fix: bump vulnerable dependencies (CVE scanner)#59
fix: bump vulnerable dependencies (CVE scanner)#59humoflife wants to merge 2 commits intocrossplane-contrib:mainfrom
Conversation
jbw976
left a comment
There was a problem hiding this comment.
Thanks for this update @humoflife!
Can you please sign the DCO also?
| module github.com/crossplane-contrib/function-dummy | ||
|
|
||
| go 1.24 | ||
| go 1.24.0 |
There was a problem hiding this comment.
i think there were a bunch of go stdlib vulnerabilities fixed in go v1.25.9, e.g.:
- https://pkg.go.dev/vuln/GO-2026-4947
- https://pkg.go.dev/vuln/GO-2026-4946
- https://pkg.go.dev/vuln/GO-2026-4870
- https://pkg.go.dev/vuln/GO-2026-4869
- etc.
Did the scans you ran find those too?
- golang.org/x/net v0.33.0 → v0.36.0 (GHSA-qxp5-gwg8-xv66) - golang.org/x/net v0.33.0 → v0.38.0 (GHSA-vvgc-356p-c3xw) - golang.org/x/net v0.33.0 → v0.36.0 (GO-2025-3503) - golang.org/x/net v0.33.0 → v0.38.0 (GO-2025-3595) - golang.org/x/net v0.33.0 → v0.45.0 (GO-2026-4440) - golang.org/x/net v0.33.0 → v0.45.0 (GO-2026-4441) - golang.org/x/oauth2 v0.22.0 → v0.27.0 (GHSA-6v2p-p543-phr9) - golang.org/x/oauth2 v0.22.0 → v0.27.0 (GO-2025-3488) - google.golang.org/grpc v1.67.0 → v1.79.3 (GHSA-p77j-4mvh-x3m3) - google.golang.org/grpc v1.67.0 → v1.79.3 (GO-2026-4762) Signed-off-by: humoflife <markus.schweig@upbound.io>
de5f2a6 to
907baf5
Compare
Fixes 5 reachable Go standard library vulnerabilities: - GO-2026-4947: Unexpected work during chain building in crypto/x509 - GO-2026-4946: Inefficient policy validation in crypto/x509 - GO-2026-4870: Unauthenticated TLS 1.3 KeyUpdate DoS in crypto/tls - GO-2026-4866: Case-sensitive excludedSubtrees Auth Bypass in crypto/x509 - GO-2026-4865: JsBraceDepth XSS in html/template Also present in stdlib but no reachable call chain: - GO-2026-4864: TOCTOU root escape via Root.Chmod (Linux, os pkg) - GO-2026-4869: Unbounded allocation in archive/tar All fixed in go1.26.2 (and go1.25.9). Confirmed clean with govulncheck. Signed-off-by: humoflife <markus.schweig@upbound.io>
|
Hi @jbw976 — good catch! The original CVE scanner only scanned Go module dependencies against the OSV database; it did not audit the Go standard library, so those stdlib vulnerabilities were missed. I ran
Two more stdlib CVEs are present in the dependency graph but have no reachable call chain from this module:
Fix applied in this PR: bumped the |
CVE Fix
This PR was automatically generated by the Upbound Marketplace CVE Scanner.
It bumps vulnerable Go dependencies to the minimum safe version identified by the OSV vulnerability database.
Vulnerabilities addressed
golang.org/x/netv0.33.0v0.36.0golang.org/x/netv0.33.0v0.38.0golang.org/x/netv0.33.0v0.36.0golang.org/x/netv0.33.0v0.38.0golang.org/x/netv0.33.0v0.45.0golang.org/x/netv0.33.0v0.45.0golang.org/x/oauth2v0.22.0v0.27.0golang.org/x/oauth2v0.22.0v0.27.0google.golang.org/grpcv1.67.0v1.79.3google.golang.org/grpcv1.67.0v1.79.3Verification
✅ Post-fix rescan confirmed all addressed vulnerabilities are resolved in the updated
go.mod.Checklist
go mod tidyhas been applied (included in this PR)