removed vulnerabilities by upgrading the go version #528
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🔒 Security: Fix Critical CVE Vulnerabilities in grpcurl
Overview
This PR addresses 10 critical and high-severity security vulnerabilities (CVEs) in the grpcurl fork by upgrading Go and dependencies to their latest secure versions.
🚨 Vulnerabilities Fixed
net/netipnet/httpnet/mailDecoder.Decodenet/httppackagenet/httppackagenet/httppackageDecoder.DecodeParsefor build tagsgolang.org/x/net🔧 Changes Made
Go Version Upgrade
Dependency Updates
v1.61.0→v1.70.0v0.38.0→v0.43.0v0.31.0→v0.35.0v0.23.0→v0.28.0v0.12.0→v0.16.0v0.27.0→v0.30.0Docker Security Enhancements
golang:1.25.1-alpine3.20✅ Verification
Build & Test Status
go build ./cmd/grpcurl- Successfulgo test ./...- All tests passingdocker build -t grpcurl-secure .- SuccessfulSecurity Scanning
Using Trivy vulnerability scanner:
And Docker Scout
Results:
��️ Security Impact
�� Testing
�� References