Skip to content

fix(security): update Go from 1.24.4 to 1.25.7 to address multiple CVEs#696

Merged
tembleking merged 1 commit intomasterfrom
fix/go-security-vulnerabilities
Feb 5, 2026
Merged

fix(security): update Go from 1.24.4 to 1.25.7 to address multiple CVEs#696
tembleking merged 1 commit intomasterfrom
fix/go-security-vulnerabilities

Conversation

@tembleking
Copy link
Copy Markdown
Member

Summary

Update Go version from 1.24.4 to 1.25.7 to fix 17+ security vulnerabilities in the standard library, including 3 critical RCE/code injection vulnerabilities.

Vulnerabilities Fixed

Go 1.24.5 (July 2025)

CVE Component Severity Description
CVE-2025-4674 cmd/go High Unexpected command execution in untrusted VCS repositories

Go 1.24.6 (August 2025)

CVE Component Severity Description
CVE-2025-47906 os/exec Medium LookPath returns unexpected paths when PATH contains executables
CVE-2025-47907 database/sql Medium Race condition in Rows.Scan() can overwrite parallel query results

Go 1.24.8 / 1.25.2 (October 2025)

CVE Component Severity Description
CVE-2025-58186 net/http High Memory exhaustion: no limit on number of cookies parsed
CVE-2025-58187 crypto/x509 High DoS: name constraint checking scales non-linearly with cert size
CVE-2025-61724 net/textproto Medium CPU exhaustion in Reader.ReadResponse with many short lines

Go 1.24.11 / 1.25.5 (December 2025)

CVE Component Severity Description
CVE-2025-61727 crypto/x509 High Excluded subdomain constraints don't restrict wildcard SANs
CVE-2025-61729 crypto/x509 Medium DoS: HostnameError.Error() O(n²) string concatenation

Go 1.24.12 / 1.25.6 (January 2026)

CVE Component Severity Description
CVE-2025-61726 net/url High Memory exhaustion: no limit on query parameters
CVE-2025-61728 archive/zip Medium DoS: super-linear filename indexing with malicious ZIPs
CVE-2025-61730 crypto/tls Medium TLS 1.3 messages processed at incorrect encryption level
CVE-2025-61731 cmd/go Critical Arbitrary file write via #cgo pkg-config: directive
CVE-2025-68119 cmd/go Critical RCE via malicious version strings in Mercurial/Git
CVE-2025-68121 crypto/tls High Session hijacking: ticket keys copied in Config.Clone()

Go 1.24.13 / 1.25.7 (February 2026)

CVE Component Severity Description
CVE-2025-61732 cmd/cgo Critical Code smuggling via Go/C++ comment parsing discrepancy

Verification

$ govulncheck ./...
=== Symbol Results ===
No vulnerabilities found.
Your code is affected by 0 vulnerabilities.

Test plan

  • govulncheck ./... reports 0 vulnerabilities
  • CI build passes
  • Unit tests pass
  • Acceptance tests pass

Update Go version to fix 17+ security vulnerabilities in the standard library.
@tembleking tembleking requested a review from a team as a code owner February 5, 2026 16:52
Copilot AI review requested due to automatic review settings February 5, 2026 16:52
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR updates the Go version from 1.24.4 to 1.25.7 to address 17 security vulnerabilities in the standard library, including 3 critical vulnerabilities that enable remote code execution, arbitrary file writes, and code injection.

Changes:

  • Updated Go version directive in go.mod from 1.24.4 to 1.25.7

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@tembleking tembleking added this pull request to the merge queue Feb 5, 2026
@github-merge-queue github-merge-queue Bot removed this pull request from the merge queue due to failed status checks Feb 5, 2026
@tembleking tembleking added this pull request to the merge queue Feb 5, 2026
Merged via the queue into master with commit 93d03a8 Feb 5, 2026
167 checks passed
@tembleking tembleking deleted the fix/go-security-vulnerabilities branch February 5, 2026 21:02
fcracker79 pushed a commit that referenced this pull request Mar 5, 2026
…Es (#696)

## Summary

Update Go version from 1.24.4 to 1.25.7 to fix **17+ security
vulnerabilities** in the standard library, including **3 critical
RCE/code injection** vulnerabilities.

## Vulnerabilities Fixed

### Go 1.24.5 (July 2025)
| CVE | Component | Severity | Description |
|-----|-----------|----------|-------------|
| CVE-2025-4674 | `cmd/go` | High | Unexpected command execution in
untrusted VCS repositories |

### Go 1.24.6 (August 2025)
| CVE | Component | Severity | Description |
|-----|-----------|----------|-------------|
| CVE-2025-47906 | `os/exec` | Medium | `LookPath` returns unexpected
paths when PATH contains executables |
| CVE-2025-47907 | `database/sql` | Medium | Race condition in
`Rows.Scan()` can overwrite parallel query results |

### Go 1.24.8 / 1.25.2 (October 2025)
| CVE | Component | Severity | Description |
|-----|-----------|----------|-------------|
| CVE-2025-58186 | `net/http` | High | Memory exhaustion: no limit on
number of cookies parsed |
| CVE-2025-58187 | `crypto/x509` | High | DoS: name constraint checking
scales non-linearly with cert size |
| CVE-2025-61724 | `net/textproto` | Medium | CPU exhaustion in
`Reader.ReadResponse` with many short lines |

### Go 1.24.11 / 1.25.5 (December 2025)
| CVE | Component | Severity | Description |
|-----|-----------|----------|-------------|
| CVE-2025-61727 | `crypto/x509` | High | Excluded subdomain constraints
don't restrict wildcard SANs |
| CVE-2025-61729 | `crypto/x509` | Medium | DoS: `HostnameError.Error()`
O(n²) string concatenation |

### Go 1.24.12 / 1.25.6 (January 2026)
| CVE | Component | Severity | Description |
|-----|-----------|----------|-------------|
| CVE-2025-61726 | `net/url` | High | Memory exhaustion: no limit on
query parameters |
| CVE-2025-61728 | `archive/zip` | Medium | DoS: super-linear filename
indexing with malicious ZIPs |
| CVE-2025-61730 | `crypto/tls` | Medium | TLS 1.3 messages processed at
incorrect encryption level |
| CVE-2025-61731 | `cmd/go` | **Critical** | Arbitrary file write via
`#cgo pkg-config:` directive |
| CVE-2025-68119 | `cmd/go` | **Critical** | RCE via malicious version
strings in Mercurial/Git |
| CVE-2025-68121 | `crypto/tls` | High | Session hijacking: ticket keys
copied in `Config.Clone()` |

### Go 1.24.13 / 1.25.7 (February 2026)
| CVE | Component | Severity | Description |
|-----|-----------|----------|-------------|
| CVE-2025-61732 | `cmd/cgo` | **Critical** | Code smuggling via Go/C++
comment parsing discrepancy |

## Verification

```
$ govulncheck ./...
=== Symbol Results ===
No vulnerabilities found.
Your code is affected by 0 vulnerabilities.
```

## Test plan

- [x] `govulncheck ./...` reports 0 vulnerabilities
- [ ] CI build passes
- [ ] Unit tests pass
- [ ] Acceptance tests pass
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants