You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fix: upgrade Go to 1.26.1 to resolve security vulnerabilities
Upgrades Go from 1.25.7 to 1.26.1 to fix 5 critical vulnerabilities
found by govulncheck:
- GO-2026-4603: URLs in meta content attribute actions are not escaped in html/template
- GO-2026-4602: FileInfo can escape from a Root in os
- GO-2026-4601: Incorrect parsing of IPv6 host literals in net/url
- GO-2026-4600: Panic in name constraint checking for malformed certificates in crypto/x509
- GO-2026-4599: Incorrect enforcement of email constraints in crypto/x509
All references updated:
- Dockerfiles (main, gateway-dev, mock-convox)
- go.mod
- GitHub Actions workflows (ci.yml, e2e.yml, release.yml)
- mise.toml (local development)
🤖 Generated with [Claude Code](https://claude.com/claude-code)
Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
0 commit comments