Skip to content

Security: c3-e/gosu

Security

SECURITY.md

CVEs

This project does not rebuild/release to "fix" CVEs which do not apply to actual builds of gosu. For example, this includes any CVE in Go which applies to interfaces that gosu does not ever invoke, such as net/http, archive/tar, encoding/xml, etc.

Before reporting that gosu is "vulnerable" to a particular CVE, please run our ./govulncheck-with-excludes.sh wrapper around govulncheck to determine whether the latest release is actually using the vulnerable functionality. See this excellent blog post from the Go team for more information about the govulncheck tool and the methodology by which it is maintained.

If you have a tool which is reporting that gosu is vulnerable to a particular CVE but govulncheck does not agree, please report this as a false positive to your CVE scanning vendor so that they can improve their tooling. (If you wish to verify that your reported CVE is part of govulncheck's dataset and thus covered by their tool, you can check the vulndb repository where they track those.)

Our wrapper script (govulncheck-with-excludes.sh) includes a very small set of vulnerabilities that will be reported by govulncheck which do not apply (due to other mitigations or otherwise).

Reporting Vulnerabilities

The surface area of gosu itself is really limited -- it only directly contains a small amount of Go code to instrument an interface that is part of runc (and which itself is a pretty limited interface) for providing the same behavior as Docker's --user flag, but from within a running container.

If you believe you have found a new vulnerability in gosu, chances are very high that it's actually a vulnerability in runc (or at the very least, runc's code), and should be reported appropriately and responsibly.

After all this, if you still believe you have discovered a novel vulnerability in the limited code that is gosu itself, please use GitHub's (private) advisory reporting feature to responsibly report it.

There aren’t any published security advisories