fix(): updated go and alpine version #20
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Vulnerabilities Fixed ✅⚠️
Alpine/OpenSSL (4 HIGH - All Fixed)
CVE-2024-12797 (libcrypto3, libssl3) - RFC7250 handshake vulnerability
CVE-2024-6119 (libcrypto3, libssl3) - X.509 name check DoS
Result: Alpine vulnerabilities reduced from 12 to 0
Go Standard Library (6 HIGH - All Fixed)
CVE-2024-34156 - encoding/gob deeply nested structures
CVE-2025-47907 - database/sql Postgres scan race condition
CVE-2025-58183 - archive/tar unbounded allocation
CVE-2025-58186 - HTTP header processing issue
CVE-2025-58187 - Certificate name constraint checking
CVE-2025-58188 - DSA public key validation
Result: All stdlib vulnerabilities resolved with Go 1.25.3
Remaining Issues
The following 4 vulnerabilities remain and require dependency updates in go.mod (to be addressed in follow-up PR):
CVE-2025-30204 | github.com/golang-jwt/jwt/v4 | HIGH | v4.2.0 → v4.5.2
CVE-2025-46569 | github.com/open-policy-agent/opa | HIGH | v0.44.0 → v1.4.0
CVE-2024-45337 | golang.org/x/crypto | CRITICAL | v0.21.0 → v0.31.0+
CVE-2025-22869 | golang.org/x/crypto | HIGH | v0.21.0 → v0.35.0