Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Upgraded Go to 1.25.6 addressing several CVEs with disclosed descriptions:
CVE-2025-61728 Super-linear filename indexing causes DoS on malicious ZIPs (false positive)
CVE-2025-61726 Memory exhaustion from excessive form key-value pairs
CVE-2025-68121 Config.Clone leaks session keys; ignores full cert chain expiration
CVE-2025-61731 CgoPkgConfig flag bypass leads to arbitrary code execution (false positive)
CVE-2025-68119 VCS toolchain misinterpretation enables code exec/file writes (false positive)
CVE-2025-61727 An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate
CVE-2025-61729 Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out.
Upgraded the golang.org/x/crypto package to address CVE-2025-58181 and CVE-2025-47914 (false-positives)