Skip to content

security: upgrade critical dependencies to fix vulnerabilities#4779

Merged
envestcc merged 4 commits intomasterfrom
security/upgrade-critical-dependencies
Mar 5, 2026
Merged

security: upgrade critical dependencies to fix vulnerabilities#4779
envestcc merged 4 commits intomasterfrom
security/upgrade-critical-dependencies

Conversation

@raullenchai
Copy link
Copy Markdown
Member

Summary

This PR addresses multiple security vulnerabilities found during Phase 1 security audit by upgrading critical dependencies to their latest patched versions.

Vulnerabilities Fixed

1. HTTP/3 QPACK Header Expansion DoS (CRITICAL)

  • Vulnerability: GO-2025-4233
  • Module: github.com/quic-go/quic-go
  • Old Version: v0.49.0
  • New Version: v0.55.0
  • Impact: Denial of Service via header expansion attacks

2. Unchecked Memory Allocation in Vector Deserialization (HIGH)

  • Vulnerability: GO-2025-4087
  • Module: github.com/consensys/gnark-crypto
  • Old Version: v0.16.0
  • New Version: v0.18.1
  • Impact: Memory exhaustion during genesis initialization

3. Excessive Memory Allocation in JWT Parsing (MEDIUM)

  • Vulnerability: GO-2025-3553
  • Module: github.com/golang-jwt/jwt
  • Old Version: v4.5.1
  • New Version: v4.5.2
  • Impact: Memory exhaustion during JWT token parsing

Changes Made

Dependency Updates

  • Updated quic-go from v0.49.0 to v0.55.0
  • Updated gnark-crypto from v0.16.0 to v0.18.1
  • Updated golang-jwt/jwt/v4 from v4.5.1 to v4.5.2

Testing

  • ✅ Ran go test ./pkg/compress - All tests passing
  • ✅ Ran go test ./ioctl/newcmd/jwt - All tests passing
  • ✅ Ran go test ./blockchain/genesis - All tests passing
  • ✅ Verified API compatibility - No breaking changes

Security Impact

These upgrades fix critical security vulnerabilities that could lead to:

  • Denial of Service attacks
  • Memory exhaustion
  • Network manipulation

References

Checklist

  • Updated dependencies in go.mod
  • Ran go mod tidy
  • Ran go test ./... (selected critical packages)
  • Verified no breaking changes
  • Added security notes to commit message

- quic-go: v0.49.0 → v0.55.0 (fixes GO-2025-4233 HTTP/3 DoS)
- gnark-crypto: v0.16.0 → v0.18.1 (fixes GO-2025-4087 memory allocation DoS)
- golang-jwt/jwt/v4: v4.5.1 → v4.5.2 (fixes GO-2025-3553 JWT parsing DoS)

All tests passing. This addresses critical security vulnerabilities found
during Phase 1 security audit.
@raullenchai raullenchai requested a review from a team as a code owner February 18, 2026 05:22
@CLAassistant
Copy link
Copy Markdown

CLAassistant commented Feb 18, 2026

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you all sign our Contributor License Agreement before we can accept your contribution.
1 out of 2 committers have signed the CLA.

✅ envestcc
❌ Raullen


Raullen seems not to be a GitHub user. You need a GitHub account to be able to sign the CLA. If you have already a GitHub account, please add the email address used for this commit to your account.
You have signed the CLA already but the status is still pending? Let us recheck it.

@sonarqubecloud
Copy link
Copy Markdown

sonarqubecloud Bot commented Mar 5, 2026

@envestcc envestcc merged commit 504a27f into master Mar 5, 2026
3 of 4 checks passed
@envestcc envestcc deleted the security/upgrade-critical-dependencies branch March 5, 2026 08:50
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants