Skip to content

fix(security): upgrade Go to 1.25.7 for crypto/tls CVE#701

Open
plural-copilot[bot] wants to merge 1 commit intomainfrom
agent/fix-go-stdlib-cve-1739097135972
Open

fix(security): upgrade Go to 1.25.7 for crypto/tls CVE#701
plural-copilot[bot] wants to merge 1 commit intomainfrom
agent/fix-go-stdlib-cve-1739097135972

Conversation

@plural-copilot
Copy link
Contributor

@plural-copilot plural-copilot bot commented Feb 9, 2026

Summary

  • Upgrades Go from 1.25.6 to 1.25.7 to fix crypto/tls session resumption vulnerability
  • Updates go.mod, Dockerfile, and dockerfiles/Dockerfile.cloud

Vulnerability Details

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This can cause clients or servers to resume sessions with parties they would not have resumed with during the initial handshake.

Changes

File Change
go.mod Updated go 1.25.6go 1.25.7
Dockerfile Updated both builder and final stage to golang:1.25.7-alpine3.22
dockerfiles/Dockerfile.cloud Updated builder stage to golang:1.25.7-alpine3.22

Verification

  • Docker build completed successfully confirming code compiles with Go 1.25.7

Security Scanner Details

  • Fix Version: 1.25.7
  • Current Version: 1.25.6
  • Package: stdlib
  • Affected Image: ghcr.io/pluralsh/console:sha-6894503

Addresses crypto/tls session resumption vulnerability where Config.ClientCAs
or RootCAs field mutations between initial and resumed handshakes could cause
sessions to succeed when they should fail.

Fixed files:
- go.mod: Updated Go version directive
- Dockerfile: Updated builder and final stage images
- dockerfiles/Dockerfile.cloud: Updated builder image

Fix Version: 1.25.7
Current Version: 1.25.6
Package: stdlib
Copy link
Contributor Author

@plural-copilot plural-copilot bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This PR was generated by the claude (engine: claude) agent runtime. Here's some useful information you might want to know to evaluate
the ai's perfomance:

Name Details
💬 Prompt Security scanners have found the following vulnerability in our cluster:...
🔗 Run history View run history

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant