You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Update Go to 1.24.13 to fix remaining critical vulnerability (CVE-2025-68121) (#21327)
* Fix CVE-2025-68121: bump Go toolchain to 1.24.13 in local-app
The local-app Go binaries are embedded in the ide-proxy Docker image.
They were compiled with Go 1.24.9 (from the CI environment), which
contains CVE-2025-68121 (critical Go stdlib vulnerability).
Bump the toolchain directive in local-app/go.mod to go1.24.13, which
forces the Go tool to auto-download 1.24.13 regardless of the CI
environment's installed Go version.
Also add apk upgrade to the ide-proxy Dockerfile to pick up Alpine
security patches at build time (matching the proxy Dockerfile pattern).
The .devcontainer/Dockerfile Go version bump is included for dev
environment consistency but does not affect CI builds.
Co-authored-by: Ona <no-reply@ona.com>
* Pin Go 1.24.13 in CI build image to fix CVE-2025-68121
The CI image (dev/image/Dockerfile) inherits Go from the base image
gitpod/workspace-gitpod-dev, which ships Go 1.24.9. That version
contains CVE-2025-68121 (critical Go stdlib vulnerability).
Install Go 1.24.13 explicitly in the CI image so all Go binaries
built in CI use a patched toolchain. Bump TRIGGER_REBUILD to force
an image rebuild.
Co-authored-by: Ona <no-reply@ona.com>
* fix pipeline rot
Co-authored-by: Ona <no-reply@ona.com>
* trigger dev-environment rebuild
Co-authored-by: Ona <no-reply@ona.com>
* Update dev-environment to eu.gcr.io/gitpod-dev-artifact/dev/dev-environment:fix-go-1-24-13-cve-2025-68121-gha.181
---------
Co-authored-by: Ona <no-reply@ona.com>
0 commit comments