Home / Vulnerability Database / Go : unsafe package usage
Go
Go : unsafe package usage
Classification
PCI DSS 4.0
Overview
The application uses the unsafe package. Incorrect work with memory and problems with portability of the application is possible.
In Go, there are built-in mechanisms for safe work with memory: pointers can not point to arbitrary memory, and buffer overruns result in crashes, not security exploits. The unsafe package allows programmers to bypass some of Go protection mechanisms.
In addition, according to the documentation, packages that import unsafe may be non-portable and are not protected by the Go 1 compatibility guidelines.
References
LOW
DerScanner Severity Score
Do you want to fix Go : unsafe package usage in your application?
See also
Go
Go : Undocumented feature: special account
Go
Go : Nil salt
Go
