Affected by GO-2022-0559
and 10 other vulnerabilities
GO-2022-0559: HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. in github.com/hashicorp/consul
GO-2022-0593: HashiCorp Consul Privilege Escalation Vulnerability in github.com/hashicorp/consul
GO-2022-0615: Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector in github.com/hashicorp/consul
GO-2022-0953: HashiCorp Consul Ingress Gateway Panic Can Shutdown Servers in github.com/hashicorp/consul
GO-2022-1029: HashiCorp Consul vulnerable to authorization bypass in github.com/hashicorp/consul
GO-2023-1827: Hashicorp Consul vulnerable to denial of service in github.com/hashicorp/consul
GO-2024-3241: Hashicorp Consul Improper Neutralization of HTTP Headers for Scripting Syntax vulnerability in github.com/hashicorp/consul
GO-2024-3242: Hashicorp Consul Cross-site Scripting vulnerability in github.com/hashicorp/consul
GO-2024-3243: Hashicorp Consul Path Traversal vulnerability in github.com/hashicorp/consul
GO-2025-4081: Consul key/value endpoint is vulnerable to denial of service in github.com/hashicorp/consul
GO-2025-4082: Consul event endpoint is vulnerable to denial of service in github.com/hashicorp/consul
Package mutex implements the sync.Locker interface using x/sync/semaphore. It
may be used as a replacement for sync.Mutex when one or more goroutines need to
allow their calls to Lock to be cancelled by context cancellation.
TryLock acquires the mutex, blocking until resources are available or ctx is
done. On success, returns nil. On failure, returns ctx.Err() and leaves the
semaphore unchanged.
If ctx is already done, Acquire may still succeed without blocking.