Skip to content

fix: resolve dependabot security alerts#698

Open
aa-replicated wants to merge 1 commit intomainfrom
fix/dependabot-alerts
Open

fix: resolve dependabot security alerts#698
aa-replicated wants to merge 1 commit intomainfrom
fix/dependabot-alerts

Conversation

@aa-replicated
Copy link
Copy Markdown
Contributor

Summary

Resolves open Dependabot security alerts:

Go (go.mod):

  • github.com/jackc/pgx/v5 — CRITICAL memory-safety vulnerability
  • github.com/moby/spdystream v0.5.0 → v0.5.1 — HIGH DOS on CRI
  • github.com/docker/docker v28.5.1 → v28.5.2 — HIGH AuthZ plugin bypass (oversized request body)
  • github.com/moby/moby v26.1.0 → v28.5.2 — HIGH AuthZ plugin bypass

Go (dagger/go.mod):

  • go.opentelemetry.io/otel/sdk v1.42.0 → v1.43.0 — HIGH BSD kenv PATH hijacking
  • OTel log exporters v0.14.0 → v0.19.0 — MEDIUM unbounded HTTP response bodies

Go (go.mod MEDIUM):

  • github.com/go-git/go-git/v5 v5.17.1 → v5.18.0 — credential leak via cross-host redirect

Test plan

  • Go build passes
  • Go tests pass

🤖 Generated with Claude Code

Addresses all CRITICAL and HIGH vulnerabilities plus MEDIUM where feasible:

## go.mod
- github.com/jackc/pgx/v5: v5.8.0 → v5.9.2 (CRITICAL: memory-safety vuln #108)
- github.com/moby/spdystream: v0.5.0 → v0.5.1 (HIGH: DOS on CRI #107)
- github.com/docker/docker: v28.5.1 → v28.5.2 (HIGH: AuthZ plugin bypass #92)
- github.com/moby/moby: v26.1.0 → v28.5.2 (HIGH: AuthZ plugin bypass #90)
- github.com/go-git/go-git/v5: v5.17.1 → v5.18.0 (MEDIUM: credential leak #109)

## dagger/go.mod
- go.opentelemetry.io/otel/sdk: v1.42.0 → v1.43.0 (HIGH: BSD kenv PATH hijacking #103)
- go.opentelemetry.io/otel/exporters: v0.14.0/v1.38.0 → v0.19.0/v1.43.0 (MEDIUM: unbounded HTTP #101, #102)
- Updated replace directives for log exporters from v0.14.0 → v0.19.0

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
Copy link
Copy Markdown

@cursor cursor Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cursor Bugbot has reviewed your changes and found 1 potential issue.

Fix All in Cursor

❌ Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, enable autofix in the Cursor dashboard.

Reviewed by Cursor Bugbot for commit cde4aa7. Configure here.

Comment thread dagger/go.sum
go.opentelemetry.io/otel v1.43.0/go.mod h1:JuG+u74mvjvcm8vj8pI5XiHy1zDeoCS2LB1spIq7Ay0=
go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploggrpc v0.14.0 h1:OMqPldHt79PqWKOMYIAQs3CxAi7RLgPxwfFSwr4ZxtM=
go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploggrpc v0.14.0/go.mod h1:1biG4qiqTxKiUCtoWDPpL3fB3KxVwCiGw81j3nKMuHE=
go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploggrpc v0.19.0/go.mod h1:gMk9F0xDgyN9M/3Ed5Y1wKcx/9mlU91NXY2SNq7RQuU=
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Incomplete go.sum missing h1 hashes for updated modules

Medium Severity

dagger/go.sum is missing h1: content hashes for the new v0.19.0 versions of otlploggrpc, otlploghttp, otel/log, otel/sdk/log, and for golang.org/x/sync v0.20.0 — only /go.mod hashes were added. Meanwhile, the now-stale v0.14.0 entries still have both hash types. This pattern indicates go mod tidy was not run after updating dagger/go.mod, which can cause build failures in -mod=readonly mode (the default).

Additional Locations (2)
Fix in Cursor Fix in Web

Reviewed by Cursor Bugbot for commit cde4aa7. Configure here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant