Skip to content

Conversation

yashkrishnan
Copy link
Contributor

@yashkrishnan yashkrishnan commented Jul 20, 2025

Community Contribution License

All community contributions in this pull request are licensed to the project maintainers
under the terms of the Apache 2 license.
By creating this pull request I represent that I have the right to license the
contributions to the project maintainers under the Apache 2 license.

Description

Description:
This PR addresses critical security vulnerabilities in Go standard libraries by upgrading the version used in the project.
Screenshot 2025-07-21 at 1 21 36 AM

CVE Fixes:
CVE-2025-22874
Module: crypto/x509
Issue: Certificate validation bypass via crafted certificate chains.
Impact: Potential for trust validation failure leading to man-in-the-middle (MitM) attacks.
Fix: Upgrade to patched Go version where crypto/x509 includes stricter chain validation.

CVE-2025-4673
Module: net/http
Issue: Improper request parsing under certain malformed header conditions.
Impact: Can lead to HTTP request smuggling or denial of service (DoS).
Fix: Upgraded to Go version that resolves the improper parsing logic in the net/http module.

Changes Made:
Updated module dependencies as needed (ensure version includes the CVE patches)
Verified compatibility and build success post-upgrade

@harshavardhana harshavardhana changed the title Fix CVEs: CVE-2025-22874 (crypto/x509) and CVE-2025-4673 (net/http) update dependencies to fix dependent library CVEs: CVE-2025-22874 (crypto/x509) and CVE-2025-4673 (net/http) Jul 21, 2025
@harshavardhana harshavardhana changed the title update dependencies to fix dependent library CVEs: CVE-2025-22874 (crypto/x509) and CVE-2025-4673 (net/http) update dependencies to fix dependent library CVEs: CVE-2025-22874, CVE-2025-4673 Jul 21, 2025
@harshavardhana harshavardhana merged commit ee72571 into minio:master Jul 21, 2025
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants