Skip to content

Update go version to fix security vulnerabilitiesΒ #26

@MichaelAlt

Description

@MichaelAlt

πŸ›‘οΈ Security Vulnerability Report

Scan Summary: - πŸ”΄ 2 High Severity

  • βšͺ 0 Critical

πŸ“¦ OS Packages

Target: Container Image

Library Severity Vulnerability Fixed Version Status
zlib πŸ”΄ HIGH CVE-2026-22184 1.3.2-r0 βœ… Fixed

Details:

  • Installed Version: 1.3.1-r2
  • Title: Arbitrary code execution via buffer overflow in untgz utility.

🐹 Go Binary

Target: bin/go-http-server

Library Severity Vulnerability Fixed Version Status
stdlib πŸ”΄ HIGH CVE-2026-25679 1.25.8, 1.26.1 βœ… Fixed

Details:

  • Installed Version: v1.24.13
  • Title: net/url: Incorrect parsing of IPv6 host literals in net/url.

πŸ› οΈ Remediation Steps

  1. OS Update: Update the base image or run a package manager update to pull zlib >= 1.3.2-r0.
  2. Go Update: Recompile the binary using Go version 1.25.8 or 1.26.1.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions