-
Notifications
You must be signed in to change notification settings - Fork 9
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
2 changed files
with
6 additions
and
3 deletions.
There are no files selected for viewing
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -23,17 +23,18 @@ fixtures/locks-e2e/2-go.mod: found 73 packages | |
GHSA-8c26-wmh5-6g9v: golang.org/x/crypto/ssh Denial of service via crafted Signer (https://github.com/advisories/GHSA-8c26-wmh5-6g9v) | ||
GHSA-gwc9-m7rh-j2ww: x/crypto/ssh vulnerable to panic via malformed packets (https://github.com/advisories/GHSA-gwc9-m7rh-j2ww) | ||
golang.org/x/[email protected] is affected by the following vulnerabilities: | ||
GHSA-2wrh-6pvc-2jm9: Improper rendering of text nodes in golang.org/x/net/html (https://github.com/advisories/GHSA-2wrh-6pvc-2jm9) | ||
GHSA-4374-p667-p6c8: HTTP/2 rapid reset can cause excessive work in net/http (https://github.com/advisories/GHSA-4374-p667-p6c8) | ||
GHSA-69cg-p879-7622: golang.org/x/net/http2 Denial of Service vulnerability (https://github.com/advisories/GHSA-69cg-p879-7622) | ||
GHSA-83g2-8m93-v3w7: golang.org/x/net/html Infinite Loop vulnerability (https://github.com/advisories/GHSA-83g2-8m93-v3w7) | ||
GHSA-h86h-8ppg-mxmh: golang.org/x/net/http/httpguts vulnerable to Uncontrolled Recursion (https://github.com/advisories/GHSA-h86h-8ppg-mxmh) | ||
GHSA-vvpx-j8f3-3w6h: Uncontrolled Resource Consumption (https://github.com/advisories/GHSA-vvpx-j8f3-3w6h) | ||
GO-2022-0288: Unbounded memory growth in net/http and golang.org/x/net/http2 | ||
GO-2022-1144: Excessive memory growth in net/http and golang.org/x/net/http2 | ||
GO-2023-1988: Improper rendering of text nodes in golang.org/x/net/html | ||
golang.org/x/[email protected] is affected by the following vulnerabilities: | ||
GHSA-p782-xgp4-8hr8: golang.org/x/sys/unix has Incorrect privilege reporting in syscall (https://github.com/advisories/GHSA-p782-xgp4-8hr8) | ||
golang.org/x/[email protected] is affected by the following vulnerabilities: | ||
GHSA-69ch-w2m2-3vjp: golang.org/x/text/language Denial of service via crafted Accept-Language header (https://github.com/advisories/GHSA-69ch-w2m2-3vjp) | ||
GHSA-ppp9-7jff-5vj2: golang.org/x/text/language Out-of-bounds Read vulnerability (https://github.com/advisories/GHSA-ppp9-7jff-5vj2) | ||
|
||
24 known vulnerabilities found in fixtures/locks-e2e/2-go.mod | ||
25 known vulnerabilities found in fixtures/locks-e2e/2-go.mod |