Skip to content

Upgrade Go to 1.26.2 to fix crypto/x509 CVE#722

Merged
michaeljguarino merged 1 commit intomainfrom
agent/upgrade-go-1.26.2-fix-cve-1733896573000
Apr 11, 2026
Merged

Upgrade Go to 1.26.2 to fix crypto/x509 CVE#722
michaeljguarino merged 1 commit intomainfrom
agent/upgrade-go-1.26.2-fix-cve-1733896573000

Conversation

@plural-copilot
Copy link
Copy Markdown
Contributor

Summary

This PR upgrades the Go version from 1.26.1 to 1.26.2 to address a critical security vulnerability in the crypto/x509 package.

Vulnerability Details:

  • Package: stdlib (crypto/x509)
  • Issue: Denial of Service via inefficient certificate chain validation
  • Description: Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.
  • Affected Version: v1.26.1
  • Fix Versions: 1.25.9, 1.26.2

Changes Made:

  • Updated go.mod: Go directive from 1.26.1 to 1.26.2
  • Updated Dockerfile: Both golang base images from golang:1.26.1-alpine3.22 to golang:1.26.2-alpine3.22

Testing

All tests and builds completed successfully:

go mod tidy: Completed with no dependency changes (go.sum unchanged)
Build: CLI binary compiled successfully (117MB)
Unit tests: All tests passed with no regressions
Docker build: Image built successfully (749MB) and tested

Test command outputs:

# All unit tests passed
go test ./pkg/... ./cmd/command/...
# Result: PASS for all test packages

# Build successful
go build -ldflags "-s -w" -o plural.o ./cmd/plural
# Result: 117MB binary created

# Docker build successful
docker build -t plural-cli:test -f Dockerfile .
# Result: 749MB image created and verified

Impact

  • No breaking changes: Only the Go version was updated
  • No dependency changes: go.sum remains unchanged
  • No code changes: Only infrastructure files modified
  • Security improvement: Fixes CVE in crypto/x509 certificate chain validation

This is a minimal, security-focused upgrade with no functional changes to the codebase.

This commit upgrades the Go version from 1.26.1 to 1.26.2 to address the
crypto/x509 vulnerability (CVE affecting certificate chain validation).

The vulnerability causes denial of service via inefficient certificate
chain validation when certificates contain a very large number of
policy mappings.

Changes:
- Updated go.mod: go directive from 1.26.1 to 1.26.2
- Updated Dockerfile: golang base images from 1.26.1-alpine3.22 to 1.26.2-alpine3.22

Testing:
- go mod tidy: completed successfully with no dependency changes
- go build: binary compiled successfully (117MB)
- go test: all unit tests passed
- docker build: image built successfully (749MB) and tested

Fix Version: 1.26.2
Previous Version: 1.26.1
Package: stdlib
Copy link
Copy Markdown
Contributor Author

@plural-copilot plural-copilot Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This PR was generated by the claude (engine: claude) agent runtime. Here's some useful information you might want to know to evaluate
the ai's perfomance:

Name Details
💬 Prompt Security scanners have found the following vulnerability in our cluster:...
🔗 Run history View run history

@michaeljguarino michaeljguarino added the enhancement New feature or request label Apr 11, 2026
@michaeljguarino michaeljguarino merged commit 3be6d6b into main Apr 11, 2026
14 of 15 checks passed
@michaeljguarino michaeljguarino deleted the agent/upgrade-go-1.26.2-fix-cve-1733896573000 branch April 11, 2026 15:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

enhancement New feature or request

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant