security: upgrade Go to 1.25.8 to fix 20 CVEs#8132
security: upgrade Go to 1.25.8 to fix 20 CVEs#8132yashkrishnan wants to merge 1 commit intoopen-telemetry:mainfrom
Conversation
Update Go version from 1.25.0 to 1.25.8 across all modules to address multiple security vulnerabilities in the Go standard library. Vulnerabilities Fixed: - GO-2026-4601: Incorrect parsing of IPv6 host literals (net/url) - GO-2025-4010: Insufficient validation of bracketed IPv6 hostnames (net/url) - GO-2026-4602: FileInfo can escape from a Root (os) - GO-2026-4341: Memory exhaustion in query parameter parsing (net/url) - GO-2026-4340: Handshake messages at incorrect encryption level (crypto/tls) - GO-2026-4337: Unexpected session resumption (crypto/tls) - GO-2025-4175: Improper DNS name constraints (crypto/x509) - GO-2025-4155: Excessive resource consumption (crypto/x509) - GO-2025-4015: Excessive CPU consumption (net/textproto) - GO-2025-4013: Panic with DSA public keys (crypto/x509) - GO-2025-4012: Memory exhaustion parsing cookies (net/http) - GO-2025-4011: Memory exhaustion parsing DER (encoding/asn1) - GO-2025-4009: Quadratic complexity (encoding/pem) - GO-2025-4008: ALPN negotiation error (crypto/tls) - GO-2025-4007: Quadratic complexity in name constraints (crypto/x509) - GO-2025-3955: CrossOriginProtection bypass (net/http) - GO-2026-4603: URLs not escaped in meta content (html/template) - GO-2026-4342: Excessive CPU in archive index (archive/zip) - GO-2025-4014: Unbounded allocation (archive/tar) - GO-2025-4006: Excessive CPU in ParseAddress (net/mail) Changes: - Updated go directive in 27 go.mod files - Ran go mod tidy to refresh dependencies - Verified with govulncheck: No vulnerabilities found Severity: Critical/High/Medium Impact: Resolves 2 actively called vulnerabilities and 18 in dependencies
|
We're not doing patch upgrades. We are a library, meaning the dependency version we require is a minimum version, not the actual one folks have to use. |
|
@dmathieu please refer to this open-telemetry/opentelemetry-collector#15052 |
@dmathieu Thank you for the feedback. I understand your concern, but this PR addresses the Go toolchain version, not dependency versions. Key PointsThis PR changes: go 1.25.0 → go 1.25.8Why this matters:
|
That's what users should change, their Go version. |
Security: Upgrade Go to 1.25.8 to Fix 20 CVEs
This PR upgrades the Go version from 1.25.0 to 1.25.8 across all modules in the opentelemetry-go repository to address multiple critical, high, and medium severity security vulnerabilities in the Go standard library.
A comprehensive vulnerability scan using
govulncheckidentified 20 CVEs affecting the codebase:Changes
godirective from1.25.0to1.25.8in 27 go.mod filesgo mod tidyto refresh dependenciesFiles Modified
Modules Updated:
go.modsdk/go.mod,sdk/metric/go.mod,sdk/log/go.mod,sdk/log/logtest/go.modbridge/opencensus/go.mod,bridge/opentracing/go.modtrace/go.mod,metric/go.mod,log/go.mod,log/logtest/go.modschema/go.mod,internal/tools/go.modVulnerabilities Fixed
Critical/High Severity (Actively Called in Code)
net/urlnet/urlHigh/Medium Severity (In Dependencies)
osnet/urlcrypto/tlscrypto/tlscrypto/x509crypto/x509net/textprotocrypto/x509net/httpencoding/asn1encoding/pemcrypto/tlscrypto/x509net/httphtml/templatearchive/ziparchive/tarnet/mailTesting
Vulnerability Scan Results
Before:
After:
Test Suite Results
All tests passed with race detection enabled (
-raceflag)Test Coverage:
go.opentelemetry.io/otel,attribute,baggage,codes,propagationtrace,trace/noop,trace/internal/telemetrymetric,metric/nooplog,log/global,log/noop,log/logtestsdk,sdk/trace,sdk/metric,sdk/log,sdk/resourceTest Execution:
Verification Commands
Impact
Checklist
go mod tidyon all modulesgovulncheck- no vulnerabilities foundRelated Issues
Addresses security vulnerabilities identified in Go standard library versions prior to 1.25.8.
Additional Notes