Skip to content

VULN-61850: golang version upgrade #1705

Merged
rlieberman-splunk merged 1 commit intodevelopfrom
VULN_61850_golang
Feb 17, 2026
Merged

VULN-61850: golang version upgrade #1705
rlieberman-splunk merged 1 commit intodevelopfrom
VULN_61850_golang

Conversation

@rlieberman-splunk
Copy link
Collaborator

Description

This PR updates the golang version to fix security vulnerabilities.

Library Remediated Version Details
stdlib 1.25.7 During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

Key Changes

  • Update golang version and dependencies

Testing and Verification

  • Smoke tests (part of PR verification)

Related Issues

PR Checklist

  • Code changes adhere to the project's coding standards.
  • Relevant unit and integration tests are included.
  • Documentation has been updated accordingly.
  • All tests pass locally.
  • The PR description follows the project's guidelines.

@rlieberman-splunk rlieberman-splunk merged commit c059cf3 into develop Feb 17, 2026
29 checks passed
@rlieberman-splunk rlieberman-splunk deleted the VULN_61850_golang branch February 17, 2026 21:06
@github-actions github-actions bot locked and limited conversation to collaborators Feb 17, 2026
@github-actions github-actions bot locked and limited conversation to collaborators Feb 17, 2026
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants

Comments