golang-src vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the golang-src package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.22.7-1.amzn2.0.1
  • H
Uncontrolled Recursion

<0:1.22.7-1.amzn2.0.1
  • H
Uncontrolled Recursion

<0:1.22.7-1.amzn2.0.1
  • M
Improper Input Validation

<0:1.22.5-1.amzn2.0.1
  • M
Misinterpretation of Input

<0:1.22.4-1.amzn2.0.1
  • M
Improper Input Validation

<0:1.22.4-1.amzn2.0.1
  • M
Information Exposure

<0:1.22.3-1.amzn2.0.1
  • M
Arbitrary Code Injection

<0:1.22.3-1.amzn2.0.1
  • M
Improper Input Validation

<0:1.22.3-1.amzn2.0.1
  • M
Misinterpretation of Input

<0:1.22.3-1.amzn2.0.1
  • H
HTTP Request Smuggling

<0:1.13.4-1.amzn2.0.1
  • M
Resource Exhaustion

<0:1.22.3-1.amzn2.0.1
  • M
Improper Input Validation

<0:1.22.3-1.amzn2.0.1
  • H
Improper Certificate Validation

<0:1.13.4-1.amzn2.0.1
  • M
Resource Exhaustion

<0:1.20.12-1.amzn2.0.1
  • M
CVE-2023-45284

<0:1.20.12-1.amzn2.0.1
  • M
Directory Traversal

<0:1.20.12-1.amzn2.0.1
  • H
Cross-site Scripting (XSS)

<0:1.20.10-1.amzn2.0.1
  • H
Cross-site Scripting (XSS)

<0:1.20.10-1.amzn2.0.1
  • H
Resource Exhaustion

<0:1.20.10-1.amzn2.0.1
  • H
Resource Exhaustion

<0:1.20.10-1.amzn2.0.1
  • H
Arbitrary Code Injection

<0:1.20.10-1.amzn2.0.1
  • M
Resource Exhaustion

<0:1.20.7-1.amzn2.0.1
  • H
HTTP Response Splitting

<0:1.20.6-1.amzn2.0.1
  • H
Arbitrary Code Injection

<0:1.20.5-1.amzn2.0.2
  • H
Exposure of Resource to Wrong Sphere

<0:1.20.5-1.amzn2.0.2
  • H
Improper Handling of Unicode Encoding

<0:1.20.5-1.amzn2.0.2
  • H
Arbitrary Code Injection

<0:1.20.5-1.amzn2.0.2
  • H
Resource Exhaustion

<0:1.20.5-1.amzn2.0.2
  • H
Resource Exhaustion

<0:1.20.5-1.amzn2.0.2
  • H
Incorrect Calculation

<0:1.20.5-1.amzn2.0.2
  • H
Arbitrary Code Injection

<0:1.20.5-1.amzn2.0.2
  • H
Improper Handling of Unicode Encoding

<0:1.20.5-1.amzn2.0.2
  • H
Resource Exhaustion

<0:1.20.5-1.amzn2.0.2
  • H
Arbitrary Code Injection

<0:1.18.9-1.amzn2.0.6
  • H
Improper Handling of Unicode Encoding

<0:1.18.9-1.amzn2.0.5
  • H
Resource Exhaustion

<0:1.18.9-1.amzn2.0.4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.18.9-1.amzn2.0.3
  • H
Resource Exhaustion

<0:1.18.9-1.amzn2.0.2
  • H
Resource Exhaustion

<0:1.18.9-1.amzn2.0.2
  • H
HTTP Request Smuggling

<0:1.18.9-1.amzn2.0.2
  • H
Arbitrary Code Injection

<0:1.18.9-1.amzn2.0.2
  • H
Resource Exhaustion

<0:1.18.9-1.amzn2.0.2
  • H
Incorrect Calculation

<0:1.18.9-1.amzn2.0.2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.18.9-1.amzn2.0.2
  • H
Resource Exhaustion

<0:1.18.9-1.amzn2.0.2
  • H
Arbitrary Code Injection

<0:1.18.9-1.amzn2.0.2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.18.9-1.amzn2.0.2
  • H
Resource Exhaustion

<0:1.18.9-1.amzn2.0.2
  • H
Directory Traversal

<0:1.18.9-1.amzn2.0.2
  • M
Allocation of Resources Without Limits or Throttling

<0:1.18.9-1.amzn2.0.1
  • H
CVE-2022-41715

<0:1.18.8-1.amzn2.0.1
  • H
CVE-2022-41716

<0:1.18.8-1.amzn2.0.1
  • H
Allocation of Resources Without Limits or Throttling

<0:1.18.8-1.amzn2.0.1
  • M
Resource Exhaustion

<0:1.18.6-1.amzn2
  • H
Resource Exhaustion

<0:1.18.5-1.amzn2
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.18.5-1.amzn2
  • H
Information Exposure

<0:1.18.5-1.amzn2
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.18.5-1.amzn2
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.18.5-1.amzn2
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.18.5-1.amzn2
  • H
Improper Privilege Management

<0:1.18.5-1.amzn2
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.18.5-1.amzn2
  • H
Integer Overflow or Wraparound

<0:1.18.5-1.amzn2
  • H
Buffer Overflow

<0:1.18.5-1.amzn2
  • H
HTTP Request Smuggling

<0:1.18.5-1.amzn2
  • H
Insufficient Entropy

<0:1.18.5-1.amzn2
  • H
Authorization Bypass Through User-Controlled Key

<0:1.18.5-1.amzn2
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.18.5-1.amzn2
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:1.18.5-1.amzn2
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.18.5-1.amzn2
  • H
Integer Overflow or Wraparound

<0:1.18.3-1.amzn2
  • H
Buffer Overflow

<0:1.18.3-1.amzn2
  • H
Incorrect Authorization

<0:1.18.3-1.amzn2
  • H
Resource Exhaustion

<0:1.18.3-1.amzn2
  • H
Integer Overflow or Wraparound

<0:1.18.3-1.amzn2
  • H
Resource Exhaustion

<0:1.18.3-1.amzn2
  • H
Unchecked Return Value

<0:1.18.3-1.amzn2
  • H
Improper Input Validation

<0:1.18.3-1.amzn2
  • H
Race Condition

<0:1.18.3-1.amzn2
  • H
Improper Input Validation

<0:1.18.3-1.amzn2
  • H
Improper Input Validation

<0:1.18.3-1.amzn2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.18.3-1.amzn2
  • H
NULL Pointer Dereference

<0:1.18.3-1.amzn2
  • H
Resource Exhaustion

<0:1.18.3-1.amzn2
  • H
Improper Input Validation

<0:1.18.3-1.amzn2
  • H
Resource Exhaustion

<0:1.16.15-1.amzn2.0.1
  • H
Information Exposure

<0:1.16.15-1.amzn2.0.1
  • H
Resource Exhaustion

<0:1.16.15-1.amzn2.0.1
  • H
Incorrect Authorization

<0:1.16.15-1.amzn2.0.1
  • H
Unchecked Return Value

<0:1.16.15-1.amzn2.0.1
  • H
Integer Overflow or Wraparound

<0:1.16.15-1.amzn2.0.1
  • H
Improper Input Validation

<0:1.16.15-1.amzn2.0.1
  • H
Resource Exhaustion

<0:1.16.15-1.amzn2.0.1
  • H
Improper Input Validation

<0:1.16.15-1.amzn2.0.1
  • H
Out-of-Bounds

<0:1.16.15-1.amzn2.0.1
  • H
Integer Overflow or Wraparound

<0:1.16.15-1.amzn2.0.1
  • H
Resource Exhaustion

<0:1.16.15-1.amzn2.0.1
  • H
Incorrect Authorization

<0:1.16.15-1.amzn2.0.1
  • H
Unchecked Return Value

<0:1.16.15-1.amzn2.0.1
  • H
Resource Exhaustion

<0:1.16.15-1.amzn2.0.1
  • H
Improper Input Validation

<0:1.16.15-1.amzn2.0.1
  • H
Resource Exhaustion

<0:1.16.15-1.amzn2.0.1
  • H
Out-of-Bounds

<0:1.16.15-1.amzn2.0.1
  • H
Information Exposure

<0:1.16.15-1.amzn2.0.1
  • H
Improper Input Validation

<0:1.16.15-1.amzn2.0.1
  • M
Resource Exhaustion

<0:1.15.14-1.amzn2.0.1
  • M
Improper Certificate Validation

<0:1.15.14-1.amzn2.0.1
  • M
Uncontrolled Recursion

<0:1.15.12-1.amzn2.0.1
  • M
Arbitrary Code Injection

<0:1.15.8-1.amzn2.0.1
  • M
Incorrect Calculation

<0:1.15.8-1.amzn2.0.1
  • M
Arbitrary Code Injection

<0:1.15.5-1.amzn2.0.2
  • M
Arbitrary Argument Injection

<0:1.15.5-1.amzn2.0.2
  • M
Improper Certificate Validation

<0:1.15.5-1.amzn2.0.2
  • M
Cross-site Scripting (XSS)

<0:1.15.3-1.amzn2.0.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.13.15-1.amzn2.0.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.13.15-1.amzn2.0.1
  • M
Race Condition

<0:1.13.14-1.amzn2.0.1
  • M
HTTP Request Smuggling

<0:1.13.4-1.amzn2.0.1
  • M
HTTP Request Smuggling

<0:1.9.4-3.amzn2.0.3
  • M
CVE-2019-14809

<0:1.9.4-3.amzn2.0.3
  • H
Allocation of Resources Without Limits or Throttling

<0:1.9.4-3.amzn2.0.2
  • H
Resource Exhaustion

<0:1.9.4-3.amzn2.0.2
  • M
Allocation of Resources Without Limits or Throttling

<0:1.9.4-3.amzn2.0.1
  • M
Cleartext Transmission of Sensitive Information

<0:1.9.4-1.amzn2
  • M
Arbitrary Code Injection

<0:1.9.4-1.amzn2
  • M
CVE-2017-15041

<0:1.9.4-1.amzn2