Skip to content

fix: bump vulnerable dependencies (CVE scanner)#59

Open
humoflife wants to merge 2 commits intocrossplane-contrib:mainfrom
humoflife:cve-fix/10-cves
Open

fix: bump vulnerable dependencies (CVE scanner)#59
humoflife wants to merge 2 commits intocrossplane-contrib:mainfrom
humoflife:cve-fix/10-cves

Conversation

@humoflife
Copy link
Copy Markdown

CVE Fix

This PR was automatically generated by the Upbound Marketplace CVE Scanner.

It bumps vulnerable Go dependencies to the minimum safe version identified by the OSV vulnerability database.

Vulnerabilities addressed

Severity Package From To Advisory Description
✅ medium golang.org/x/net v0.33.0 v0.36.0 GHSA-qxp5-gwg8-xv66 HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net
✅ medium golang.org/x/net v0.33.0 v0.38.0 GHSA-vvgc-356p-c3xw golang.org/x/net vulnerable to Cross-site Scripting
✅ medium golang.org/x/net v0.33.0 v0.36.0 GO-2025-3503 HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net
✅ medium golang.org/x/net v0.33.0 v0.38.0 GO-2025-3595 Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net
✅ medium golang.org/x/net v0.33.0 v0.45.0 GO-2026-4440 Quadratic parsing complexity in golang.org/x/net/html
✅ medium golang.org/x/net v0.33.0 v0.45.0 GO-2026-4441 Infinite parsing loop in golang.org/x/net
✅ high golang.org/x/oauth2 v0.22.0 v0.27.0 GHSA-6v2p-p543-phr9 golang.org/x/oauth2 Improper Validation of Syntactic Correctness of Input vulnerability
✅ medium golang.org/x/oauth2 v0.22.0 v0.27.0 GO-2025-3488 Unexpected memory consumption during token parsing in golang.org/x/oauth2
✅ critical google.golang.org/grpc v1.67.0 v1.79.3 GHSA-p77j-4mvh-x3m3 gRPC-Go has an authorization bypass via missing leading slash in :path
✅ medium google.golang.org/grpc v1.67.0 v1.79.3 GO-2026-4762 Authorization bypass in gRPC-Go via missing leading slash in :path in google.golang.org/grpc

Verification

✅ Post-fix rescan confirmed all addressed vulnerabilities are resolved in the updated go.mod.

Checklist

  • CI passes
  • go mod tidy has been applied (included in this PR)
  • No unintended API-breaking version bumps

Copy link
Copy Markdown
Member

@jbw976 jbw976 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for this update @humoflife!

Can you please sign the DCO also?

Comment thread go.mod
module github.com/crossplane-contrib/function-dummy

go 1.24
go 1.24.0
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i think there were a bunch of go stdlib vulnerabilities fixed in go v1.25.9, e.g.:

Did the scans you ran find those too?

- golang.org/x/net v0.33.0 → v0.36.0 (GHSA-qxp5-gwg8-xv66)
- golang.org/x/net v0.33.0 → v0.38.0 (GHSA-vvgc-356p-c3xw)
- golang.org/x/net v0.33.0 → v0.36.0 (GO-2025-3503)
- golang.org/x/net v0.33.0 → v0.38.0 (GO-2025-3595)
- golang.org/x/net v0.33.0 → v0.45.0 (GO-2026-4440)
- golang.org/x/net v0.33.0 → v0.45.0 (GO-2026-4441)
- golang.org/x/oauth2 v0.22.0 → v0.27.0 (GHSA-6v2p-p543-phr9)
- golang.org/x/oauth2 v0.22.0 → v0.27.0 (GO-2025-3488)
- google.golang.org/grpc v1.67.0 → v1.79.3 (GHSA-p77j-4mvh-x3m3)
- google.golang.org/grpc v1.67.0 → v1.79.3 (GO-2026-4762)

Signed-off-by: humoflife <markus.schweig@upbound.io>
Fixes 5 reachable Go standard library vulnerabilities:
- GO-2026-4947: Unexpected work during chain building in crypto/x509
- GO-2026-4946: Inefficient policy validation in crypto/x509
- GO-2026-4870: Unauthenticated TLS 1.3 KeyUpdate DoS in crypto/tls
- GO-2026-4866: Case-sensitive excludedSubtrees Auth Bypass in crypto/x509
- GO-2026-4865: JsBraceDepth XSS in html/template

Also present in stdlib but no reachable call chain:
- GO-2026-4864: TOCTOU root escape via Root.Chmod (Linux, os pkg)
- GO-2026-4869: Unbounded allocation in archive/tar

All fixed in go1.26.2 (and go1.25.9). Confirmed clean with govulncheck.

Signed-off-by: humoflife <markus.schweig@upbound.io>
@humoflife
Copy link
Copy Markdown
Author

Hi @jbw976 — good catch! The original CVE scanner only scanned Go module dependencies against the OSV database; it did not audit the Go standard library, so those stdlib vulnerabilities were missed.

I ran govulncheck ./... (with the freshly rebuilt tool against the current Go version) and confirmed the following stdlib CVEs do affect this project (reachable call chains exist):

ID Package Description Fixed in
GO-2026-4947 crypto/x509 Unexpected work during chain building go1.26.2 / go1.25.9
GO-2026-4946 crypto/x509 Inefficient policy validation go1.26.2 / go1.25.9
GO-2026-4870 crypto/tls Unauthenticated TLS 1.3 KeyUpdate DoS go1.26.2 / go1.25.9
GO-2026-4866 crypto/x509 Case-sensitive excludedSubtrees auth bypass go1.26.2 / go1.25.9
GO-2026-4865 html/template JsBraceDepth XSS go1.26.2 / go1.25.9

Two more stdlib CVEs are present in the dependency graph but have no reachable call chain from this module:

ID Package Description
GO-2026-4869 archive/tar Unbounded allocation for old GNU sparse
GO-2026-4864 os (Linux) TOCTOU root escape via Root.Chmod

Fix applied in this PR: bumped the toolchain directive from go1.24.4go1.26.2. A follow-up govulncheck ./... returns no vulnerabilities found.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants