Skip to content

Fix/security vulnerabilities jwt logrus#263

Closed
pranav-new-relic wants to merge 2 commits intomainfrom
fix/security-vulnerabilities-jwt-logrus
Closed

Fix/security vulnerabilities jwt logrus#263
pranav-new-relic wants to merge 2 commits intomainfrom
fix/security-vulnerabilities-jwt-logrus

Conversation

@pranav-new-relic
Copy link
Copy Markdown
Member

No description provided.

pranav-new-relic and others added 2 commits February 17, 2026 14:24
Upgraded the following dependencies to fix HIGH and CRITICAL security vulnerabilities:

Main module (go.mod):
- github.com/sirupsen/logrus: v1.9.0 -> v1.9.3 (CVE-2025-65637)
- golang.org/x/crypto: v0.17.0 -> v0.35.0 (CVE-2024-45337, CVE-2025-22869)

Tools module (tools/go.mod):
- github.com/golang-jwt/jwt/v4: v4.5.0 -> v4.5.2 (CVE-2025-30204)
- github.com/golang-jwt/jwt/v5: v5.1.0 -> v5.2.2 (CVE-2025-30204)
- github.com/docker/docker: v24.0.2 -> v27.1.1 (CVE-2024-41110)
- github.com/go-git/go-git/v5: v5.11.0 -> v5.13.0 (CVE-2025-21614)
- golang.org/x/crypto: v0.21.0 -> v0.35.0 (CVE-2024-45337, CVE-2025-22869)
- golang.org/x/oauth2: v0.16.0 -> v0.27.0 (CVE-2025-22868)

Used replace directives in tools/go.mod to force secure versions for transitive dependencies.

All HIGH and CRITICAL vulnerabilities have been resolved as verified by trivy scan.

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
…ICAL/MEDIUM vulnerabilities

This commit addresses all Dependabot security alerts by upgrading Go version and all vulnerable dependencies.

## Go Version Upgrade
- Upgraded from Go 1.23.0 to Go 1.24.0 in both modules

## Main Module (go.mod) Security Fixes:
- golang.org/x/crypto: v0.35.0 -> v0.45.0 (CVE-2025-47914, CVE-2025-58181)
- golang.org/x/sys: v0.30.0 -> v0.38.0
- golang.org/x/text: v0.22.0 -> v0.31.0
- golang.org/x/tools: v0.21.1 -> v0.38.0
- golang.org/x/mod: v0.17.0 -> v0.29.0
- golang.org/x/sync: upgraded to v0.18.0
- github.com/sirupsen/logrus: v1.9.0 -> v1.9.3 (CVE-2025-65637)

## Tools Module (tools/go.mod) Security Fixes:
- golang.org/x/crypto: v0.21.0 -> v0.45.0 (CVE-2024-45337, CVE-2025-22869, CVE-2025-47914, CVE-2025-58181)
- golang.org/x/net: v0.33.0 -> v0.38.0 (CVE-2025-22870, CVE-2025-22872)
- golang.org/x/oauth2: v0.16.0 -> v0.27.0 (CVE-2025-22868)
- github.com/golang-jwt/jwt/v4: v4.5.0 -> v4.5.2 (CVE-2025-30204)
- github.com/golang-jwt/jwt/v5: v5.1.0 -> v5.2.2 (CVE-2025-30204)
- github.com/docker/docker: v24.0.2 -> v27.1.1 (CVE-2024-41110, CVE-2023-28840, CVE-2023-28841)
- github.com/go-git/go-git/v5: v5.11.0 -> v5.16.5 (CVE-2025-21614, CVE-2026-25934)
- github.com/Azure/azure-sdk-for-go/sdk/azidentity: v1.4.0 -> v1.6.0 (CVE-2024-35255)
- github.com/hashicorp/go-retryablehttp: v0.7.4 -> v0.7.7 (CVE-2024-6104)
- github.com/sigstore/cosign/v2: v2.0.3 -> v2.6.2 (CVE-2024-29902, CVE-2024-29903, CVE-2026-22703)
- github.com/sigstore/rekor: v1.2.0 -> v1.5.0 (CVE-2026-23831, CVE-2026-24117)
- github.com/sigstore/sigstore: v1.6.4 -> v1.10.4 (CVE-2026-24137)
- github.com/ulikunitz/xz: v0.5.11 -> v0.5.15 (CVE-2025-58058)
- gopkg.in/square/go-jose.v2 -> github.com/go-jose/go-jose/v3 v3.0.4 (CVE-2024-28180, CVE-2025-27144)

## Additional Dependency Upgrades:
Multiple transitive dependencies were upgraded as part of the Go version and security fixes, including AWS SDK, Azure SDK, Google Cloud libraries, and various Go standard library extensions.

## Verification:
- ✅ All HIGH, CRITICAL, and MEDIUM severity vulnerabilities resolved (Trivy scan: 0 vulnerabilities)
- ✅ Code compiles successfully
- ✅ All security fixes verified with comprehensive scanning

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant