Affected by GO-2024-2617
and 5 other vulnerabilities
GO-2024-2617 : Authentication bypass in github.com/hashicorp/vault
GO-2024-2690 : HashiCorpVault does not correctly validate OCSP responses in github.com/hashicorp/vault
GO-2024-2921 : HashiCorp Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims in github.com/hashicorp/vault
GO-2024-2982 : Hashicorp Vault vulnerable to Improper Check or Handling of Exceptional Conditions in github.com/hashicorp/vault
GO-2024-3162 : Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default in github.com/hashicorp/vault
GO-2024-3191 : Vault Community Edition privilege escalation vulnerability in github.com/hashicorp/vault
Discover Packages
github.com/hashicorp/vault
helper
locking
package
Version:
v1.14.7
Opens a new window with list of versions in this module.
Published: Nov 21, 2023
License: MPL-2.0
Opens a new window with license information.
Imports: 2
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
type DeadlockMutex struct {
deadlock.Mutex
}
DeadlockMutex (used when requested via config option `detact_deadlocks`),
behaves like a sync.Mutex but does periodic checking to see if outstanding
locks and requests look like a deadlock. If it finds a deadlock candidate it
will output it prefixed with "POTENTIAL DEADLOCK", as described at
https://github.com/sasha-s/go-deadlock
type DeadlockRWMutex struct {
deadlock.RWMutex
}
DeadlockRWMutex is the RW version of DeadlockMutex.
type Mutex interface {
Lock()
Unlock()
}
Common mutex interface to allow either built-in or imported deadlock use
type RWMutex interface {
Lock()
RLock()
RLocker() sync .Locker
RUnlock()
Unlock()
}
Common r/w mutex interface to allow either built-in or imported deadlock use
DeadlockRWMutex is the RW version of SyncMutex.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.