Closed as not planned
Description
govulncheck version
Go: go1.23.5
Scanner: [email protected]
DB: https://vuln.go.dev
DB updated: 2025-01-29 20:18:58 +0000 UTC
Does this issue reproduce at the latest version of golang.org/x/vuln?
Yes
Output of go env
in your module/workspace:
GO111MODULE='on'
GOARCH='arm64'
GOBIN=''
GOCACHE='/Users/mitchell/Library/Caches/go-build'
GOENV='/Users/mitchell/Library/Application Support/go/env'
GOEXE=''
GOEXPERIMENT=''
GOFLAGS=''
GOHOSTARCH='arm64'
GOHOSTOS='darwin'
GOINSECURE=''
GOMODCACHE='/Users/mitchell/go/pkg/mod'
GONOPROXY=''
GONOSUMDB=''
GOOS='darwin'
GOPATH='/Users/mitchell/go'
GOPRIVATE=''
GOPROXY='https://proxy.golang.org,direct'
GOROOT='/opt/homebrew/opt/go/libexec'
GOSUMDB='sum.golang.org'
GOTMPDIR=''
GOTOOLCHAIN='auto'
GOTOOLDIR='/opt/homebrew/opt/go/libexec/pkg/tool/darwin_arm64'
GOVCS=''
GOVERSION='go1.23.5'
GODEBUG=''
GOTELEMETRY='local'
GOTELEMETRYDIR='/Users/mitchell/Library/Application Support/go/telemetry'
GCCGO='gccgo'
GOARM64='v8.0'
AR='ar'
CC='cc'
CXX='c++'
CGO_ENABLED='1'
GOMOD='/dev/null'
GOWORK=''
CGO_CFLAGS='-O2 -g'
CGO_CPPFLAGS=''
CGO_CXXFLAGS='-O2 -g'
CGO_FFLAGS='-O2 -g'
CGO_LDFLAGS='-O2 -g'
PKG_CONFIG='pkg-config'
GOGCCFLAGS='-fPIC -arch arm64 -pthread -fno-caret-diagnostics -Qunused-arguments -fmessage-length=0 -ffile-prefix-map=/var/folders/c6/4l4ylj_530z56dccw0b7_pq00000gn/T/go-build2006941850=/tmp/go-build -gno-record-gcc-switches -fno-common'
What did you do?
Using github.com/mattermost/mattermost/server/public/model
in my project, which has a dependency on github.com/hashicorp/yamux
(which I don't use) causes [email protected]
to imply that GO-2025-3408
affects me (via sync.Once
which is called by time.LoadLocation
).
Sample code
package main
import (
"fmt"
"time"
"github.com/mattermost/mattermost/server/public/model"
)
func main() {
// Use something that calls `sync.Once`
netherlands, err := time.LoadLocation("Europe/Amsterdam")
if err != nil {
panic(err)
}
// Just use anything from the Mattermost package as an example
post := &model.Post{Message: "Hello!", ChannelId: "ID"}
// Output because we can
fmt.Println(netherlands, post.Message)
}
Repository: https://github.com/ping-localhost/vuln-check-reproducible
What did you see happen?
[16:56:12] ➜ vuln-check-reproducible git:(master) govulncheck ./...
=== Symbol Results ===
Vulnerability #1: GO-2025-3408
DefaultConfig has dangerous defaults causing hung Read in
github.com/hashicorp/yamux
More info: https://pkg.go.dev/vuln/GO-2025-3408
Module: github.com/hashicorp/yamux
Found in: github.com/hashicorp/[email protected]
Fixed in: N/A
Example traces found:
#1: main.go:12:39: vuln.main calls time.LoadLocation, which eventually calls yamux.Client
#2: main.go:12:39: vuln.main calls time.LoadLocation, which eventually calls yamux.DefaultConfig
Your code is affected by 1 vulnerability from 1 module.
This scan found no other vulnerabilities in packages you import or modules you
require.
Use '-show verbose' for more details.
What did you expect to see?
Since I never actually use Yamux, I do not expect the CVE to be picked up. Somewhere along the line govulncheck
thinks that sync.Once.Do
will call yamux
.