Skip to content

Commit 7df32c8

Browse files
committed
CHANGELOG.md: addresses comments from cl/457476
Change-Id: I11ad04dce1cb24808c8b6dea7a153e8fa54a37ae Reviewed-on: https://go-review.googlesource.com/c/vscode-go/+/457575 Run-TryBot: Hyang-Ah Hana Kim <[email protected]> Reviewed-by: Alan Donovan <[email protected]> TryBot-Result: kokoro <[email protected]>
1 parent f820eae commit 7df32c8

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

CHANGELOG.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
## v0.37.0 - 19 Dec, 2022
22

3-
This release includes a new [code analysis feature](https://github.com/golang/vscode-go/wiki/features#analyze-vulnerabilities-in-dependencies) that surfaces known vulnerabilities in your dependencies. This vulncheck analyzer is backed by [Go's vulnerability database](https://go.dev/security/vulndb) and the Go language server's integration of [`govulncheck`](https://golang.org/x/vuln/cmd/govulncheck").
3+
This release includes new [static analysis features](https://github.com/golang/vscode-go/wiki/features#analyze-vulnerabilities-in-dependencies) that report known vulnerabilities in your dependencies. These vulncheck analysis tools are backed by [Go's vulnerability database](https://go.dev/security/vulndb) and the Go language server's integration of [`govulncheck`](https://golang.org/x/vuln/cmd/govulncheck").
44
Read [Go's support for vulnerability management](https://go.dev/blog/vuln) to learn about the Go team's approach to helping Go developers secure their open-source dependencies.
55

66
### Changes
77
- The new "Go: Toggle Vulncheck" command enables/disables imports-based vulnerability analysis. This requires gopls v0.11.0 or newer.
8-
- Test and debug test codelenses are added to some subtests if the test names can be determined. ([Issue 2536](https://github.com/golang/vscode-go/issues/2536))
8+
- Test and debug test code lenses are added to some subtests if the test names can be determined. ([Issue 2536](https://github.com/golang/vscode-go/issues/2536))
99
- Gopls settings was updated to match [email protected].
1010
- `"go.formatTool"` setting accepts a special value `"custom"`, which causes the extension to use the custom formatter configured with the setting `"go.alternateTools": { "customFormatter": <your custom tool name> }`. ([Issue 2503](https://github.com/golang/vscode-go/issues/2503))
1111
- The experimental "Go: Run Vulncheck (exp)" command was removed.
@@ -14,7 +14,7 @@ Read [Go's support for vulnerability management](https://go.dev/blog/vuln) to le
1414
### Fixes
1515
- The editor survey prompt logic was adjusted for uniform sampling. ([Issue 2545](https://github.com/golang/vscode-go/issues/2545))
1616
- Fixed the crash bug when handling coverage profiles involving go `//line`-directive. ([Issue 2453](https://github.com/golang/vscode-go/issues/2453))
17-
- Updated dependencies to address GHSA-3rfm-jhwj-7488 and GHSA-hrpp-h998-j3pp.
17+
- Updated dependencies to address [CVE-2022-37603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37603) and [CVE-2022-24999](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24999).
1818

1919
### Thanks
2020

0 commit comments

Comments
 (0)