtime","name":"sigFetchG"},{"pkg":"runtime","name":"sigInitIgnored"},{"pkg":"runtime","name":"sigInstallGoHandler"},{"pkg":"runtime","name":"sigNotOnStack"},{"pkg":"runtime","name":"sigaction"},{"pkg":"runtime","name":"sigaction.func1"},{"pkg":"runtime","name":"sigaddset"},{"pkg":"runtime","name":"sigaltstack"},{"pkg":"runtime","name":"sigblock"},{"pkg":"runtime","name":"sigctxt.cs"},{"pkg":"runtime","name":"sigctxt.fault"},{"pkg":"runtime","name":"sigctxt.fs"},{"pkg":"runtime","name":"sigctxt.gs"},{"pkg":"runtime","name":"sigctxt.preparePanic"},{"pkg":"runtime","name":"sigctxt.pushCall"},{"pkg":"runtime","name":"sigctxt.r10"},{"pkg":"runtime","name":"sigctxt.r11"},{"pkg":"runtime","name":"sigctxt.r12"},{"pkg":"runtime","name":"sigctxt.r13"},{"pkg":"runtime","name":"sigctxt.r14"},{"pkg":"runtime","name":"sigctxt.r15"},{"pkg":"runtime","name":"sigctxt.r8"},{"pkg":"runtime","name":"sigctxt.r9"},{"pkg":"runtime","name":"sigctxt.rax"},{"pkg":"runtime","name":"sigctxt.rbp"},{"pkg":"runtime","name":"sigctxt.rbx"},{"pkg":"runtime","name":"sigctxt.rcx"},{"pkg":"runtime","name":"sigctxt.rdi"},{"pkg":"runtime","name":"sigctxt.rdx"},{"pkg":"runtime","name":"sigctxt.regs"},{"pkg":"runtime","name":"sigctxt.rflags"},{"pkg":"runtime","name":"sigctxt.rip"},{"pkg":"runtime","name":"sigctxt.rsi"},{"pkg":"runtime","name":"sigctxt.rsp"},{"pkg":"runtime","name":"sigctxt.set_rip"},{"pkg":"runtime","name":"sigctxt.set_rsp"},{"pkg":"runtime","name":"sigctxt.sigFromUser"},{"pkg":"runtime","name":"sigctxt.sigaddr"},{"pkg":"runtime","name":"sigctxt.sigcode"},{"pkg":"runtime","name":"sigctxt.sigpc"},{"pkg":"runtime","name":"sigctxt.sigsp"},{"pkg":"runtime","name":"sigdelset"},{"pkg":"runtime","name":"sigfillset"},{"pkg":"runtime","name":"sigfwd"},{"pkg":"runtime","name":"sigfwdgo"},{"pkg":"runtime","name":"sighandler"},{"pkg":"runtime","name":"signalDuringFork"},{"pkg":"runtime","name":"signalM"},{"pkg":"runtime","name":"signalstack"},{"pkg":"runtime","name":"signame"},{"pkg":"runtime","name":"sigpanic"},{"pkg":"runtime","name":"sigpanic0"},{"pkg":"runtime","name":"sigpipe"},{"pkg":"runtime","name":"sigprocmask"},{"pkg":"runtime","name":"sigprof"},{"pkg":"runtime","name":"sigprofNonGo"},{"pkg":"runtime","name":"sigprofNonGoPC"},{"pkg":"runtime","name":"sigprofNonGoWrapper"},{"pkg":"runtime","name":"sigreturn"},{"pkg":"runtime","name":"sigsave"},{"pkg":"runtime","name":"sigsend"},{"pkg":"runtime","name":"sigtramp"},{"pkg":"runtime","name":"sigtrampgo"},{"pkg":"runtime","name":"slicebytetostring"},{"pkg":"runtime","name":"slicecopy"},{"pkg":"runtime","name":"slicerunetostring"},{"pkg":"runtime","name":"spanAllocType.manual"},{"pkg":"runtime","name":"spanClass.noscan"},{"pkg":"runtime","name":"spanClass.sizeclass"},{"pkg":"runtime","name":"spanHasNoSpecials"},{"pkg":"runtime","name":"spanHasSpecials"},{"pkg":"runtime","name":"spanOf"},{"pkg":"runtime","name":"spanOfHeap"},{"pkg":"runtime","name":"spanOfUnchecked"},{"pkg":"runtime","name":"spanSet.pop"},{"pkg":"runtime","name":"spanSet.push"},{"pkg":"runtime","name":"spanSet.reset"},{"pkg":"runtime","name":"spanSetBlockAlloc.alloc"},{"pkg":"runtime","name":"spanSetBlockAlloc.free"},{"pkg":"runtime","name":"specialsIter.next"},{"pkg":"runtime","name":"specialsIter.unlinkAndNext"},{"pkg":"runtime","name":"specialsIter.valid"},{"pkg":"runtime","name":"spillArgs"},{"pkg":"runtime","name":"stackObject.setRecord"},{"pkg":"runtime","name":"stackObjectRecord.gcdata"},{"pkg":"runtime","name":"stackObjectRecord.ptrdata"},{"pkg":"runtime","name":"stackObjectRecord.useGCProg"},{"pkg":"runtime","name":"stackScanState.addObject"},{"pkg":"runtime","name":"stackScanState.buildIndex"},{"pkg":"runtime","name":"stackScanState.findObject"},{"pkg":"runtime","name":"stackScanState.getPtr"},{"pkg":"runtime","name":"stackScanState.putPtr"},{"pkg":"runtime","name":"stackalloc"},{"pkg":"runtime","name":"stackcache_clear"},{"pkg":"runtime","name":"stackcacherefill"},{"pkg":"runtime","name":"stackcacherelease"},{"pkg":"runtime","name":"stackcheck"},{"pkg":"runtime","name":"stackfree"},{"pkg":"runtime","name":"stackinit"},{"pkg":"runtime","name":"stacklog2"},{"pkg":"runtime","name":"stackmapdata"},{"pkg":"runtime","name":"stackpoolalloc"},{"pkg":"runtime","name":"stackpoolfree"},{"pkg":"runtime","name":"startCheckmarks"},{"pkg":"runtime","name":"startPCforTrace"},{"pkg":"runtime","name":"startTemplateThread"},{"pkg":"runtime","name":"startTheWorld"},{"pkg":"runtime","name":"startTheWorld.func1"},{"pkg":"runtime","name":"startTheWorldGC"},{"pkg":"runtime","name":"startTheWorldWithSema"},{"pkg":"runtime","name":"startlockedm"},{"pkg":"runtime","name":"startm"},{"pkg":"runtime","name":"startpanic_m"},{"pkg":"runtime","name":"stealWork"},{"pkg":"runtime","name":"step"},{"pkg":"runtime","name":"stkbucket"},{"pkg":"runtime","name":"stkframe.argBytes"},{"pkg":"runtime","name":"stkframe.argMapInternal"},{"pkg":"runtime","name":"stkframe.getStackMap"},{"pkg":"runtime","name":"stkobjinit"},{"pkg":"runtime","name":"stopTheWorld"},{"pkg":"runtime","name":"stopTheWorld.func1"},{"pkg":"runtime","name":"stopTheWorldGC"},{"pkg":"runtime","name":"stopTheWorldWithSema"},{"pkg":"runtime","name":"stoplockedm"},{"pkg":"runtime","name":"stopm"},{"pkg":"runtime","name":"strequal"},{"pkg":"runtime","name":"strhash"},{"pkg":"runtime","name":"strhashFallback"},{"pkg":"runtime","name":"stringDataOnStack"},{"pkg":"runtime","name":"stringtoslicebyte"},{"pkg":"runtime","name":"stringtoslicerune"},{"pkg":"runtime","name":"subtract1"},{"pkg":"runtime","name":"subtractb"},{"pkg":"runtime","name":"suspendG"},{"pkg":"runtime","name":"sweepClass.clear"},{"pkg":"runtime","name":"sweepClass.load"},{"pkg":"runtime","name":"sweepClass.split"},{"pkg":"runtime","name":"sweepClass.update"},{"pkg":"runtime","name":"sweepLocked).sweep.func1"},{"pkg":"runtime","name":"sweepLocked.sweep"},{"pkg":"runtime","name":"sweepLocker.tryAcquire"},{"pkg":"runtime","name":"sweepone"},{"pkg":"runtime","name":"sweepone.func1"},{"pkg":"runtime","name":"syncadjustsudogs"},{"pkg":"runtime","name":"sysAlloc"},{"pkg":"runtime","name":"sysAllocOS"},{"pkg":"runtime","name":"sysFault"},{"pkg":"runtime","name":"sysFaultOS"},{"pkg":"runtime","name":"sysFree"},{"pkg":"runtime","name":"sysFreeOS"},{"pkg":"runtime","name":"sysHugePageOS"},{"pkg":"runtime","name":"sysMap"},{"pkg":"runtime","name":"sysMapOS"},{"pkg":"runtime","name":"sysMemStat.add"},{"pkg":"runtime","name":"sysMemStat.load"},{"pkg":"runtime","name":"sysMmap"},{"pkg":"runtime","name":"sysMunmap"},{"pkg":"runtime","name":"sysReserve"},{"pkg":"runtime","name":"sysReserveAligned"},{"pkg":"runtime","name":"sysReserveOS"},{"pkg":"runtime","name":"sysSigaction"},{"pkg":"runtime","name":"sysSigaction.func1"},{"pkg":"runtime","name":"sysUnused"},{"pkg":"runtime","name":"sysUnusedOS"},{"pkg":"runtime","name":"sysUsed"},{"pkg":"runtime","name":"sysUsedOS"},{"pkg":"runtime","name":"sysargs"},{"pkg":"runtime","name":"sysauxv"},{"pkg":"runtime","name":"sysmon"},{"pkg":"runtime","name":"systemstack"},{"pkg":"runtime","name":"systemstack_switch"},{"pkg":"runtime","name":"templateThread"},{"pkg":"runtime","name":"testAtomic64"},{"pkg":"runtime","name":"tgkill"},{"pkg":"runtime","name":"throw"},{"pkg":"runtime","name":"throw.func1"},{"pkg":"runtime","name":"timeHistogram.record"},{"pkg":"runtime","name":"timeSleepUntil"},{"pkg":"runtime","name":"timediv"},{"pkg":"runtime","name":"timer_create"},{"pkg":"runtime","name":"timer_delete"},{"pkg":"runtime","name":"timer_settime"},{"pkg":"runtime","name":"timespec.setNsec"},{"pkg":"runtime","name":"tooManyOverflowBuckets"},{"pkg":"runtime","name":"tophash"},{"pkg":"runtime","name":"traceAcquireBuffer"},{"pkg":"runtime","name":"traceAlloc.alloc"},{"pkg":"runtime","name":"traceAllocBlockPtr.set"},{"pkg":"runtime","name":"traceBuf.byte"},{"pkg":"runtime","name":"traceBuf.varint"},{"pkg":"runtime","name":"traceBufPtr.ptr"},{"pkg":"runtime","name":"traceBufPtr.set"},{"pkg":"runtime","name":"traceCPUSample"},{"pkg":"runtime","name":"traceEvent"},{"pkg":"runtime","name":"traceEventLocked"},{"pkg":"runtime","name":"traceEventLocked.func1"},{"pkg":"runtime","name":"traceFlush"},{"pkg":"runtime","name":"traceFullQueue"},{"pkg":"runtime","name":"traceGCDone"},{"pkg":"runtime","name":"traceGCMarkAssistDone"},{"pkg":"runtime","name":"traceGCMarkAssistStart"},{"pkg":"runtime","name":"traceGCSTWDone"},{"pkg":"runtime","name":"traceGCSTWStart"},{"pkg":"runtime","name":"traceGCStart"},{"pkg":"runtime","name":"traceGCSweepDone"},{"pkg":"runtime","name":"traceGCSweepSpan"},{"pkg":"runtime","name":"traceGCSweepStart"},{"pkg":"runtime","name":"traceGoCreate"},{"pkg":"runtime","name":"traceGoEnd"},{"pkg":"runtime","name":"traceGoPark"},{"pkg":"runtime","name":"traceGoPreempt"},{"pkg":"runtime","name":"traceGoSched"},{"pkg":"runtime","name":"traceGoStart"},{"pkg":"runtime","name":"traceGoSysBlock"},{"pkg":"runtime","name":"traceGoSysCall"},{"pkg":"runtime","name":"traceGoSysExit"},{"pkg":"runtime","name":"traceGoUnpark"},{"pkg":"runtime","name":"traceGomaxprocs"},{"pkg":"runtime","name":"traceHeapAlloc"},{"pkg":"runtime","name":"traceHeapGoal"},{"pkg":"runtime","name":"traceProcFree"},{"pkg":"runtime","name":"traceProcStart"},{"pkg":"runtime","name":"traceProcStop"},{"pkg":"runtime","name":"traceReader"},{"pkg":"runtime","name":"traceReaderAvailable"},{"pkg":"runtime","name":"traceReleaseBuffer"},{"pkg":"runtime","name":"traceStack.stack"},{"pkg":"runtime","name":"traceStackID"},{"pkg":"runtime","name":"traceStackTable).put.func1"},{"pkg":"runtime","name":"traceStackTable.find"},{"pkg":"runtime","name":"traceStackTable.newStack"},{"pkg":"runtime","name":"traceStackTable.put"},{"pkg":"runtime","name":"tracealloc"},{"pkg":"runtime","name":"tracealloc.func1"},{"pkg":"runtime","name":"traceback"},{"pkg":"runtime","name":"traceback1"},{"pkg":"runtime","name":"tracebackCgoContext"},{"pkg":"runtime","name":"tracebackHexdump"},{"pkg":"runtime","name":"tracebackHexdump.func1"},{"pkg":"runtime","name":"tracebackothers"},{"pkg":"runtime","name":"tracebackothers.func1"},{"pkg":"runtime","name":"tracebacktrap"},{"pkg":"runtime","name":"tracefree"},{"pkg":"runtime","name":"tracefree.func1"},{"pkg":"runtime","name":"tracegc"},{"pkg":"runtime","name":"tryRecordGoroutineProfile"},{"pkg":"runtime","name":"tryRecordGoroutineProfileWB"},{"pkg":"runtime","name":"trygetfull"},{"pkg":"runtime","name":"typeBitsBulkBarrier"},{"pkg":"runtime","name":"typedmemclr"},{"pkg":"runtime","name":"typedmemmove"},{"pkg":"runtime","name":"typedslicecopy"},{"pkg":"runtime","name":"typehash"},{"pkg":"runtime","name":"typelinksinit"},{"pkg":"runtime","name":"typesEqual"},{"pkg":"runtime","name":"unblocksig"},{"pkg":"runtime","name":"unlock"},{"pkg":"runtime","name":"unlock2"},{"pkg":"runtime","name":"unlockOSThread"},{"pkg":"runtime","name":"unlockWithRank"},{"pkg":"runtime","name":"unlockextra"},{"pkg":"runtime","name":"unminit"},{"pkg":"runtime","name":"unminitSignals"},{"pkg":"runtime","name":"unreachableMethod"},{"pkg":"runtime","name":"unspillArgs"},{"pkg":"runtime","name":"updateTimer0When"},{"pkg":"runtime","name":"updateTimerModifiedEarliest"},{"pkg":"runtime","name":"updateTimerPMask"},{"pkg":"runtime","name":"usleep"},{"pkg":"runtime","name":"usleep_no_g"},{"pkg":"runtime","name":"validSIGPROF"},{"pkg":"runtime","name":"vdsoFindVersion"},{"pkg":"runtime","name":"vdsoInitFromSysinfoEhdr"},{"pkg":"runtime","name":"vdsoParseSymbols"},{"pkg":"runtime","name":"vdsoParseSymbols.func1"},{"pkg":"runtime","name":"vdsoauxv"},{"pkg":"runtime","name":"waitReason.String"},{"pkg":"runtime","name":"waitReason.isMutexWait"},{"pkg":"runtime","name":"waitq.dequeue"},{"pkg":"runtime","name":"waitq.enqueue"},{"pkg":"runtime","name":"wakeNetPoller"},{"pkg":"runtime","name":"wakefing"},{"pkg":"runtime","name":"wakep"},{"pkg":"runtime","name":"wantAsyncPreempt"},{"pkg":"runtime","name":"wbBuf.discard"},{"pkg":"runtime","name":"wbBuf.putFast"},{"pkg":"runtime","name":"wbBuf.reset"},{"pkg":"runtime","name":"wbBufFlush"},{"pkg":"runtime","name":"wbBufFlush.func1"},{"pkg":"runtime","name":"wbBufFlush1"},{"pkg":"runtime","name":"wirep"},{"pkg":"runtime","name":"workbuf.checkempty"},{"pkg":"runtime","name":"workbuf.checknonempty"},{"pkg":"runtime","name":"write"},{"pkg":"runtime","name":"write1"},{"pkg":"runtime","name":"writeErr"},{"pkg":"runtime","name":"writeErrStr"},{"pkg":"runtime","name":"writeHeapBits.flush"},{"pkg":"runtime","name":"writeHeapBits.pad"},{"pkg":"runtime","name":"writeHeapBits.write"},{"pkg":"runtime","name":"writeHeapBitsForAddr"},{"pkg":"runtime/debug","name":"SetTraceback"},{"pkg":"runtime/internal/atomic","name":"Bool.Load"},{"pkg":"runtime/internal/atomic","name":"Bool.Store"},{"pkg":"runtime/internal/atomic","name":"Float64.Load"},{"pkg":"runtime/internal/atomic","name":"Float64.Store"},{"pkg":"runtime/internal/atomic","name":"Int32.Add"},{"pkg":"runtime/internal/atomic","name":"Int32.CompareAndSwap"},{"pkg":"runtime/internal/atomic","name":"Int32.Load"},{"pkg":"runtime/internal/atomic","name":"Int32.Store"},{"pkg":"runtime/internal/atomic","name":"Int64.Add"},{"pkg":"runtime/internal/atomic","name":"Int64.CompareAndSwap"},{"pkg":"runtime/internal/atomic","name":"Int64.Load"},{"pkg":"runtime/internal/atomic","name":"Int64.Store"},{"pkg":"runtime/internal/atomic","name":"Int64.Swap"},{"pkg":"runtime/internal/atomic","name":"Pointer[...].CompareAndSwapNoWB"},{"pkg":"runtime/internal/atomic","name":"Pointer[...].Load"},{"pkg":"runtime/internal/atomic","name":"Pointer[...].StoreNoWB"},{"pkg":"runtime/internal/atomic","name":"Uint32.Add"},{"pkg":"runtime/internal/atomic","name":"Uint32.And"},{"pkg":"runtime/internal/atomic","name":"Uint32.CompareAndSwap"},{"pkg":"runtime/internal/atomic","name":"Uint32.Load"},{"pkg":"runtime/internal/atomic","name":"Uint32.Or"},{"pkg":"runtime/internal/atomic","name":"Uint32.Store"},{"pkg":"runtime/internal/atomic","name":"Uint32.Swap"},{"pkg":"runtime/internal/atomic","name":"Uint64.Add"},{"pkg":"runtime/internal/atomic","name":"Uint64.CompareAndSwap"},{"pkg":"runtime/internal/atomic","name":"Uint64.Load"},{"pkg":"runtime/internal/atomic","name":"Uint64.Store"},{"pkg":"runtime/internal/atomic","name":"Uint8.And"},{"pkg":"runtime/internal/atomic","name":"Uint8.Load"},{"pkg":"runtime/internal/atomic","name":"Uint8.Or"},{"pkg":"runtime/internal/atomic","name":"Uint8.Store"},{"pkg":"runtime/internal/atomic","name":"Uintptr.Add"},{"pkg":"runtime/internal/atomic","name":"Uintptr.CompareAndSwap"},{"pkg":"runtime/internal/atomic","name":"Uintptr.Load"},{"pkg":"runtime/internal/atomic","name":"Uintptr.Store"},{"pkg":"runtime/internal/atomic","name":"Uintptr.Swap"},{"pkg":"runtime/internal/atomic","name":"UnsafePointer.CompareAndSwapNoWB"},{"pkg":"runtime/internal/atomic","name":"UnsafePointer.Load"},{"pkg":"runtime/internal/atomic","name":"UnsafePointer.StoreNoWB"},{"pkg":"runtime/internal/sys","name":"LeadingZeros64"},{"pkg":"runtime/internal/sys","name":"LeadingZeros8"},{"pkg":"runtime/internal/sys","name":"OnesCount64"},{"pkg":"runtime/internal/syscall","name":"EpollCreate1"},{"pkg":"runtime/internal/syscall","name":"EpollCtl"},{"pkg":"runtime/internal/syscall","name":"EpollWait"},{"pkg":"runtime/internal/syscall","name":"Syscall6"},{"pkg":"sort","name":"IntSlice.Len"},{"pkg":"sort","name":"IntSlice.Less"},{"pkg":"sort","name":"IntSlice.Swap"},{"pkg":"sort","name":"Ints"},{"pkg":"sort","name":"Search"},{"pkg":"sort","name":"Slice"},{"pkg":"sort","name":"Sort"},{"pkg":"sort","name":"Stable"},{"pkg":"sort","name":"breakPatterns"},{"pkg":"sort","name":"breakPatterns_func"},{"pkg":"sort","name":"choosePivot"},{"pkg":"sort","name":"choosePivot_func"},{"pkg":"sort","name":"heapSort"},{"pkg":"sort","name":"heapSort_func"},{"pkg":"sort","name":"insertionSort"},{"pkg":"sort","name":"insertionSort_func"},{"pkg":"sort","name":"median"},{"pkg":"sort","name":"medianAdjacent"},{"pkg":"sort","name":"medianAdjacent_func"},{"pkg":"sort","name":"median_func"},{"pkg":"sort","name":"nextPowerOfTwo"},{"pkg":"sort","name":"order2"},{"pkg":"sort","name":"order2_func"},{"pkg":"sort","name":"partialInsertionSort"},{"pkg":"sort","name":"partialInsertionSort_func"},{"pkg":"sort","name":"partition"},{"pkg":"sort","name":"partitionEqual"},{"pkg":"sort","name":"partitionEqual_func"},{"pkg":"sort","name":"partition_func"},{"pkg":"sort","name":"pdqsort"},{"pkg":"sort","name":"pdqsort_func"},{"pkg":"sort","name":"reverseRange"},{"pkg":"sort","name":"reverseRange_func"},{"pkg":"sort","name":"rotate"},{"pkg":"sort","name":"siftDown"},{"pkg":"sort","name":"siftDown_func"},{"pkg":"sort","name":"stable"},{"pkg":"sort","name":"swapRange"},{"pkg":"sort","name":"symMerge"},{"pkg":"sort","name":"xorshift.Next"},{"pkg":"strconv","name":"AppendFloat"},{"pkg":"strconv","name":"AppendInt"},{"pkg":"strconv","name":"AppendQuote"},{"pkg":"strconv","name":"AppendQuoteRune"},{"pkg":"strconv","name":"AppendQuoteRuneToASCII"},{"pkg":"strconv","name":"AppendQuoteToASCII"},{"pkg":"strconv","name":"AppendUint"},{"pkg":"strconv","name":"CanBackquote"},{"pkg":"strconv","name":"FormatFloat"},{"pkg":"strconv","name":"FormatInt"},{"pkg":"strconv","name":"FormatUint"},{"pkg":"strconv","name":"IsPrint"},{"pkg":"strconv","name":"Itoa"},{"pkg":"strconv","name":"NumError.Error"},{"pkg":"strconv","name":"ParseBool"},{"pkg":"strconv","name":"ParseFloat"},{"pkg":"strconv","name":"ParseInt"},{"pkg":"strconv","name":"ParseUint"},{"pkg":"strconv","name":"Quote"},{"pkg":"strconv","name":"Unquote"},{"pkg":"strconv","name":"UnquoteChar"},{"pkg":"strconv","name":"appendEscapedRune"},{"pkg":"strconv","name":"appendQuotedRuneWith"},{"pkg":"strconv","name":"appendQuotedWith"},{"pkg":"strconv","name":"atof32"},{"pkg":"strconv","name":"atof32exact"},{"pkg":"strconv","name":"atof64"},{"pkg":"strconv","name":"atof64exact"},{"pkg":"strconv","name":"atofHex"},{"pkg":"strconv","name":"baseError"},{"pkg":"strconv","name":"bigFtoa"},{"pkg":"strconv","name":"bitSizeError"},{"pkg":"strconv","name":"bsearch16"},{"pkg":"strconv","name":"bsearch32"},{"pkg":"strconv","name":"cloneString"},{"pkg":"strconv","name":"commonPrefixLenIgnoreCase"},{"pkg":"strconv","name":"computeBounds"},{"pkg":"strconv","name":"contains"},{"pkg":"strconv","name":"decimal.Assign"},{"pkg":"strconv","name":"decimal.Round"},{"pkg":"strconv","name":"decimal.RoundDown"},{"pkg":"strconv","name":"decimal.RoundUp"},{"pkg":"strconv","name":"decimal.RoundedInteger"},{"pkg":"strconv","name":"decimal.Shift"},{"pkg":"strconv","name":"decimal.floatBits"},{"pkg":"strconv","name":"decimal.set"},{"pkg":"strconv","name":"divisibleByPower5"},{"pkg":"strconv","name":"divmod1e9"},{"pkg":"strconv","name":"eiselLemire32"},{"pkg":"strconv","name":"eiselLemire64"},{"pkg":"strconv","name":"fmtB"},{"pkg":"strconv","name":"fmtE"},{"pkg":"strconv","name":"fmtF"},{"pkg":"strconv","name":"fmtX"},{"pkg":"strconv","name":"formatBits"},{"pkg":"strconv","name":"formatDecimal"},{"pkg":"strconv","name":"formatDigits"},{"pkg":"strconv","name":"genericFtoa"},{"pkg":"strconv","name":"index"},{"pkg":"strconv","name":"init"},{"pkg":"strconv","name":"isInGraphicList"},{"pkg":"strconv","name":"isPowerOfTwo"},{"pkg":"strconv","name":"leftShift"},{"pkg":"strconv","name":"lower"},{"pkg":"strconv","name":"max"},{"pkg":"strconv","name":"min"},{"pkg":"strconv","name":"mulByLog10Log2"},{"pkg":"strconv","name":"mulByLog2Log10"},{"pkg":"strconv","name":"mult128bitPow10"},{"pkg":"strconv","name":"mult64bitPow10"},{"pkg":"strconv","name":"parseFloatPrefix"},{"pkg":"strconv","name":"prefixIsLessThan"},{"pkg":"strconv","name":"quoteWith"},{"pkg":"strconv","name":"rangeError"},{"pkg":"strconv","name":"readFloat"},{"pkg":"strconv","name":"rightShift"},{"pkg":"strconv","name":"roundShortest"},{"pkg":"strconv","name":"ryuDigits"},{"pkg":"strconv","name":"ryuDigits32"},{"pkg":"strconv","name":"ryuFtoaFixed32"},{"pkg":"strconv","name":"ryuFtoaFixed64"},{"pkg":"strconv","name":"ryuFtoaShortest"},{"pkg":"strconv","name":"shouldRoundUp"},{"pkg":"strconv","name":"small"},{"pkg":"strconv","name":"special"},{"pkg":"strconv","name":"syntaxError"},{"pkg":"strconv","name":"trim"},{"pkg":"strconv","name":"underscoreOK"},{"pkg":"strconv","name":"unhex"},{"pkg":"strconv","name":"unquote"},{"pkg":"strings","name":"Builder.Cap"},{"pkg":"strings","name":"Builder.Grow"},{"pkg":"strings","name":"Builder.String"},{"pkg":"strings","name":"Builder.WriteByte"},{"pkg":"strings","name":"Builder.WriteRune"},{"pkg":"strings","name":"Builder.WriteString"},{"pkg":"strings","name":"Builder.copyCheck"},{"pkg":"strings","name":"Builder.grow"},{"pkg":"strings","name":"ContainsRune"},{"pkg":"strings","name":"Cut"},{"pkg":"strings","name":"HasPrefix"},{"pkg":"strings","name":"Index"},{"pkg":"strings","name":"IndexByte"},{"pkg":"strings","name":"IndexRune"},{"pkg":"strings","name":"Join"},{"pkg":"strings","name":"Map"},{"pkg":"strings","name":"ToLower"},{"pkg":"sync","name":"Map.Load"},{"pkg":"sync","name":"Map.LoadOrStore"},{"pkg":"sync","name":"Map.Store"},{"pkg":"sync","name":"Map.Swap"},{"pkg":"sync","name":"Map.dirtyLocked"},{"pkg":"sync","name":"Map.loadReadOnly"},{"pkg":"sync","name":"Map.missLocked"},{"pkg":"sync","name":"Mutex.Lock"},{"pkg":"sync","name":"Mutex.Unlock"},{"pkg":"sync","name":"Mutex.lockSlow"},{"pkg":"sync","name":"Mutex.unlockSlow"},{"pkg":"sync","name":"Once).doSlow.func1"},{"pkg":"sync","name":"Once).doSlow.func2"},{"pkg":"sync","name":"Once.Do"},{"pkg":"sync","name":"Once.doSlow"},{"pkg":"sync","name":"Pool).pinSlow.func1"},{"pkg":"sync","name":"Pool.Get"},{"pkg":"sync","name":"Pool.Put"},{"pkg":"sync","name":"Pool.getSlow"},{"pkg":"sync","name":"Pool.pin"},{"pkg":"sync","name":"Pool.pinSlow"},{"pkg":"sync","name":"WaitGroup.Add"},{"pkg":"sync","name":"WaitGroup.Done"},{"pkg":"sync","name":"WaitGroup.Wait"},{"pkg":"sync","name":"entry.load"},{"pkg":"sync","name":"entry.swapLocked"},{"pkg":"sync","name":"entry.tryExpungeLocked"},{"pkg":"sync","name":"entry.tryLoadOrStore"},{"pkg":"sync","name":"entry.trySwap"},{"pkg":"sync","name":"entry.unexpungeLocked"},{"pkg":"sync","name":"event"},{"pkg":"sync","name":"fatal"},{"pkg":"sync","name":"indexLocal"},{"pkg":"sync","name":"init"},{"pkg":"sync","name":"init.0"},{"pkg":"sync","name":"init.1"},{"pkg":"sync","name":"loadPoolChainElt"},{"pkg":"sync","name":"newEntry"},{"pkg":"sync","name":"poolChain.popHead"},{"pkg":"sync","name":"poolChain.popTail"},{"pkg":"sync","name":"poolChain.pushHead"},{"pkg":"sync","name":"poolCleanup"},{"pkg":"sync","name":"poolDequeue.pack"},{"pkg":"sync","name":"poolDequeue.popHead"},{"pkg":"sync","name":"poolDequeue.popTail"},{"pkg":"sync","name":"poolDequeue.pushHead"},{"pkg":"sync","name":"poolDequeue.unpack"},{"pkg":"sync","name":"runtime_Semacquire"},{"pkg":"sync","name":"runtime_SemacquireMutex"},{"pkg":"sync","name":"runtime_Semrelease"},{"pkg":"sync","name":"runtime_canSpin"},{"pkg":"sync","name":"runtime_doSpin"},{"pkg":"sync","name":"runtime_nanotime"},{"pkg":"sync","name":"runtime_notifyListCheck"},{"pkg":"sync","name":"runtime_procPin"},{"pkg":"sync","name":"runtime_procUnpin"},{"pkg":"sync","name":"runtime_registerPoolCleanup"},{"pkg":"sync","name":"storePoolChainElt"},{"pkg":"sync","name":"throw"},{"pkg":"sync/atomic","name":"CompareAndSwapPointer"},{"pkg":"sync/atomic","name":"CompareAndSwapUintptr"},{"pkg":"sync/atomic","name":"Pointer[...].CompareAndSwap"},{"pkg":"sync/atomic","name":"Pointer[...].Load"},{"pkg":"sync/atomic","name":"Pointer[...].Store"},{"pkg":"sync/atomic","name":"Pointer[...].Swap"},{"pkg":"sync/atomic","name":"StorePointer"},{"pkg":"sync/atomic","name":"StoreUint32"},{"pkg":"sync/atomic","name":"StoreUintptr"},{"pkg":"sync/atomic","name":"SwapPointer"},{"pkg":"sync/atomic","name":"SwapUintptr"},{"pkg":"sync/atomic","name":"Uint64.Add"},{"pkg":"sync/atomic","name":"Uint64.CompareAndSwap"},{"pkg":"sync/atomic","name":"Uint64.Load"},{"pkg":"sync/atomic","name":"Uint64.Store"},{"pkg":"syscall","name":"Close"},{"pkg":"syscall","name":"Errno.Error"},{"pkg":"syscall","name":"Getrlimit"},{"pkg":"syscall","name":"RawSyscall"},{"pkg":"syscall","name":"RawSyscall6"},{"pkg":"syscall","name":"SetNonblock"},{"pkg":"syscall","name":"Setrlimit"},{"pkg":"syscall","name":"Syscall"},{"pkg":"syscall","name":"Syscall6"},{"pkg":"syscall","name":"Write"},{"pkg":"syscall","name":"errnoErr"},{"pkg":"syscall","name":"fcntl"},{"pkg":"syscall","name":"init"},{"pkg":"syscall","name":"mmap"},{"pkg":"syscall","name":"munmap"},{"pkg":"syscall","name":"runtime_envs"},{"pkg":"syscall","name":"write"},{"pkg":"time","name":"init"},{"pkg":"time","name":"now"},{"pkg":"time","name":"resetTimer"},{"pkg":"time","name":"stopTimer"},{"pkg":"unicode","name":"IsDigit"},{"pkg":"unicode","name":"IsLetter"},{"pkg":"unicode","name":"IsSpace"},{"pkg":"unicode","name":"SimpleFold"},{"pkg":"unicode","name":"To"},{"pkg":"unicode","name":"ToLower"},{"pkg":"unicode","name":"ToUpper"},{"pkg":"unicode","name":"init"},{"pkg":"unicode","name":"is16"},{"pkg":"unicode","name":"is32"},{"pkg":"unicode","name":"isExcludingLatin"},{"pkg":"unicode","name":"to"},{"pkg":"unicode/utf16","name":"DecodeRune"},{"pkg":"unicode/utf16","name":"IsSurrogate"},{"pkg":"unicode/utf8","name":"AppendRune"},{"pkg":"unicode/utf8","name":"DecodeLastRune"},{"pkg":"unicode/utf8","name":"DecodeLastRuneInString"},{"pkg":"unicode/utf8","name":"DecodeRune"},{"pkg":"unicode/utf8","name":"DecodeRuneInString"},{"pkg":"unicode/utf8","name":"EncodeRune"},{"pkg":"unicode/utf8","name":"RuneCount"},{"pkg":"unicode/utf8","name":"RuneCountInString"},{"pkg":"unicode/utf8","name":"RuneLen"},{"pkg":"unicode/utf8","name":"RuneStart"},{"pkg":"unicode/utf8","name":"ValidRune"},{"pkg":"unicode/utf8","name":"ValidString"},{"pkg":"unicode/utf8","name":"appendRuneNonASCII"}],"goVersion":"go1.20.3","goos":"linux","goarch":"amd64"}
binary-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-call/binary_sarif.ct
##### # Test basic binary scanning with sarif output $ govulncheck -format sarif -mode binary ${common_vuln_binary} { "version": "2.1.0", "$schema": "https://json.schemastore.org/sarif-2.1.0.json", "runs": [ { "tool": { "driver": { "name": "govulncheck", "semanticVersion": "v0.0.0", "informationUri": "https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck", "properties": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "scan_level": "symbol", "scan_mode": "binary" }, "rules": [ { "id": "GO-2020-0015", "shortDescription": { "text": "[GO-2020-0015] Infinite loop when decoding some inputs in golang.org/x/text" }, "fullDescription": { "text": "Infinite loop when decoding some inputs in golang.org/x/text" }, "help": { "text": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector." }, "helpUri": "https://pkg.go.dev/vuln/GO-2020-0015", "properties": { "tags": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ] } }, { "id": "GO-2021-0054", "shortDescription": { "text": "[GO-2021-0054] Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector." }, "fullDescription": { "text": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector." }, "help": { "text": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector." }, "helpUri": "https://pkg.go.dev/vuln/GO-2021-0054", "properties": { "tags": [ "CVE-2020-36067", "GHSA-p64j-r5f4-pwwx" ] } }, { "id": "GO-2021-0113", "shortDescription": { "text": "[GO-2021-0113] Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack." }, "fullDescription": { "text": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack." }, "help": { "text": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack." }, "helpUri": "https://pkg.go.dev/vuln/GO-2021-0113", "properties": { "tags": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ] } }, { "id": "GO-2021-0265", "shortDescription": { "text": "[GO-2021-0265] A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time." }, "fullDescription": { "text": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time." }, "help": { "text": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time." }, "helpUri": "https://pkg.go.dev/vuln/GO-2021-0265", "properties": { "tags": [ "CVE-2021-42248", "CVE-2021-42836", "GHSA-c9gm-7rfj-8w5h", "GHSA-ppj4-34rq-v8j9" ] } } ] } }, "results": [ { "ruleId": "GO-2020-0015", "level": "note", "message": { "text": "Your code depends on 1 vulnerable module (golang.org/x/text), but doesn't appear to call any of the vulnerable symbols." } }, { "ruleId": "GO-2021-0054", "level": "error", "message": { "text": "Your code calls vulnerable functions in 1 package (github.com/tidwall/gjson)." }, "codeFlows": [ { "threadFlows": [ { "locations": [ { "module": "github.com/tidwall/gjson@v1.6.5", "location": { "physicalLocation": { "artifactLocation": {}, "region": {} }, "message": { "text": "github.com/tidwall/gjson.Result.ForEach" } } } ] } ], "message": { "text": "A summarized code flow for vulnerable function github.com/tidwall/gjson.Result.ForEach" } } ], "stacks": [ { "message": { "text": "A call stack for vulnerable function github.com/tidwall/gjson.Result.ForEach" }, "frames": [ { "module": "github.com/tidwall/gjson@v1.6.5", "location": { "physicalLocation": { "artifactLocation": {}, "region": {} }, "message": { "text": "github.com/tidwall/gjson.Result.ForEach" } } } ] } ] }, { "ruleId": "GO-2021-0113", "level": "error", "message": { "text": "Your code calls vulnerable functions in 1 package (golang.org/x/text/language)." }, "codeFlows": [ { "threadFlows": [ { "locations": [ { "module": "golang.org/x/text@v0.3.0", "location": { "physicalLocation": { "artifactLocation": {}, "region": {} }, "message": { "text": "golang.org/x/text/language.Parse" } } } ] } ], "message": { "text": "A summarized code flow for vulnerable function golang.org/x/text/language.Parse" } } ], "stacks": [ { "message": { "text": "A call stack for vulnerable function golang.org/x/text/language.Parse" }, "frames": [ { "module": "golang.org/x/text@v0.3.0", "location": { "physicalLocation": { "artifactLocation": {}, "region": {} }, "message": { "text": "golang.org/x/text/language.Parse" } } } ] } ] }, { "ruleId": "GO-2021-0265", "level": "error", "message": { "text": "Your code calls vulnerable functions in 1 package (github.com/tidwall/gjson)." }, "codeFlows": [ { "threadFlows": [ { "locations": [ { "module": "github.com/tidwall/gjson@v1.6.5", "location": { "physicalLocation": { "artifactLocation": {}, "region": {} }, "message": { "text": "github.com/tidwall/gjson.Get" } } } ] } ], "message": { "text": "A summarized code flow for vulnerable function github.com/tidwall/gjson.Get" } }, { "threadFlows": [ { "locations": [ { "module": "github.com/tidwall/gjson@v1.6.5", "location": { "physicalLocation": { "artifactLocation": {}, "region": {} }, "message": { "text": "github.com/tidwall/gjson.Result.Get" } } } ] } ], "message": { "text": "A summarized code flow for vulnerable function github.com/tidwall/gjson.Result.Get" } } ], "stacks": [ { "message": { "text": "A call stack for vulnerable function github.com/tidwall/gjson.Get" }, "frames": [ { "module": "github.com/tidwall/gjson@v1.6.5", "location": { "physicalLocation": { "artifactLocation": {}, "region": {} }, "message": { "text": "github.com/tidwall/gjson.Get" } } } ] }, { "message": { "text": "A call stack for vulnerable function github.com/tidwall/gjson.Result.Get" }, "frames": [ { "module": "github.com/tidwall/gjson@v1.6.5", "location": { "physicalLocation": { "artifactLocation": {}, "region": {} }, "message": { "text": "github.com/tidwall/gjson.Result.Get" } } } ] } ] } ] } ] }
binary-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-call/binary_vendored_json.ct
##### # Test basic binary scanning with json output $ govulncheck -format json -mode binary ${common_vendored_binary} { "config": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "scan_level": "symbol", "scan_mode": "binary" } } { "progress": { "message": "Scanning your binary for known vulnerabilities..." } } { "progress": { "message": "Fetching vulnerabilities from the database..." } } { "progress": { "message": "Checking the binary against the vulnerabilities..." } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0265", "modified": "2023-04-03T15:57:51Z", "published": "2022-08-15T18:06:07Z", "aliases": [ "CVE-2021-42248", "CVE-2021-42836", "GHSA-c9gm-7rfj-8w5h", "GHSA-ppj4-34rq-v8j9" ], "details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.9.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Get", "parseObject", "queryMatches" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/237" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/236" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0265" } } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5" } ] } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson" } ] } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson", "function": "Get" } ] } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson", "function": "Get", "receiver": "Result" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0113", "modified": "2023-04-03T15:57:51Z", "published": "2021-10-06T17:51:21Z", "aliases": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ], "details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/language", "symbols": [ "MatchStrings", "MustParse", "Parse", "ParseAcceptLanguage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/340830" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f" } ], "credits": [ { "name": "Guido Vranken" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0113" } } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0" } ] } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0", "package": "golang.org/x/text/language" } ] } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0", "package": "golang.org/x/text/language", "function": "Parse" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0054", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36067", "GHSA-p64j-r5f4-pwwx" ], "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Result.ForEach", "unwrap" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/196" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0054" } } } { "finding": { "osv": "GO-2021-0054", "fixed_version": "v1.6.6", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5" } ] } } { "finding": { "osv": "GO-2021-0054", "fixed_version": "v1.6.6", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2020-0015", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ], "summary": "Infinite loop when decoding some inputs in golang.org/x/text", "details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/encoding/unicode", "symbols": [ "bomOverride.Transform", "utf16Decoder.Transform" ] }, { "path": "golang.org/x/text/transform", "symbols": [ "String" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/238238" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e" }, { "type": "REPORT", "url": "https://go.dev/issue/39491" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0" } ], "credits": [ { "name": "@abacabadabacaba and Anton Gyllenberg" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0015" } } } { "finding": { "osv": "GO-2020-0015", "fixed_version": "v0.3.3", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0059", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-35380", "GHSA-w942-gw6m-p62c" ], "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Array", "Result.Get", "Result.Map", "Result.Value", "squash" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/192" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0059" } } }
binary-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-call/binary_vex.ct
##### # Test basic binary scanning with vex output $ govulncheck -format openvex -mode binary ${common_vuln_binary} { "@context": "https://openvex.dev/ns/v0.2.0", "@id": "govulncheck/vex:12f16e1541f93ab0d46d78966849d71bc20932795108f69d0df5a415a2c3a5e6", "author": "Unknown Author", "timestamp": "2024-01-01T00:00:00", "version": 1, "tooling": "https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck", "statements": [ { "vulnerability": { "@id": "https://pkg.go.dev/vuln/GO-2020-0015", "name": "GO-2020-0015", "description": "Infinite loop when decoding some inputs in golang.org/x/text", "aliases": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ] }, "products": [ { "@id": "Unknown Product" } ], "status": "not_affected", "justification": "vulnerable_code_not_present", "impact_statement": "Govulncheck determined that the vulnerable code isn't called" }, { "vulnerability": { "@id": "https://pkg.go.dev/vuln/GO-2021-0054", "name": "GO-2021-0054", "description": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "aliases": [ "CVE-2020-36067", "GHSA-p64j-r5f4-pwwx" ] }, "products": [ { "@id": "Unknown Product" } ], "status": "affected" }, { "vulnerability": { "@id": "https://pkg.go.dev/vuln/GO-2021-0113", "name": "GO-2021-0113", "description": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.", "aliases": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ] }, "products": [ { "@id": "Unknown Product" } ], "status": "affected" }, { "vulnerability": { "@id": "https://pkg.go.dev/vuln/GO-2021-0265", "name": "GO-2021-0265", "description": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.", "aliases": [ "CVE-2021-42248", "CVE-2021-42836", "GHSA-c9gm-7rfj-8w5h", "GHSA-ppj4-34rq-v8j9" ] }, "products": [ { "@id": "Unknown Product" } ], "status": "affected" } ] }
binary-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-call/binary_call_text.ct
##### # Test basic binary scanning with text output $ govulncheck -mode=binary ${common_vuln_binary} --> FAIL 3 === Symbol Results === Vulnerability #1: GO-2021-0265 A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time. More info: https://pkg.go.dev/vuln/GO-2021-0265 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.9.3 Vulnerable symbols found: #1: gjson.Get #2: gjson.Result.Get Vulnerability #2: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.0 Fixed in: golang.org/x/text@v0.3.7 Vulnerable symbols found: #1: language.Parse Vulnerability #3: GO-2021-0054 Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector. More info: https://pkg.go.dev/vuln/GO-2021-0054 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.6.6 Vulnerable symbols found: #1: gjson.Result.ForEach Your code is affected by 3 vulnerabilities from 2 modules. This scan also found 0 vulnerabilities in packages you import and 1 vulnerability in modules you require, but your code doesn't appear to call these vulnerabilities. Use '-show verbose' for more details.
binary-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/binary-call/binary_call_json.ct
##### # Test basic binary scanning with json output $ govulncheck -format json -mode binary ${common_vuln_binary} { "config": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "scan_level": "symbol", "scan_mode": "binary" } } { "progress": { "message": "Scanning your binary for known vulnerabilities..." } } { "progress": { "message": "Fetching vulnerabilities from the database..." } } { "progress": { "message": "Checking the binary against the vulnerabilities..." } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0265", "modified": "2023-04-03T15:57:51Z", "published": "2022-08-15T18:06:07Z", "aliases": [ "CVE-2021-42248", "CVE-2021-42836", "GHSA-c9gm-7rfj-8w5h", "GHSA-ppj4-34rq-v8j9" ], "details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.9.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Get", "parseObject", "queryMatches" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/237" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/236" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0265" } } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5" } ] } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson" } ] } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson", "function": "Get" } ] } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson", "function": "Get", "receiver": "Result" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0113", "modified": "2023-04-03T15:57:51Z", "published": "2021-10-06T17:51:21Z", "aliases": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ], "details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/language", "symbols": [ "MatchStrings", "MustParse", "Parse", "ParseAcceptLanguage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/340830" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f" } ], "credits": [ { "name": "Guido Vranken" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0113" } } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0" } ] } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0", "package": "golang.org/x/text/language" } ] } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0", "package": "golang.org/x/text/language", "function": "Parse" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0054", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36067", "GHSA-p64j-r5f4-pwwx" ], "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Result.ForEach", "unwrap" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/196" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0054" } } } { "finding": { "osv": "GO-2021-0054", "fixed_version": "v1.6.6", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5" } ] } } { "finding": { "osv": "GO-2021-0054", "fixed_version": "v1.6.6", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson" } ] } } { "finding": { "osv": "GO-2021-0054", "fixed_version": "v1.6.6", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson", "function": "ForEach", "receiver": "Result" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2020-0015", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ], "summary": "Infinite loop when decoding some inputs in golang.org/x/text", "details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/encoding/unicode", "symbols": [ "bomOverride.Transform", "utf16Decoder.Transform" ] }, { "path": "golang.org/x/text/transform", "symbols": [ "String" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/238238" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e" }, { "type": "REPORT", "url": "https://go.dev/issue/39491" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0" } ], "credits": [ { "name": "@abacabadabacaba and Anton Gyllenberg" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0015" } } } { "finding": { "osv": "GO-2020-0015", "fixed_version": "v0.3.3", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0059", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-35380", "GHSA-w942-gw6m-p62c" ], "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Array", "Result.Get", "Result.Map", "Result.Value", "squash" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/192" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0059" } } }
convert
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/convert/convert_input.json
{ "config": { "protocol_version": "v0.1.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "go_version": "go1.18", "scan_level": "symbol" } } { "progress": { "message": "Scanning your code and P packages across M dependent modules for known vulnerabilities..." } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0265", "modified": "2023-04-03T15:57:51Z", "published": "2022-08-15T18:06:07Z", "aliases": [ "CVE-2021-42248", "CVE-2021-42836", "GHSA-c9gm-7rfj-8w5h", "GHSA-ppj4-34rq-v8j9" ], "details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.9.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Get", "parseObject", "queryMatches" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/237" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/236" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0265" } } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson", "function": "Get", "receiver": "Result" }, { "module": "golang.org/vuln", "package": "golang.org/vuln", "function": "main", "position": { "filename": ".../vuln.go", "offset": 183, "line": 14, "column": 20 } } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0113", "modified": "2023-04-03T15:57:51Z", "published": "2021-10-06T17:51:21Z", "aliases": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ], "details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/language", "symbols": [ "MatchStrings", "MustParse", "Parse", "ParseAcceptLanguage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/340830" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f" } ], "credits": [ { "name": "Guido Vranken" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0113" } } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0", "package": "golang.org/x/text/language", "function": "Parse" }, { "module": "golang.org/vuln", "package": "golang.org/vuln", "function": "main", "position": { "filename": ".../vuln.go", "offset": 159, "line": 13, "column": 16 } } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0054", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36067", "GHSA-p64j-r5f4-pwwx" ], "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Result.ForEach", "unwrap" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/196" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0054" } } } { "finding": { "osv": "GO-2021-0054", "fixed_version": "v1.6.6", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson" } ] } }
convert
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/convert/convert_text.ct
##### # Test using the conversion from json on stdin to text on stdout # location of convert input is subdirectory/convert_intput $ govulncheck -mode=convert < convert/convert_input.json --> FAIL 3 === Symbol Results === Vulnerability #1: GO-2021-0265 A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time. More info: https://pkg.go.dev/vuln/GO-2021-0265 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.9.3 Example traces found: #1: .../vuln.go:14:20: vuln.main calls gjson.Result.Get Vulnerability #2: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.0 Fixed in: golang.org/x/text@v0.3.7 Example traces found: #1: .../vuln.go:13:16: vuln.main calls language.Parse Your code is affected by 2 vulnerabilities from 2 modules. This scan also found 1 vulnerability in packages you import and 0 vulnerabilities in modules you require, but your code doesn't appear to call these vulnerabilities. Use '-show verbose' for more details.
source-package
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_sarif.ct
##### # Test sarif output $ govulncheck -format sarif -scan package -C ${moddir}/vuln . { "version": "2.1.0", "$schema": "https://json.schemastore.org/sarif-2.1.0.json", "runs": [ { "tool": { "driver": { "name": "govulncheck", "semanticVersion": "v0.0.0", "informationUri": "https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck", "properties": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "go_version": "go1.18", "scan_level": "package", "scan_mode": "source" }, "rules": [ { "id": "GO-2020-0015", "shortDescription": { "text": "[GO-2020-0015] Infinite loop when decoding some inputs in golang.org/x/text" }, "fullDescription": { "text": "Infinite loop when decoding some inputs in golang.org/x/text" }, "help": { "text": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector." }, "helpUri": "https://pkg.go.dev/vuln/GO-2020-0015", "properties": { "tags": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ] } }, { "id": "GO-2021-0054", "shortDescription": { "text": "[GO-2021-0054] Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector." }, "fullDescription": { "text": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector." }, "help": { "text": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector." }, "helpUri": "https://pkg.go.dev/vuln/GO-2021-0054", "properties": { "tags": [ "CVE-2020-36067", "GHSA-p64j-r5f4-pwwx" ] } }, { "id": "GO-2021-0113", "shortDescription": { "text": "[GO-2021-0113] Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack." }, "fullDescription": { "text": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack." }, "help": { "text": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack." }, "helpUri": "https://pkg.go.dev/vuln/GO-2021-0113", "properties": { "tags": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ] } }, { "id": "GO-2021-0265", "shortDescription": { "text": "[GO-2021-0265] A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time." }, "fullDescription": { "text": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time." }, "help": { "text": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time." }, "helpUri": "https://pkg.go.dev/vuln/GO-2021-0265", "properties": { "tags": [ "CVE-2021-42248", "CVE-2021-42836", "GHSA-c9gm-7rfj-8w5h", "GHSA-ppj4-34rq-v8j9" ] } } ] } }, "results": [ { "ruleId": "GO-2020-0015", "level": "warning", "message": { "text": "Your code depends on 1 vulnerable module (golang.org/x/text), but doesn't appear to import any of the vulnerable symbols." }, "locations": [ { "physicalLocation": { "artifactLocation": { "uri": "go.mod", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 1 } }, "message": { "text": "Findings for vulnerability GO-2020-0015" } } ] }, { "ruleId": "GO-2021-0054", "level": "error", "message": { "text": "Your code imports 1 vulnerable package (github.com/tidwall/gjson). Run the call-level analysis to understand whether your code actually calls the vulnerabilities." }, "locations": [ { "physicalLocation": { "artifactLocation": { "uri": "go.mod", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 1 } }, "message": { "text": "Findings for vulnerability GO-2021-0054" } } ] }, { "ruleId": "GO-2021-0113", "level": "error", "message": { "text": "Your code imports 1 vulnerable package (golang.org/x/text/language). Run the call-level analysis to understand whether your code actually calls the vulnerabilities." }, "locations": [ { "physicalLocation": { "artifactLocation": { "uri": "go.mod", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 1 } }, "message": { "text": "Findings for vulnerability GO-2021-0113" } } ] }, { "ruleId": "GO-2021-0265", "level": "error", "message": { "text": "Your code imports 1 vulnerable package (github.com/tidwall/gjson). Run the call-level analysis to understand whether your code actually calls the vulnerabilities." }, "locations": [ { "physicalLocation": { "artifactLocation": { "uri": "go.mod", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 1 } }, "message": { "text": "Findings for vulnerability GO-2021-0265" } } ] } ] } ] }
source-package
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_text.ct
##### # Testing that govulncheck doesn't mention calls when it doesn't have the relevant info $ govulncheck -scan package -C ${moddir}/multientry . --> FAIL 3 === Package Results === Vulnerability #1: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.5 Fixed in: golang.org/x/text@v0.3.7 Your code may be affected by 1 vulnerability. This scan also found 0 vulnerabilities in modules you require. Use '-scan symbol' for more fine grained vulnerability detection and '-show verbose' for more details. ##### # Test for package level scan with the -show verbose flag $ govulncheck -show verbose -scan package -C ${moddir}/multientry . --> FAIL 3 Scanning your code and P packages across M dependent modules for known vulnerabilities... Fetching vulnerabilities from the database... Checking the code against the vulnerabilities... === Package Results === Vulnerability #1: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.5 Fixed in: golang.org/x/text@v0.3.7 === Module Results === No other vulnerabilities found. Your code may be affected by 1 vulnerability. This scan also found 0 vulnerabilities in modules you require. Use '-scan symbol' for more fine grained vulnerability detection.
source-package
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-package/source_package_json.ct
##### # Test that findings with callstacks are not emitted in package mode $ govulncheck -format json -scan package -C ${moddir}/multientry . { "config": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "go_version": "go1.18", "scan_level": "package", "scan_mode": "source" } } { "progress": { "message": "Scanning your code and P packages across M dependent modules for known vulnerabilities..." } } { "progress": { "message": "Fetching vulnerabilities from the database..." } } { "progress": { "message": "Checking the code against the vulnerabilities..." } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0113", "modified": "2023-04-03T15:57:51Z", "published": "2021-10-06T17:51:21Z", "aliases": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ], "details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/language", "symbols": [ "MatchStrings", "MustParse", "Parse", "ParseAcceptLanguage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/340830" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f" } ], "credits": [ { "name": "Guido Vranken" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0113" } } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.5" } ] } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.5", "package": "golang.org/x/text/language" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2020-0015", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ], "summary": "Infinite loop when decoding some inputs in golang.org/x/text", "details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/encoding/unicode", "symbols": [ "bomOverride.Transform", "utf16Decoder.Transform" ] }, { "path": "golang.org/x/text/transform", "symbols": [ "String" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/238238" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e" }, { "type": "REPORT", "url": "https://go.dev/issue/39491" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0" } ], "credits": [ { "name": "@abacabadabacaba and Anton Gyllenberg" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0015" } } }
source-module
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-module/source_module_json.ct
##### # Test that findings with callstacks or packages are not emitted in module mode $ govulncheck -format json -scan module -C ${moddir}/multientry { "config": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "go_version": "go1.18", "scan_level": "module", "scan_mode": "source" } } { "progress": { "message": "Scanning your code across 2 dependent modules for known vulnerabilities..." } } { "progress": { "message": "Fetching vulnerabilities from the database..." } } { "progress": { "message": "Checking the code against the vulnerabilities..." } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0113", "modified": "2023-04-03T15:57:51Z", "published": "2021-10-06T17:51:21Z", "aliases": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ], "details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/language", "symbols": [ "MatchStrings", "MustParse", "Parse", "ParseAcceptLanguage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/340830" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f" } ], "credits": [ { "name": "Guido Vranken" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0113" } } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.5" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2020-0015", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ], "summary": "Infinite loop when decoding some inputs in golang.org/x/text", "details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/encoding/unicode", "symbols": [ "bomOverride.Transform", "utf16Decoder.Transform" ] }, { "path": "golang.org/x/text/transform", "symbols": [ "String" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/238238" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e" }, { "type": "REPORT", "url": "https://go.dev/issue/39491" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0" } ], "credits": [ { "name": "@abacabadabacaba and Anton Gyllenberg" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0015" } } }
source-module
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-module/source_module_text.ct
##### # Testing that govulncheck doesn't mention calls when it doesn't # have callstack information $ govulncheck -scan module -C ${moddir}/multientry --> FAIL 3 === Module Results === Vulnerability #1: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.5 Fixed in: golang.org/x/text@v0.3.7 Your code may be affected by 1 vulnerability. Use '-scan symbol' for more fine grained vulnerability detection. ##### # -show verbose flag should only show module results with scan level module $ govulncheck -scan module -show verbose -C ${moddir}/multientry --> FAIL 3 Scanning your code across 2 dependent modules for known vulnerabilities... Fetching vulnerabilities from the database... Checking the code against the vulnerabilities... === Module Results === Vulnerability #1: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.5 Fixed in: golang.org/x/text@v0.3.7 Your code may be affected by 1 vulnerability. Use '-scan symbol' for more fine grained vulnerability detection.
source-module
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-module/source_module_sarif.ct
##### # Test sarif output $ govulncheck -format sarif -scan module -C ${moddir}/vuln { "version": "2.1.0", "$schema": "https://json.schemastore.org/sarif-2.1.0.json", "runs": [ { "tool": { "driver": { "name": "govulncheck", "semanticVersion": "v0.0.0", "informationUri": "https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck", "properties": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "go_version": "go1.18", "scan_level": "module", "scan_mode": "source" }, "rules": [ { "id": "GO-2020-0015", "shortDescription": { "text": "[GO-2020-0015] Infinite loop when decoding some inputs in golang.org/x/text" }, "fullDescription": { "text": "Infinite loop when decoding some inputs in golang.org/x/text" }, "help": { "text": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector." }, "helpUri": "https://pkg.go.dev/vuln/GO-2020-0015", "properties": { "tags": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ] } }, { "id": "GO-2021-0054", "shortDescription": { "text": "[GO-2021-0054] Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector." }, "fullDescription": { "text": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector." }, "help": { "text": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector." }, "helpUri": "https://pkg.go.dev/vuln/GO-2021-0054", "properties": { "tags": [ "CVE-2020-36067", "GHSA-p64j-r5f4-pwwx" ] } }, { "id": "GO-2021-0113", "shortDescription": { "text": "[GO-2021-0113] Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack." }, "fullDescription": { "text": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack." }, "help": { "text": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack." }, "helpUri": "https://pkg.go.dev/vuln/GO-2021-0113", "properties": { "tags": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ] } }, { "id": "GO-2021-0265", "shortDescription": { "text": "[GO-2021-0265] A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time." }, "fullDescription": { "text": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time." }, "help": { "text": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time." }, "helpUri": "https://pkg.go.dev/vuln/GO-2021-0265", "properties": { "tags": [ "CVE-2021-42248", "CVE-2021-42836", "GHSA-c9gm-7rfj-8w5h", "GHSA-ppj4-34rq-v8j9" ] } } ] } }, "results": [ { "ruleId": "GO-2020-0015", "level": "error", "message": { "text": "Your code depends on 1 vulnerable module (golang.org/x/text). Run the call-level analysis to understand whether your code actually calls the vulnerabilities." }, "locations": [ { "physicalLocation": { "artifactLocation": { "uri": "go.mod", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 1 } }, "message": { "text": "Findings for vulnerability GO-2020-0015" } } ] }, { "ruleId": "GO-2021-0054", "level": "error", "message": { "text": "Your code depends on 1 vulnerable module (github.com/tidwall/gjson). Run the call-level analysis to understand whether your code actually calls the vulnerabilities." }, "locations": [ { "physicalLocation": { "artifactLocation": { "uri": "go.mod", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 1 } }, "message": { "text": "Findings for vulnerability GO-2021-0054" } } ] }, { "ruleId": "GO-2021-0113", "level": "error", "message": { "text": "Your code depends on 1 vulnerable module (golang.org/x/text). Run the call-level analysis to understand whether your code actually calls the vulnerabilities." }, "locations": [ { "physicalLocation": { "artifactLocation": { "uri": "go.mod", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 1 } }, "message": { "text": "Findings for vulnerability GO-2021-0113" } } ] }, { "ruleId": "GO-2021-0265", "level": "error", "message": { "text": "Your code depends on 1 vulnerable module (github.com/tidwall/gjson). Run the call-level analysis to understand whether your code actually calls the vulnerabilities." }, "locations": [ { "physicalLocation": { "artifactLocation": { "uri": "go.mod", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 1 } }, "message": { "text": "Findings for vulnerability GO-2021-0265" } } ] } ] } ] }
source-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_json.ct
##### $ govulncheck -C ${moddir}/vuln -format json ./... { "config": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "go_version": "go1.18", "scan_level": "symbol", "scan_mode": "source" } } { "progress": { "message": "Scanning your code and P packages across M dependent modules for known vulnerabilities..." } } { "progress": { "message": "Fetching vulnerabilities from the database..." } } { "progress": { "message": "Checking the code against the vulnerabilities..." } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0265", "modified": "2023-04-03T15:57:51Z", "published": "2022-08-15T18:06:07Z", "aliases": [ "CVE-2021-42248", "CVE-2021-42836", "GHSA-c9gm-7rfj-8w5h", "GHSA-ppj4-34rq-v8j9" ], "details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.9.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Get", "parseObject", "queryMatches" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/237" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/236" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0265" } } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5" } ] } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson" } ] } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson", "function": "Get", "receiver": "Result", "position": { "filename": "gjson.go", "offset": 5744, "line": 296, "column": 17 } }, { "module": "golang.org/vuln", "package": "golang.org/vuln", "function": "main", "position": { "filename": "vuln.go", "offset": 183, "line": 14, "column": 20 } } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0113", "modified": "2023-04-03T15:57:51Z", "published": "2021-10-06T17:51:21Z", "aliases": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ], "details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/language", "symbols": [ "MatchStrings", "MustParse", "Parse", "ParseAcceptLanguage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/340830" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f" } ], "credits": [ { "name": "Guido Vranken" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0113" } } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0" } ] } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0", "package": "golang.org/x/text/language" } ] } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0", "package": "golang.org/x/text/language", "function": "Parse", "position": { "filename": "language/parse.go", "offset": 5808, "line": 228, "column": 6 } }, { "module": "golang.org/vuln", "package": "golang.org/vuln", "function": "main", "position": { "filename": "vuln.go", "offset": 159, "line": 13, "column": 16 } } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0054", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36067", "GHSA-p64j-r5f4-pwwx" ], "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Result.ForEach", "unwrap" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/196" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0054" } } } { "finding": { "osv": "GO-2021-0054", "fixed_version": "v1.6.6", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5" } ] } } { "finding": { "osv": "GO-2021-0054", "fixed_version": "v1.6.6", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson" } ] } } { "finding": { "osv": "GO-2021-0054", "fixed_version": "v1.6.6", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson", "function": "ForEach", "receiver": "Result", "position": { "filename": "gjson.go", "offset": 4415, "line": 220, "column": 17 } }, { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson", "function": "modPretty", "position": { "filename": "gjson.go", "offset": 53718, "line": 2631, "column": 21 } }, { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson", "function": "execModifier", "position": { "filename": "gjson.go", "offset": 52543, "line": 2587, "column": 21 } }, { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson", "function": "Get", "position": { "filename": "gjson.go", "offset": 38077, "line": 1881, "column": 36 } }, { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson", "function": "Get", "receiver": "Result", "position": { "filename": "gjson.go", "offset": 5781, "line": 297, "column": 12 } }, { "module": "golang.org/vuln", "package": "golang.org/vuln", "function": "main", "position": { "filename": "vuln.go", "offset": 183, "line": 14, "column": 20 } } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2020-0015", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ], "summary": "Infinite loop when decoding some inputs in golang.org/x/text", "details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/encoding/unicode", "symbols": [ "bomOverride.Transform", "utf16Decoder.Transform" ] }, { "path": "golang.org/x/text/transform", "symbols": [ "String" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/238238" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e" }, { "type": "REPORT", "url": "https://go.dev/issue/39491" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0" } ], "credits": [ { "name": "@abacabadabacaba and Anton Gyllenberg" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0015" } } } { "finding": { "osv": "GO-2020-0015", "fixed_version": "v0.3.3", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0059", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-35380", "GHSA-w942-gw6m-p62c" ], "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Array", "Result.Get", "Result.Map", "Result.Value", "squash" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/192" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0059" } } }
source-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_vex.ct
##### # Test vex json output $ govulncheck -C ${moddir}/vuln -format openvex ./... { "@context": "https://openvex.dev/ns/v0.2.0", "@id": "govulncheck/vex:12f16e1541f93ab0d46d78966849d71bc20932795108f69d0df5a415a2c3a5e6", "author": "Unknown Author", "timestamp": "2024-01-01T00:00:00", "version": 1, "tooling": "https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck", "statements": [ { "vulnerability": { "@id": "https://pkg.go.dev/vuln/GO-2020-0015", "name": "GO-2020-0015", "description": "Infinite loop when decoding some inputs in golang.org/x/text", "aliases": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ] }, "products": [ { "@id": "Unknown Product" } ], "status": "not_affected", "justification": "vulnerable_code_not_present", "impact_statement": "Govulncheck determined that the vulnerable code isn't called" }, { "vulnerability": { "@id": "https://pkg.go.dev/vuln/GO-2021-0054", "name": "GO-2021-0054", "description": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "aliases": [ "CVE-2020-36067", "GHSA-p64j-r5f4-pwwx" ] }, "products": [ { "@id": "Unknown Product" } ], "status": "affected" }, { "vulnerability": { "@id": "https://pkg.go.dev/vuln/GO-2021-0113", "name": "GO-2021-0113", "description": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.", "aliases": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ] }, "products": [ { "@id": "Unknown Product" } ], "status": "affected" }, { "vulnerability": { "@id": "https://pkg.go.dev/vuln/GO-2021-0265", "name": "GO-2021-0265", "description": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.", "aliases": [ "CVE-2021-42248", "CVE-2021-42836", "GHSA-c9gm-7rfj-8w5h", "GHSA-ppj4-34rq-v8j9" ] }, "products": [ { "@id": "Unknown Product" } ], "status": "affected" } ] }
source-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_multientry_text.ct
##### # Test for multiple call stacks in source mode $ govulncheck -C ${moddir}/multientry . --> FAIL 3 === Symbol Results === Vulnerability #1: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.5 Fixed in: golang.org/x/text@v0.3.7 Example traces found: #1: main.go:99:20: multientry.foobar calls language.MustParse #2: main.go:44:23: multientry.C calls language.Parse Your code is affected by 1 vulnerability from 1 module. This scan found no other vulnerabilities in packages you import or modules you require. Use '-show verbose' for more details. ##### # Test for multple call stacks in source mode with expanded traces $ govulncheck -show verbose -C ${moddir}/multientry -show=traces ./... --> FAIL 3 Scanning your code and P packages across M dependent modules for known vulnerabilities... Fetching vulnerabilities from the database... Checking the code against the vulnerabilities... === Symbol Results === Vulnerability #1: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.5 Fixed in: golang.org/x/text@v0.3.7 Example traces found: #1: for function golang.org/x/text/language.MustParse main.go:26:3: golang.org/multientry.main main.go:48:8: golang.org/multientry.D main.go:99:20: golang.org/multientry.foobar language/tags.go:13:6: golang.org/x/text/language.MustParse #2: for function golang.org/x/text/language.Parse main.go:22:3: golang.org/multientry.main main.go:44:23: golang.org/multientry.C language/parse.go:33:6: golang.org/x/text/language.Parse === Package Results === No other vulnerabilities found. === Module Results === No other vulnerabilities found. Your code is affected by 1 vulnerability from 1 module. This scan found no other vulnerabilities in packages you import or modules you require.
source-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_vendored_json.ct
##### # $ govulncheck -C ${moddir}/vendored -format json ./... { "config": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "go_version": "go1.18", "scan_level": "symbol", "scan_mode": "source" } } { "progress": { "message": "Scanning your code and P packages across M dependent modules for known vulnerabilities..." } } { "progress": { "message": "Fetching vulnerabilities from the database..." } } { "progress": { "message": "Checking the code against the vulnerabilities..." } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0265", "modified": "2023-04-03T15:57:51Z", "published": "2022-08-15T18:06:07Z", "aliases": [ "CVE-2021-42248", "CVE-2021-42836", "GHSA-c9gm-7rfj-8w5h", "GHSA-ppj4-34rq-v8j9" ], "details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.9.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Get", "parseObject", "queryMatches" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/237" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/236" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0265" } } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5" } ] } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson" } ] } } { "finding": { "osv": "GO-2021-0265", "fixed_version": "v1.9.3", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson", "function": "Get", "receiver": "Result", "position": { "filename": "gjson.go", "offset": 81, "line": 7, "column": 15 } }, { "module": "private.com/privateuser/fakemod", "version": "v1.0.0", "package": "private.com/privateuser/fakemod", "function": "Leave", "position": { "filename": "mod.go", "offset": 86, "line": 6, "column": 20 } }, { "module": "golang.org/vendored", "package": "golang.org/vendored", "function": "main", "position": { "filename": "vendored.go", "offset": 137, "line": 12, "column": 15 } } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0113", "modified": "2023-04-03T15:57:51Z", "published": "2021-10-06T17:51:21Z", "aliases": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ], "details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/language", "symbols": [ "MatchStrings", "MustParse", "Parse", "ParseAcceptLanguage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/340830" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f" } ], "credits": [ { "name": "Guido Vranken" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0113" } } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0" } ] } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0", "package": "golang.org/x/text/language" } ] } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0", "package": "golang.org/x/text/language", "function": "Parse", "position": { "filename": "language/language.go", "offset": 53, "line": 5, "column": 6 } }, { "module": "golang.org/vendored", "package": "golang.org/vendored", "function": "main", "position": { "filename": "vendored.go", "offset": 155, "line": 13, "column": 16 } } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0054", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36067", "GHSA-p64j-r5f4-pwwx" ], "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Result.ForEach", "unwrap" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/196" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0054" } } } { "finding": { "osv": "GO-2021-0054", "fixed_version": "v1.6.6", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5" } ] } } { "finding": { "osv": "GO-2021-0054", "fixed_version": "v1.6.6", "trace": [ { "module": "github.com/tidwall/gjson", "version": "v1.6.5", "package": "github.com/tidwall/gjson" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2020-0015", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ], "summary": "Infinite loop when decoding some inputs in golang.org/x/text", "details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/encoding/unicode", "symbols": [ "bomOverride.Transform", "utf16Decoder.Transform" ] }, { "path": "golang.org/x/text/transform", "symbols": [ "String" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/238238" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e" }, { "type": "REPORT", "url": "https://go.dev/issue/39491" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0" } ], "credits": [ { "name": "@abacabadabacaba and Anton Gyllenberg" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0015" } } } { "finding": { "osv": "GO-2020-0015", "fixed_version": "v0.3.3", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0" } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0059", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-35380", "GHSA-w942-gw6m-p62c" ], "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Array", "Result.Get", "Result.Map", "Result.Value", "squash" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/192" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0059" } } }
source-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_wholemodvuln_text.ct
##### # Test of govulncheck call analysis for vulns with no package info available. # All symbols of the module are vulnerable. $ govulncheck -C ${moddir}/wholemodvuln ./... --> FAIL 3 === Symbol Results === Vulnerability #1: GO-2022-0956 Excessive resource consumption in gopkg.in/yaml.v2 More info: https://pkg.go.dev/vuln/GO-2022-0956 Module: gopkg.in/yaml.v2 Found in: gopkg.in/yaml.v2@v2.2.3 Fixed in: gopkg.in/yaml.v2@v2.2.4 Example traces found: #1: whole_mod_vuln.go:8:21: wholemodvuln.main calls yaml.Marshal #2: whole_mod_vuln.go:4:2: wholemodvuln.init calls yaml.init Your code is affected by 1 vulnerability from 1 module. This scan found no other vulnerabilities in packages you import or modules you require. Use '-show verbose' for more details.
source-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_vendored_text.ct
##### # Vendored directory w text output $ govulncheck -C ${moddir}/vendored -show verbose ./... --> FAIL 3 Scanning your code and P packages across M dependent modules for known vulnerabilities... Fetching vulnerabilities from the database... Checking the code against the vulnerabilities... === Symbol Results === Vulnerability #1: GO-2021-0265 A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time. More info: https://pkg.go.dev/vuln/GO-2021-0265 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.9.3 Example traces found: #1: vendored.go:12:15: vendored.main calls fakemod.Leave, which calls gjson.Result.Get Vulnerability #2: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.0 Fixed in: golang.org/x/text@v0.3.7 Example traces found: #1: vendored.go:13:16: vendored.main calls language.Parse === Package Results === Vulnerability #1: GO-2021-0054 Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector. More info: https://pkg.go.dev/vuln/GO-2021-0054 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.6.6 === Module Results === Vulnerability #1: GO-2020-0015 Infinite loop when decoding some inputs in golang.org/x/text More info: https://pkg.go.dev/vuln/GO-2020-0015 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.0 Fixed in: golang.org/x/text@v0.3.3 Your code is affected by 2 vulnerabilities from 2 modules. This scan also found 1 vulnerability in packages you import and 1 vulnerability in modules you require, but your code doesn't appear to call these vulnerabilities.
source-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_replace_json.ct
##### # Test of source mode json on a module with a replace directive. $ govulncheck -C ${moddir}/replace -format json ./... { "config": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "go_version": "go1.18", "scan_level": "symbol", "scan_mode": "source" } } { "progress": { "message": "Scanning your code and P packages across M dependent modules for known vulnerabilities..." } } { "progress": { "message": "Fetching vulnerabilities from the database..." } } { "progress": { "message": "Checking the code against the vulnerabilities..." } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0113", "modified": "2023-04-03T15:57:51Z", "published": "2021-10-06T17:51:21Z", "aliases": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ], "details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/language", "symbols": [ "MatchStrings", "MustParse", "Parse", "ParseAcceptLanguage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/340830" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f" } ], "credits": [ { "name": "Guido Vranken" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0113" } } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0" } ] } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0", "package": "golang.org/x/text/language" } ] } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0", "package": "golang.org/x/text/language", "function": "Parse", "position": { "filename": "language/parse.go", "offset": 5808, "line": 228, "column": 6 } }, { "module": "golang.org/replace", "package": "golang.org/replace", "function": "main", "position": { "filename": "main.go", "offset": 115, "line": 11, "column": 16 } } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2020-0015", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ], "summary": "Infinite loop when decoding some inputs in golang.org/x/text", "details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/encoding/unicode", "symbols": [ "bomOverride.Transform", "utf16Decoder.Transform" ] }, { "path": "golang.org/x/text/transform", "symbols": [ "String" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/238238" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e" }, { "type": "REPORT", "url": "https://go.dev/issue/39491" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0" } ], "credits": [ { "name": "@abacabadabacaba and Anton Gyllenberg" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0015" } } } { "finding": { "osv": "GO-2020-0015", "fixed_version": "v0.3.3", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.0" } ] } }
source-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_text.ct
##### # Test of basic govulncheck in source mode $ govulncheck -C ${moddir}/vuln ./... --> FAIL 3 === Symbol Results === Vulnerability #1: GO-2021-0265 A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time. More info: https://pkg.go.dev/vuln/GO-2021-0265 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.9.3 Example traces found: #1: vuln.go:14:20: vuln.main calls gjson.Result.Get Vulnerability #2: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.0 Fixed in: golang.org/x/text@v0.3.7 Example traces found: #1: vuln.go:13:16: vuln.main calls language.Parse Vulnerability #3: GO-2021-0054 Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector. More info: https://pkg.go.dev/vuln/GO-2021-0054 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.6.6 Example traces found: #1: vuln.go:14:20: vuln.main calls gjson.Result.Get, which eventually calls gjson.Result.ForEach Your code is affected by 3 vulnerabilities from 2 modules. This scan also found 0 vulnerabilities in packages you import and 1 vulnerability in modules you require, but your code doesn't appear to call these vulnerabilities. Use '-show verbose' for more details. ##### # Test of basic govulncheck in source mode with expanded traces $ govulncheck -C ${moddir}/vuln -show=traces ./... --> FAIL 3 === Symbol Results === Vulnerability #1: GO-2021-0265 A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time. More info: https://pkg.go.dev/vuln/GO-2021-0265 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.9.3 Example traces found: #1: for function github.com/tidwall/gjson.Result.Get vuln.go:14:20: golang.org/vuln.main gjson.go:296:17: github.com/tidwall/gjson.Result.Get Vulnerability #2: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.0 Fixed in: golang.org/x/text@v0.3.7 Example traces found: #1: for function golang.org/x/text/language.Parse vuln.go:13:16: golang.org/vuln.main language/parse.go:228:6: golang.org/x/text/language.Parse Vulnerability #3: GO-2021-0054 Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector. More info: https://pkg.go.dev/vuln/GO-2021-0054 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.6.6 Example traces found: #1: for function github.com/tidwall/gjson.Result.ForEach vuln.go:14:20: golang.org/vuln.main gjson.go:297:12: github.com/tidwall/gjson.Result.Get gjson.go:1881:36: github.com/tidwall/gjson.Get gjson.go:2587:21: github.com/tidwall/gjson.execModifier gjson.go:2631:21: github.com/tidwall/gjson.modPretty gjson.go:220:17: github.com/tidwall/gjson.Result.ForEach Your code is affected by 3 vulnerabilities from 2 modules. This scan also found 0 vulnerabilities in packages you import and 1 vulnerability in modules you require, but your code doesn't appear to call these vulnerabilities. Use '-show verbose' for more details. ##### # Test of basic govulncheck in source mode with the -show verbose flag $ govulncheck -C ${moddir}/vuln -show verbose ./... --> FAIL 3 Scanning your code and P packages across M dependent modules for known vulnerabilities... Fetching vulnerabilities from the database... Checking the code against the vulnerabilities... === Symbol Results === Vulnerability #1: GO-2021-0265 A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time. More info: https://pkg.go.dev/vuln/GO-2021-0265 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.9.3 Example traces found: #1: vuln.go:14:20: vuln.main calls gjson.Result.Get Vulnerability #2: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.0 Fixed in: golang.org/x/text@v0.3.7 Example traces found: #1: vuln.go:13:16: vuln.main calls language.Parse Vulnerability #3: GO-2021-0054 Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector. More info: https://pkg.go.dev/vuln/GO-2021-0054 Module: github.com/tidwall/gjson Found in: github.com/tidwall/gjson@v1.6.5 Fixed in: github.com/tidwall/gjson@v1.6.6 Example traces found: #1: vuln.go:14:20: vuln.main calls gjson.Result.Get, which eventually calls gjson.Result.ForEach === Package Results === No other vulnerabilities found. === Module Results === Vulnerability #1: GO-2020-0015 Infinite loop when decoding some inputs in golang.org/x/text More info: https://pkg.go.dev/vuln/GO-2020-0015 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.0 Fixed in: golang.org/x/text@v0.3.3 Your code is affected by 3 vulnerabilities from 2 modules. This scan also found 0 vulnerabilities in packages you import and 1 vulnerability in modules you require, but your code doesn't appear to call these vulnerabilities.
source-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_replace_text.ct
##### # Test of source mode on a module with a replace directive. $ govulncheck -C ${moddir}/replace ./... --> FAIL 3 === Symbol Results === Vulnerability #1: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.0 Fixed in: golang.org/x/text@v0.3.7 Example traces found: #1: main.go:11:16: replace.main calls language.Parse Your code is affected by 1 vulnerability from 1 module. This scan also found 0 vulnerabilities in packages you import and 1 vulnerability in modules you require, but your code doesn't appear to call these vulnerabilities. Use '-show verbose' for more details.
source-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_subdir_text.ct
##### # Test govulncheck runs on the subdirectory of a module $ govulncheck -C ${moddir}/vuln/subdir . --> FAIL 3 === Symbol Results === Vulnerability #1: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.0 Fixed in: golang.org/x/text@v0.3.7 Example traces found: #1: subdir/subdir.go:8:16: subdir.Foo calls language.Parse Your code is affected by 1 vulnerability from 1 module. This scan also found 0 vulnerabilities in packages you import and 1 vulnerability in modules you require, but your code doesn't appear to call these vulnerabilities. Use '-show verbose' for more details. ##### # Test govulncheck runs on the subdirectory of a module $ govulncheck -C ${moddir}/vuln/subdir -show=traces . --> FAIL 3 === Symbol Results === Vulnerability #1: GO-2021-0113 Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. More info: https://pkg.go.dev/vuln/GO-2021-0113 Module: golang.org/x/text Found in: golang.org/x/text@v0.3.0 Fixed in: golang.org/x/text@v0.3.7 Example traces found: #1: for function golang.org/x/text/language.Parse subdir/subdir.go:8:16: golang.org/vuln/subdir.Foo language/parse.go:228:6: golang.org/x/text/language.Parse Your code is affected by 1 vulnerability from 1 module. This scan also found 0 vulnerabilities in packages you import and 1 vulnerability in modules you require, but your code doesn't appear to call these vulnerabilities. Use '-show verbose' for more details.
source-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_call_sarif.ct
##### # Test sarif json output $ govulncheck -C ${moddir}/vuln -format sarif ./... { "version": "2.1.0", "$schema": "https://json.schemastore.org/sarif-2.1.0.json", "runs": [ { "tool": { "driver": { "name": "govulncheck", "semanticVersion": "v0.0.0", "informationUri": "https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck", "properties": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "go_version": "go1.18", "scan_level": "symbol", "scan_mode": "source" }, "rules": [ { "id": "GO-2020-0015", "shortDescription": { "text": "[GO-2020-0015] Infinite loop when decoding some inputs in golang.org/x/text" }, "fullDescription": { "text": "Infinite loop when decoding some inputs in golang.org/x/text" }, "help": { "text": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector." }, "helpUri": "https://pkg.go.dev/vuln/GO-2020-0015", "properties": { "tags": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ] } }, { "id": "GO-2021-0054", "shortDescription": { "text": "[GO-2021-0054] Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector." }, "fullDescription": { "text": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector." }, "help": { "text": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector." }, "helpUri": "https://pkg.go.dev/vuln/GO-2021-0054", "properties": { "tags": [ "CVE-2020-36067", "GHSA-p64j-r5f4-pwwx" ] } }, { "id": "GO-2021-0113", "shortDescription": { "text": "[GO-2021-0113] Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack." }, "fullDescription": { "text": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack." }, "help": { "text": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack." }, "helpUri": "https://pkg.go.dev/vuln/GO-2021-0113", "properties": { "tags": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ] } }, { "id": "GO-2021-0265", "shortDescription": { "text": "[GO-2021-0265] A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time." }, "fullDescription": { "text": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time." }, "help": { "text": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time." }, "helpUri": "https://pkg.go.dev/vuln/GO-2021-0265", "properties": { "tags": [ "CVE-2021-42248", "CVE-2021-42836", "GHSA-c9gm-7rfj-8w5h", "GHSA-ppj4-34rq-v8j9" ] } } ] } }, "results": [ { "ruleId": "GO-2020-0015", "level": "note", "message": { "text": "Your code depends on 1 vulnerable module (golang.org/x/text), but doesn't appear to call any of the vulnerable symbols." }, "locations": [ { "physicalLocation": { "artifactLocation": { "uri": "go.mod", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 1 } }, "message": { "text": "Findings for vulnerability GO-2020-0015" } } ] }, { "ruleId": "GO-2021-0054", "level": "error", "message": { "text": "Your code calls vulnerable functions in 1 package (github.com/tidwall/gjson)." }, "locations": [ { "physicalLocation": { "artifactLocation": { "uri": "go.mod", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 1 } }, "message": { "text": "Findings for vulnerability GO-2021-0054" } } ], "codeFlows": [ { "threadFlows": [ { "locations": [ { "module": "golang.org/vuln@", "location": { "physicalLocation": { "artifactLocation": { "uri": "vuln.go", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 14, "startColumn": 20 } }, "message": { "text": "golang.org/vuln.main" } } }, { "module": "github.com/tidwall/gjson@v1.6.5", "location": { "physicalLocation": { "artifactLocation": { "uri": "github.com/tidwall/gjson@v1.6.5/gjson.go", "uriBaseId": "%GOMODCACHE%" }, "region": { "startLine": 297, "startColumn": 12 } }, "message": { "text": "github.com/tidwall/gjson.Result.Get" } } }, { "module": "github.com/tidwall/gjson@v1.6.5", "location": { "physicalLocation": { "artifactLocation": { "uri": "github.com/tidwall/gjson@v1.6.5/gjson.go", "uriBaseId": "%GOMODCACHE%" }, "region": { "startLine": 1881, "startColumn": 36 } }, "message": { "text": "github.com/tidwall/gjson.Get" } } }, { "module": "github.com/tidwall/gjson@v1.6.5", "location": { "physicalLocation": { "artifactLocation": { "uri": "github.com/tidwall/gjson@v1.6.5/gjson.go", "uriBaseId": "%GOMODCACHE%" }, "region": { "startLine": 220, "startColumn": 17 } }, "message": { "text": "github.com/tidwall/gjson.Result.ForEach" } } } ] } ], "message": { "text": "A summarized code flow for vulnerable function github.com/tidwall/gjson.Result.ForEach" } } ], "stacks": [ { "message": { "text": "A call stack for vulnerable function github.com/tidwall/gjson.Result.ForEach" }, "frames": [ { "module": "golang.org/vuln@", "location": { "physicalLocation": { "artifactLocation": { "uri": "vuln.go", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 14, "startColumn": 20 } }, "message": { "text": "golang.org/vuln.main" } } }, { "module": "github.com/tidwall/gjson@v1.6.5", "location": { "physicalLocation": { "artifactLocation": { "uri": "github.com/tidwall/gjson@v1.6.5/gjson.go", "uriBaseId": "%GOMODCACHE%" }, "region": { "startLine": 297, "startColumn": 12 } }, "message": { "text": "github.com/tidwall/gjson.Result.Get" } } }, { "module": "github.com/tidwall/gjson@v1.6.5", "location": { "physicalLocation": { "artifactLocation": { "uri": "github.com/tidwall/gjson@v1.6.5/gjson.go", "uriBaseId": "%GOMODCACHE%" }, "region": { "startLine": 1881, "startColumn": 36 } }, "message": { "text": "github.com/tidwall/gjson.Get" } } }, { "module": "github.com/tidwall/gjson@v1.6.5", "location": { "physicalLocation": { "artifactLocation": { "uri": "github.com/tidwall/gjson@v1.6.5/gjson.go", "uriBaseId": "%GOMODCACHE%" }, "region": { "startLine": 2587, "startColumn": 21 } }, "message": { "text": "github.com/tidwall/gjson.execModifier" } } }, { "module": "github.com/tidwall/gjson@v1.6.5", "location": { "physicalLocation": { "artifactLocation": { "uri": "github.com/tidwall/gjson@v1.6.5/gjson.go", "uriBaseId": "%GOMODCACHE%" }, "region": { "startLine": 2631, "startColumn": 21 } }, "message": { "text": "github.com/tidwall/gjson.modPretty" } } }, { "module": "github.com/tidwall/gjson@v1.6.5", "location": { "physicalLocation": { "artifactLocation": { "uri": "github.com/tidwall/gjson@v1.6.5/gjson.go", "uriBaseId": "%GOMODCACHE%" }, "region": { "startLine": 220, "startColumn": 17 } }, "message": { "text": "github.com/tidwall/gjson.Result.ForEach" } } } ] } ] }, { "ruleId": "GO-2021-0113", "level": "error", "message": { "text": "Your code calls vulnerable functions in 1 package (golang.org/x/text/language)." }, "locations": [ { "physicalLocation": { "artifactLocation": { "uri": "go.mod", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 1 } }, "message": { "text": "Findings for vulnerability GO-2021-0113" } } ], "codeFlows": [ { "threadFlows": [ { "locations": [ { "module": "golang.org/vuln@", "location": { "physicalLocation": { "artifactLocation": { "uri": "vuln.go", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 13, "startColumn": 16 } }, "message": { "text": "golang.org/vuln.main" } } }, { "module": "golang.org/x/text@v0.3.0", "location": { "physicalLocation": { "artifactLocation": { "uri": "golang.org/x/text@v0.3.0/language/parse.go", "uriBaseId": "%GOMODCACHE%" }, "region": { "startLine": 228, "startColumn": 6 } }, "message": { "text": "golang.org/x/text/language.Parse" } } } ] } ], "message": { "text": "A summarized code flow for vulnerable function golang.org/x/text/language.Parse" } } ], "stacks": [ { "message": { "text": "A call stack for vulnerable function golang.org/x/text/language.Parse" }, "frames": [ { "module": "golang.org/vuln@", "location": { "physicalLocation": { "artifactLocation": { "uri": "vuln.go", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 13, "startColumn": 16 } }, "message": { "text": "golang.org/vuln.main" } } }, { "module": "golang.org/x/text@v0.3.0", "location": { "physicalLocation": { "artifactLocation": { "uri": "golang.org/x/text@v0.3.0/language/parse.go", "uriBaseId": "%GOMODCACHE%" }, "region": { "startLine": 228, "startColumn": 6 } }, "message": { "text": "golang.org/x/text/language.Parse" } } } ] } ] }, { "ruleId": "GO-2021-0265", "level": "error", "message": { "text": "Your code calls vulnerable functions in 1 package (github.com/tidwall/gjson)." }, "locations": [ { "physicalLocation": { "artifactLocation": { "uri": "go.mod", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 1 } }, "message": { "text": "Findings for vulnerability GO-2021-0265" } } ], "codeFlows": [ { "threadFlows": [ { "locations": [ { "module": "golang.org/vuln@", "location": { "physicalLocation": { "artifactLocation": { "uri": "vuln.go", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 14, "startColumn": 20 } }, "message": { "text": "golang.org/vuln.main" } } }, { "module": "github.com/tidwall/gjson@v1.6.5", "location": { "physicalLocation": { "artifactLocation": { "uri": "github.com/tidwall/gjson@v1.6.5/gjson.go", "uriBaseId": "%GOMODCACHE%" }, "region": { "startLine": 296, "startColumn": 17 } }, "message": { "text": "github.com/tidwall/gjson.Result.Get" } } } ] } ], "message": { "text": "A summarized code flow for vulnerable function github.com/tidwall/gjson.Result.Get" } } ], "stacks": [ { "message": { "text": "A call stack for vulnerable function github.com/tidwall/gjson.Result.Get" }, "frames": [ { "module": "golang.org/vuln@", "location": { "physicalLocation": { "artifactLocation": { "uri": "vuln.go", "uriBaseId": "%SRCROOT%" }, "region": { "startLine": 14, "startColumn": 20 } }, "message": { "text": "golang.org/vuln.main" } } }, { "module": "github.com/tidwall/gjson@v1.6.5", "location": { "physicalLocation": { "artifactLocation": { "uri": "github.com/tidwall/gjson@v1.6.5/gjson.go", "uriBaseId": "%GOMODCACHE%" }, "region": { "startLine": 296, "startColumn": 17 } }, "message": { "text": "github.com/tidwall/gjson.Result.Get" } } } ] } ] } ] } ] }
source-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_informational_text.ct
##### # Test source mode with no callstacks $ govulncheck -C ${moddir}/informational -show=traces . === Symbol Results === No vulnerabilities found. Your code is affected by 0 vulnerabilities. This scan also found 1 vulnerability in packages you import and 0 vulnerabilities in modules you require, but your code doesn't appear to call these vulnerabilities. Use '-show verbose' for more details.
source-call
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/common/testfiles/source-call/source_multientry_json.ct
##### # Test for multiple call stacks in source mode $ govulncheck -format json -C ${moddir}/multientry . { "config": { "protocol_version": "v1.0.0", "scanner_name": "govulncheck", "scanner_version": "v0.0.0-00000000000-20000101010101", "db": "testdata/vulndb-v1", "db_last_modified": "2023-04-03T15:57:51Z", "go_version": "go1.18", "scan_level": "symbol", "scan_mode": "source" } } { "progress": { "message": "Scanning your code and P packages across M dependent modules for known vulnerabilities..." } } { "progress": { "message": "Fetching vulnerabilities from the database..." } } { "progress": { "message": "Checking the code against the vulnerabilities..." } } { "osv": { "schema_version": "1.3.1", "id": "GO-2021-0113", "modified": "2023-04-03T15:57:51Z", "published": "2021-10-06T17:51:21Z", "aliases": [ "CVE-2021-38561", "GHSA-ppp9-7jff-5vj2" ], "details": "Due to improper index calculation, an incorrectly formatted language tag can cause Parse to panic via an out of bounds read. If Parse is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/language", "symbols": [ "MatchStrings", "MustParse", "Parse", "ParseAcceptLanguage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/340830" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f" } ], "credits": [ { "name": "Guido Vranken" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0113" } } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.5" } ] } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.5", "package": "golang.org/x/text/language" } ] } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.5", "package": "golang.org/x/text/language", "function": "MustParse", "position": { "filename": "language/tags.go", "offset": 427, "line": 13, "column": 6 } }, { "module": "golang.org/multientry", "package": "golang.org/multientry", "function": "foobar", "position": { "filename": "main.go", "offset": 1694, "line": 99, "column": 20 } }, { "module": "golang.org/multientry", "package": "golang.org/multientry", "function": "D", "position": { "filename": "main.go", "offset": 705, "line": 48, "column": 8 } }, { "module": "golang.org/multientry", "package": "golang.org/multientry", "function": "main", "position": { "filename": "main.go", "offset": 441, "line": 26, "column": 3 } } ] } } { "finding": { "osv": "GO-2021-0113", "fixed_version": "v0.3.7", "trace": [ { "module": "golang.org/x/text", "version": "v0.3.5", "package": "golang.org/x/text/language", "function": "Parse", "position": { "filename": "language/parse.go", "offset": 1121, "line": 33, "column": 6 } }, { "module": "golang.org/multientry", "package": "golang.org/multientry", "function": "C", "position": { "filename": "main.go", "offset": 679, "line": 44, "column": 23 } }, { "module": "golang.org/multientry", "package": "golang.org/multientry", "function": "main", "position": { "filename": "main.go", "offset": 340, "line": 22, "column": 3 } } ] } } { "osv": { "schema_version": "1.3.1", "id": "GO-2020-0015", "modified": "2023-04-03T15:57:51Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-14040", "GHSA-5rcv-m4m3-hfh7" ], "summary": "Infinite loop when decoding some inputs in golang.org/x/text", "details": "An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/encoding/unicode", "symbols": [ "bomOverride.Transform", "utf16Decoder.Transform" ] }, { "path": "golang.org/x/text/transform", "symbols": [ "String" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/238238" }, { "type": "FIX", "url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e" }, { "type": "REPORT", "url": "https://go.dev/issue/39491" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0" } ], "credits": [ { "name": "@abacabadabacaba and Anton Gyllenberg" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0015" } } }
main
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vuln/cmd/govulncheck/testdata/main/config.json
{}