-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Static analysis : gosec high issue : G402 (CWE-295): TLS MinVersion too low. #1553
Labels
Comments
monkey92t
added a commit
to monkey92t/redis
that referenced
this issue
Jul 30, 2021
Signed-off-by: monkey92t <golang@88.com>
monkey92t
added a commit
to monkey92t/redis
that referenced
this issue
Jul 30, 2021
Signed-off-by: monkey92t <golang@88.com>
Merged
Hello guys ! Do you have some informations about the release of v9 which include this patch ? My Ci is down since i have this issue :( Thank in advance, |
v9 version needs to wait for a while. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Running gosec on go-redis/redis reports one issue with High confidence and high severity.
The issue reported is : G402 (CWE-295): TLS MinVersion too low. (Confidence: HIGH, Severity: HIGH)
Expected Behavior
When running inside project the following:
gosec -quiet -confidence high -severity high ./...
It should return 0 issues with high severity and confidence
Current Behavior
When running inside project the following:
gosec -quiet -confidence high -severity high ./...
It returns:
Possible Solution
It can be fixed by either specifying the MinVersion parameter in TLSConfig, or by disabling the reporting of the issue if you believe it is not a true error.
Steps to Reproduce
I am seeing this issue on commit:
With gosec version:
To reproduce, just run the gosec tool at the repo root:
gosec -quiet -confidence high -severity high ./...
Context (Environment)
In my CICD pipeline I perform gosec on the go dependencies I am using. I personally set the cursor for failure if any issue with HIGH confidence and HIGH severity are found. I was thinking it could impact other people in the same way.
Possible implementation:
Either:
// #nosec G402
like they did hereOR
options.go
fileThanks for your redis lib ;)
The text was updated successfully, but these errors were encountered: