fix: https://pkg.go.dev/vuln/GO-2025-3420 by upgrading from go 1.23.0 -> 1.23.5 #665
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
The CI is failing due to vulncheck. We get the following two cves
242Vulnerability #1: GO-2025-3420
243 Sensitive headers incorrectly sent after cross-domain redirect in net/http
244 More info: https://pkg.go.dev/vuln/GO-2025-3420
245 Standard library
246 Found in: net/[email protected]
247 Fixed in: net/[email protected]
and
253Vulnerability #2: GO-2025-3373
254 Usage of IPv6 zone IDs can bypass URI name constraints in crypto/x509
255 More info: https://pkg.go.dev/vuln/GO-2025-3373
256 Standard library
257 Found in: crypto/[email protected]
258 Fixed in: crypto/[email protected]
Does this change impact docs?
Release Note