Skip to content

Bump x/crypto, x/net, and Go 1.24.13 to address CVEs#9440

Open
chaptersix wants to merge 1 commit intotemporalio:release/v1.28.xfrom
chaptersix:security/v1.28.x-cve-bumps
Open

Bump x/crypto, x/net, and Go 1.24.13 to address CVEs#9440
chaptersix wants to merge 1 commit intotemporalio:release/v1.28.xfrom
chaptersix:security/v1.28.x-cve-bumps

Conversation

@chaptersix
Copy link
Contributor

@chaptersix chaptersix commented Mar 9, 2026

Summary

  • Bump golang.org/x/crypto v0.37.0 -> v0.45.0 (GO-2025-4116, GO-2025-4134, GO-2025-4135)
  • Bump golang.org/x/net v0.39.0 -> v0.47.0 (GO-2026-4440, GO-2026-4441)
  • Bump golang.org/x/sync, x/sys, x/text transitively
  • Bump go directive from 1.24.5 to 1.24.13 for stdlib CVE fixes (crypto/tls, crypto/x509)

Mirrors the changes from #9400 on release/v1.29.x, adapted for v1.28.x (staying on Go 1.24.x).

Bumps Go module dependencies to address known CVEs found via
govulncheck on the v1.28.x release branch.

### Bumped

| Module | Previous | Updated | CVEs Addressed |
|--------|----------|---------|----------------|
| golang.org/x/crypto | v0.37.0 | v0.45.0 | GO-2025-4116 (ssh/agent DoS), GO-2025-4134 (ssh unbounded memory), GO-2025-4135 (ssh/agent malformed constraint DoS) |
| golang.org/x/net | v0.39.0 | v0.47.0 | GO-2026-4440 (html quadratic parsing), GO-2026-4441 (infinite parsing loop) |
| golang.org/x/sync | v0.13.0 | v0.18.0 | transitive (required by x/crypto) |
| golang.org/x/sys | v0.32.0 | v0.38.0 | transitive (required by x/crypto) |
| golang.org/x/text | v0.24.0 | v0.31.0 | transitive (required by x/crypto) |
| go directive | 1.24.5 | 1.24.13 | stdlib CVEs in crypto/tls, crypto/x509 |

### Not bumped (with rationale)

| Module | CVE | Reason |
|--------|-----|--------|
| go.opentelemetry.io/otel/sdk v1.34.0 | GO-2026-4394 (PATH hijacking, CVSS 7.0 High) | Fix requires v1.40.0 with breaking Prometheus changes. macOS/Darwin only, requires local PATH write access. Not applicable to Linux server deployments. |
@chaptersix chaptersix requested a review from a team as a code owner March 9, 2026 03:20
Copy link

@ayushanand13 ayushanand13 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

security fixes

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants