Skip to content

Conversation

@vikram-avesha
Copy link

Vulnerabilities Fixed ✅
Alpine/OpenSSL (4 HIGH - All Fixed)
CVE-2024-12797 (libcrypto3, libssl3) - RFC7250 handshake vulnerability
CVE-2024-6119 (libcrypto3, libssl3) - X.509 name check DoS
Result: Alpine vulnerabilities reduced from 12 to 0
Go Standard Library (6 HIGH - All Fixed)
CVE-2024-34156 - encoding/gob deeply nested structures
CVE-2025-47907 - database/sql Postgres scan race condition
CVE-2025-58183 - archive/tar unbounded allocation
CVE-2025-58186 - HTTP header processing issue
CVE-2025-58187 - Certificate name constraint checking
CVE-2025-58188 - DSA public key validation
Result: All stdlib vulnerabilities resolved with Go 1.25.3
Remaining Issues ⚠️
The following 4 vulnerabilities remain and require dependency updates in go.mod (to be addressed in follow-up PR):
CVE-2025-30204 | github.com/golang-jwt/jwt/v4 | HIGH | v4.2.0 → v4.5.2
CVE-2025-46569 | github.com/open-policy-agent/opa | HIGH | v0.44.0 → v1.4.0
CVE-2024-45337 | golang.org/x/crypto | CRITICAL | v0.21.0 → v0.31.0+
CVE-2025-22869 | golang.org/x/crypto | HIGH | v0.21.0 → v0.35.0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants