Skip to content

fix: bump Go to 1.26.2 to resolve govulncheck stdlib vulnerabilities#23

Merged
ravisastryk merged 1 commit into
mainfrom
fix/govulncheck-stdlib-vulns
Mar 8, 2026
Merged

fix: bump Go to 1.26.2 to resolve govulncheck stdlib vulnerabilities#23
ravisastryk merged 1 commit into
mainfrom
fix/govulncheck-stdlib-vulns

Conversation

@ravisastryk
Copy link
Copy Markdown
Owner

govulncheck reported two stdlib CVEs (filepath.WalkDir and html/url.Parse) that are only patched in Go >= 1.26.2. No code changes needed — updating the minimum go version in go.mod and all CI workflows to 1.26.

@ravisastryk ravisastryk force-pushed the fix/govulncheck-stdlib-vulns branch 5 times, most recently from a2c1dd7 to fdf7c6d Compare March 8, 2026 05:20
…/lint issues

- go.mod minimum version: 1.23 -> 1.26.1 (patches stdlib CVEs in filepath and net/url)
- CI GO_VERSION: 1.24 -> 1.26 across ci.yml, release.yml, scan.yml
- golangci-lint: v1.62.0 -> v2.11.2; golangci-lint-action: v6 -> v8 (v8 required for v2)
- .golangci.yml: full v2 migration + exclude examples/, add noctx/gosec to test exclusions
- middleware/safehttp.go: add const block comment (revive); nosec G120 on ParseForm
- safedecode/decode.go: add var block comment (revive)
- cmd/analyzer/main.go: add G122 to existing nosec comment
- Remove now-unnecessary Go version patching workaround step from CI
@ravisastryk ravisastryk force-pushed the fix/govulncheck-stdlib-vulns branch from fdf7c6d to aefdc5b Compare March 8, 2026 05:27
@ravisastryk ravisastryk marked this pull request as ready for review March 8, 2026 05:56
@ravisastryk ravisastryk merged commit 525db8f into main Mar 8, 2026
7 checks passed
@ravisastryk ravisastryk deleted the fix/govulncheck-stdlib-vulns branch March 8, 2026 06:10
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant