Skip to content

Update Go to 1.24.13 to fix remaining critical vulnerability (CVE-2025-68121)#21327

Merged
geropl merged 5 commits intomainfrom
fix/go-1.24.13-cve-2025-68121
Mar 4, 2026
Merged

Update Go to 1.24.13 to fix remaining critical vulnerability (CVE-2025-68121)#21327
geropl merged 5 commits intomainfrom
fix/go-1.24.13-cve-2025-68121

Conversation

@geropl
Copy link
Member

@geropl geropl commented Mar 4, 2026

Fixes the remaining critical vulnerability from the build after #21326, where ide-proxy:docker still reported 1 critical finding.

Root cause

The local-app Go binaries embedded in the ide-proxy image are compiled with Go 1.24.9 (from the CI build environment), which contains CVE-2025-68121 (critical Go stdlib vulnerability, fixed in 1.24.13).

The .devcontainer/Dockerfile Go version does not affect CI — the CI uses a separate pre-built image (dev/image/Dockerfilegitpod/workspace-gitpod-dev). However, Go's toolchain directive in go.mod forces auto-download of the specified version regardless of what's installed.

Changes

  • components/local-app/go.mod: Bump toolchain from go1.24.3 to go1.24.13 — this forces the Go tool to download and use 1.24.13 in CI even though the environment has 1.24.9
  • components/ide-proxy/Dockerfile: Add apk upgrade --no-cache to match the proxy Dockerfile pattern
  • .devcontainer/Dockerfile: Bump GO_VERSION to 1.24.13 for dev environment consistency

Follow-up to #21326. Resolves: CLC-2225

@geropl geropl marked this pull request as ready for review March 4, 2026 10:52
@geropl geropl requested a review from a team as a code owner March 4, 2026 10:52
The local-app Go binaries are embedded in the ide-proxy Docker image.
They were compiled with Go 1.24.9 (from the CI environment), which
contains CVE-2025-68121 (critical Go stdlib vulnerability).

Bump the toolchain directive in local-app/go.mod to go1.24.13, which
forces the Go tool to auto-download 1.24.13 regardless of the CI
environment's installed Go version.

Also add apk upgrade to the ide-proxy Dockerfile to pick up Alpine
security patches at build time (matching the proxy Dockerfile pattern).

The .devcontainer/Dockerfile Go version bump is included for dev
environment consistency but does not affect CI builds.

Co-authored-by: Ona <no-reply@ona.com>
@geropl geropl force-pushed the fix/go-1.24.13-cve-2025-68121 branch from a785ad1 to ada8491 Compare March 4, 2026 11:00
The CI image (dev/image/Dockerfile) inherits Go from the base image
gitpod/workspace-gitpod-dev, which ships Go 1.24.9. That version
contains CVE-2025-68121 (critical Go stdlib vulnerability).

Install Go 1.24.13 explicitly in the CI image so all Go binaries
built in CI use a patched toolchain. Bump TRIGGER_REBUILD to force
an image rebuild.

Co-authored-by: Ona <no-reply@ona.com>
Co-authored-by: Ona <no-reply@ona.com>
@geropl geropl force-pushed the fix/go-1.24.13-cve-2025-68121 branch from a00035a to ef9107d Compare March 4, 2026 13:34
Co-authored-by: Ona <no-reply@ona.com>
@geropl geropl force-pushed the fix/go-1.24.13-cve-2025-68121 branch from 20b4c34 to 1544040 Compare March 4, 2026 14:16
@github-actions
Copy link
Contributor

github-actions bot commented Mar 4, 2026

⚠️ Hey reviewer! BE CAREFUL ⚠️
Review the code before opening in your Gitpod. .gitpod.yml was changed and it might be harmful.

@geropl geropl merged commit 1f3fbf9 into main Mar 4, 2026
15 checks passed
@geropl geropl deleted the fix/go-1.24.13-cve-2025-68121 branch March 4, 2026 20:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants