Bump x/crypto and x/net to address CVEs#9400
Merged
chaptersix merged 1 commit intotemporalio:release/v1.29.xfrom Feb 25, 2026
Merged
Bump x/crypto and x/net to address CVEs#9400chaptersix merged 1 commit intotemporalio:release/v1.29.xfrom
chaptersix merged 1 commit intotemporalio:release/v1.29.xfrom
Conversation
- golang.org/x/crypto v0.37.0 -> v0.45.0 (GO-2025-4116, GO-2025-4134, GO-2025-4135) - golang.org/x/net v0.39.0 -> v0.47.0 (GO-2026-4440, GO-2026-4441)
Contributor
Author
govulncheck report (pre-fix baseline)Run against release build targets ( Result after this PR: 12 of 15 vulnerabilities resolved. 3 remaining have no applicable fix or are not relevant to production Linux deployments. |
awln-temporal
approved these changes
Feb 25, 2026
3 tasks
chaptersix
added a commit
to temporalio/cli
that referenced
this pull request
Feb 25, 2026
## Summary Bumps Go module dependencies to address known CVEs found via `govulncheck` on the v1.5.x release branch. ### Bumped | Module | Previous | Updated | CVEs Addressed | |--------|----------|---------|----------------| | Go toolchain | 1.25.0 | 1.25.7 | GO-2026-4341 (net/url), GO-2026-4340 (crypto/tls), GO-2026-4337 (crypto/tls), GO-2025-4175 (crypto/x509), GO-2025-4155 (crypto/x509) | | `go.temporal.io/server` | v1.29.1 | v1.29.2 | GO-2026-4273 (incorrect authorization), GO-2025-4272 (namespace policy bypass) | | `golang.org/x/crypto` | v0.38.0 | v0.45.0 | Transitive (required by server v1.29.2) | | `golang.org/x/net` | v0.40.0 | v0.47.0 | Transitive (required by server v1.29.2) | | `golang.org/x/sync` | v0.14.0 | v0.18.0 | Transitive | | `golang.org/x/sys` | v0.33.0 | v0.38.0 | Transitive | | `golang.org/x/term` | v0.32.0 | v0.37.0 | Transitive | | `golang.org/x/text` | v0.25.0 | v0.31.0 | Transitive | ### Not bumped (with rationale) | Module | CVE | Reason | |--------|-----|--------| | `go.opentelemetry.io/otel/sdk` v1.35.0 | GO-2026-4394 (PATH hijacking, CVSS 7.0 High) | Fix requires v1.40.0 which introduces breaking Prometheus behavioral changes. Same rationale as temporalio/temporal#9400. | ## Test plan - [x] `govulncheck ./...` shows only the intentionally skipped otel vuln - [x] `go build ./cmd/temporal` succeeds - [x] `go test ./...` passes
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Bumps Go module dependencies to address known CVEs found via
govulncheckon the v1.29.x release branch.Bumped
golang.org/x/cryptogolang.org/x/netgolang.org/x/syncgolang.org/x/sysgolang.org/x/textgodirectiveNot bumped (with rationale)
go.opentelemetry.io/otel/sdkv1.34.0ioregbinary) and requires local filesystem write access to PATH. Not applicable to Linux server deployments. Inappropriate risk for a patch release.filippo.io/edwards25519v1.1.0MultiScalarMult)filippo.io/edwards25519viagithub.com/go-sql-driver/mysql, you are not affected." This module is an indirect dependency pulled in solely throughgo-sql-driver/mysql(confirmed viago mod graph), so we are not affected.github.com/aws/aws-sdk-gov1.55.6