removed vulnerabilities by upgrading the go version #528
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🔒 Security: Fix Critical CVE Vulnerabilities in grpcurl
Overview
This PR addresses 10 critical and high-severity security vulnerabilities (CVEs) in the grpcurl fork by upgrading Go and dependencies to their latest secure versions.
🚨 Vulnerabilities Fixed
net/netip
net/http
net/mail
Decoder.Decode
net/http
packagenet/http
packagenet/http
packageDecoder.Decode
Parse
for build tagsgolang.org/x/net
🔧 Changes Made
Go Version Upgrade
Dependency Updates
v1.61.0
→v1.70.0
v0.38.0
→v0.43.0
v0.31.0
→v0.35.0
v0.23.0
→v0.28.0
v0.12.0
→v0.16.0
v0.27.0
→v0.30.0
Docker Security Enhancements
golang:1.25.1-alpine
3.20
✅ Verification
Build & Test Status
go build ./cmd/grpcurl
- Successfulgo test ./...
- All tests passingdocker build -t grpcurl-secure .
- SuccessfulSecurity Scanning
Using Trivy vulnerability scanner:
And Docker Scout
Results:
��️ Security Impact
�� Testing
�� References