Skip to content

build(deps): bump the oc-mirror-v2-security-updates group across 1 directory with 5 updates#1359

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/oc-mirror-v2-security-updates-05c22a6b9b
Open

build(deps): bump the oc-mirror-v2-security-updates group across 1 directory with 5 updates#1359
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/oc-mirror-v2-security-updates-05c22a6b9b

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Feb 26, 2026

Bumps the oc-mirror-v2-security-updates group with 3 updates in the / directory: golang.org/x/crypto, github.com/go-git/go-git/v5 and github.com/sigstore/fulcio.

Updates golang.org/x/crypto from 0.41.0 to 0.45.0

Commits
  • 4e0068c go.mod: update golang.org/x dependencies
  • e79546e ssh: curb GSSAPI DoS risk by limiting number of specified OIDs
  • f91f7a7 ssh/agent: prevent panic on malformed constraint
  • 2df4153 acme/autocert: let automatic renewal work with short lifetime certs
  • bcf6a84 acme: pass context to request
  • b4f2b62 ssh: fix error message on unsupported cipher
  • 79ec3a5 ssh: allow to bind to a hostname in remote forwarding
  • 122a78f go.mod: update golang.org/x dependencies
  • c0531f9 all: eliminate vet diagnostics
  • 0997000 all: fix some comments
  • Additional commits viewable in compare view

Updates github.com/go-git/go-git/v5 from 5.16.2 to 5.16.5

Release notes

Sourced from github.com/go-git/go-git/v5's releases.

v5.16.5

What's Changed

Full Changelog: go-git/go-git@v5.16.4...v5.16.5

v5.16.4

What's Changed

Full Changelog: go-git/go-git@v5.16.3...v5.16.4

v5.16.3

What's Changed

Full Changelog: go-git/go-git@v5.16.2...v5.16.3

Commits
  • 48a1ae0 Merge pull request #1836 from go-git/check-v5
  • 42bdf1f storage: filesystem, Verify idx matches pack file
  • 4146a56 plumbing: format/idxfile, Verify idxfile's checksum
  • 63d78ec plumbing: format/packfile, Add new ErrMalformedPackFile
  • 25f1624 Merge pull request #1800 from Ch00k/no-delete-untracked-v5
  • 600fb13 git: worktree, Don't delete local untracked files when resetting worktree
  • 390a569 Merge pull request #1746 from pjbgf/bump-go
  • 61c8b85 build: Bump Go test versions to 1.23-1.25 (v5)
  • e5a05ec Merge pull request #1744 from go-git/renovate/releases/v5.x-go-golang.org-x-c...
  • 1495930 plumbing: Remove use of non-constant format strings
  • Additional commits viewable in compare view

Updates github.com/opencontainers/selinux from 1.12.0 to 1.13.1

Release notes

Sourced from github.com/opencontainers/selinux's releases.

v1.13.1

This release includes a minor update to reduce the minimum version requirement of the github.com/cyphar/filepath-securejoin package from v0.6.0 to v0.5.1. We did not use any of the newer features, so downgrading is a no-op but will help with downstreams that need to backport github.com/opencontainers/selinux updates.

What's Changed

New Contributors

Full Changelog: opencontainers/selinux@v1.13.0...v1.13.1

v1.13.0

What's Changed

Full Changelog: opencontainers/selinux@v1.12.0...v1.13.0

Commits
  • 5647f06 Merge pull request #242 from Luap99/securejoin
  • 69a52b8 downgrade github.com/cyphar/filepath-securejoin to v0.5.1
  • 6950c32 Merge pull request #240 from opencontainers/dependabot/github_actions/golangc...
  • 9a88c88 build(deps): bump golangci/golangci-lint-action from 8 to 9
  • 4be9937 Merge pull request #237 from cyphar/selinux-safe-procfs
  • c8cfa6f selinux: migrate to pathrs-lite procfs API
  • f2424d8 Merge pull request #236 from kolyshkin/modernize-ci
  • 648ce7f ci: add go 1.25
  • 916cab9 ci: bump golangci-lint to v2.5
  • b42e5c8 all: format sources with latest gofumpt
  • Additional commits viewable in compare view

Updates github.com/sigstore/fulcio from 1.6.6 to 1.8.5

Release notes

Sourced from github.com/sigstore/fulcio's releases.

v1.8.5

Changelog

This resolves GHSA-59jp-pj84-45mr - Server-side request forgery via MetaIssuer regex bypass

Thanks for all contributors!

v1.8.4

Changelog

  • f5bfa34740fc579523e2da9825ea575227331c6f build(deps): bump github.com/tink-crypto/tink-go/v2 from 2.5.0 to 2.6.0 (#2246)
  • 0039c980ab58e8cabf38d62fb80a607b5f21c0da build(deps): bump goa.design/goa/v3 from 3.22.6 to 3.23.4 (#2245)
  • 3a432f030f1dca4d088f1777f07947a85d1750cd build(deps): bump go.step.sm/crypto from 0.74.0 to 0.75.0 (#2238)
  • f3aba4a94150cad7eaa7dc0445e8cdf6cb037c23 build(deps): bump the all group across 1 directory with 4 updates (#2247)
  • e66a4c6f47d4052c7b38b84f081b26ca3191deb0 build(deps): bump the all group with 8 updates (#2244)
  • a846db6473f4be95443f3772914a15cc156be7b6 build(deps): bump golang from 20b91ed to a22b2e6 (#2243)
  • 5a012f5e4f9617fe649b08ec8531d1e8256577e4 update Run Invocation URI for circleci (#2242)
  • 59dde0af71dbeaa69b8c25edb107ac19bf3a05ce update builder to use go1.25.5 (#2235)
  • 1a6870c7d6f0d2ed6513104ec3f60f8ba5d91c32 build(deps): bump golang from 1.25.4 to 1.25.5 in the all group (#2236)

Thanks for all contributors!

v1.8.3

Changelog

v1.8.3 fixes GHSA-f83f-xpx7-ffpw

  • 3622f6e62cf74ff1477422a8c3aad4ca338ed047 update changelog for v1.8.3 release (#2234)
  • 765a0e57608b9ef390e1eeeea8595b9054c63a5a Merge commit from fork (#2233)
  • 90f8520e1754b20ba0cb33d412ee15006711b85f build(deps): bump github.com/coreos/go-oidc/v3 from 3.16.0 to 3.17.0 (#2225)
  • d88584108bf71c5d375a41a62c05de3c587bd35e build(deps): bump the all group across 1 directory with 6 updates (#2232)
  • a387888860bff3f4100d35aa5a63306bb545e702 build(deps): bump the all group with 4 updates (#2226)
  • 7b0c1a11da32a1eb485ea3368725028c4f3d35be build(deps): bump actions/checkout from 5.0.0 to 6.0.0 (#2227)
  • f0a0d051798bb1869d79ba21fbb9b60bdd896664 build(deps): bump golang from e68f6a0 to 6981837 (#2222)
  • 4ed0ea1b43f96c571de5ed8b44a5703d6c5c2894 Switch docker env from ct_server to TesseraCT (#2210)
  • e902cf880ff56e6749725ea6d63299ab7b370c2d feat: Add support for skipping email_verified claim requirement per issuer (#2220)
  • c0fc26c2c1d8a1e16802dd466fb233d69d3ef35d Add basic E2E tests (#2230)
  • a4ee8608f0349bd546b33406417f8ff1a58b09b1 build(deps): bump sigstore/scaffolding/trillian_log_signer (#2228)
  • 51d916e167276404d153607f076e5a7fb8f30986 build(deps): bump golang.org/x/crypto from 0.44.0 to 0.45.0 (#2216)
  • bd3a515d86c015a70fa7abd47511fcb1108aafcf add meta-issuer circleci block (#2215)
  • c4d47896482f470adaf09dc7706a54fd66311bfd add circleci info to fulcio (#2192)

Thanks for all contributors!

v1.8.2

... (truncated)

Changelog

Sourced from github.com/sigstore/fulcio's changelog.

v1.8.5

Vulnerability Fixes

v1.8.4

Same changelog as v1.8.3, with a few dependency bumps to resolve a breaking API change

v1.8.3

Vulnerability Fixes

Features

  • feat: Add support for skipping email_verified claim requirement per issuer (#2220)
  • add meta-issuer circleci block (#2215)
  • add circleci info to fulcio (#2192)

Testing

  • Add basic E2E tests (#2230)

v1.8.2

Testing

  • make email address in test cases rfc822 conformant (#2205)

v1.8.1

Same as v1.8.0, but with a fix for the CI build pipeline.

v1.8.0

Bug Fixes

  • fix: K8s API does not accept unauthorized requests (#2111)
  • fix: vault for enterprise expects only the key name (#2117)
  • fix(config): respect cacert on oidc-issuers (#2098)
  • Register /healthz endpoint when listening on duplex http/grpc port (#2046)

Features

  • feat: adds cert loading and key-match validation. (#2173)
  • expose gcp kms retry and timeout options (#2132)
  • server: Use warning log level for client errors (#2147)

... (truncated)

Commits

Updates github.com/sigstore/sigstore from 1.9.5 to 1.10.3

Release notes

Sourced from github.com/sigstore/sigstore's releases.

v1.10.3

What's Changed

v1.10.3 adds ValidatePubKey back to the cryptoutils package to avoid a breaking API change.

Full Changelog: sigstore/sigstore@v1.10.2...v1.10.3

v1.10.2

Functionally equivalent to v1.10.0. v1.10.1 has been retracted to remove copied code.

v1.10.0

Breaking change

sigstore/sigstore#2194 moves cryptoutils.ValidatePubKey to goodkey.ValidatePubKey to minimize the dependency tree for clients using the cryptoutils package.

Features

Refactoring

v1.10.0

Breaking change

sigstore/sigstore#2194 moves cryptoutils.ValidatePubKey to goodkey.ValidatePubKey to minimize the dependency tree for clients using the cryptoutils package.

Features

Refactoring

... (truncated)

Commits
  • 72f0ed7 build(deps): Bump github.com/aws/aws-sdk-go-v2/config (#2230)
  • b257168 build(deps): Bump github.com/aws/aws-sdk-go-v2 in /pkg/signature/kms/aws (#2226)
  • 84f57b8 build(deps): Bump github.com/sigstore/sigstore (#2221)
  • bdc1a86 build(deps): Bump actions/checkout from 5.0.1 to 6.0.0 (#2220)
  • 11dfe81 build(deps): Bump golang.org/x/crypto in /pkg/signature/kms/aws (#2236)
  • 0214948 Add back ValidatePubKey as a deprecated, minimal function (#2235)
  • cc26bb8 build(deps): Bump localstack/localstack in /test/e2e in the all group (#2227)
  • 63ab8d8 build(deps): Bump github.com/aws/aws-sdk-go-v2/service/kms (#2229)
  • 9e629f0 build(deps): Bump the all group with 2 updates (#2219)
  • 234b99d build(deps): Bump github.com/coreos/go-oidc/v3 from 3.16.0 to 3.17.0 (#2223)
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Summary by CodeRabbit

  • Chores
    • Upgraded Go toolchain from 1.24.3 to 1.25.0
    • Updated numerous direct and transitive dependencies across OpenTelemetry, gRPC, Prometheus, crypto/security, container/runtime, and related libraries
    • Cleaned up outdated indirect versions and applied minor/patch upgrades
    • No changes to public/exported APIs or signatures

@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Feb 26, 2026
@openshift-ci openshift-ci bot requested review from aguidirh and r4f4 February 26, 2026 04:53
@coderabbitai
Copy link

coderabbitai bot commented Feb 26, 2026

Walkthrough

Go toolchain bumped from 1.24.3 to 1.25.0 and numerous direct and indirect Go module versions were updated in go.mod, including cryptography, OpenTelemetry, gRPC, Prometheus, sigstore, and Kubernetes-related modules. No exported API signatures were changed.

Changes

Cohort / File(s) Summary
Go Module Dependencies
go.mod
Updated Go toolchain to go 1.25.0. Multiple direct and indirect module version bumps across github.com/go-jose/go-jose/v4, github.com/spf13/{cobra,pflag}, golang.org/x/{crypto,term,sync,net,oauth2,sys,text,time,exp}, OpenTelemetry packages, google.golang.org/{grpc,protobuf}, github.com/prometheus/{client_golang,common}, github.com/sigstore/*, github.com/go-git/go-git/v5, github.com/miekg/dns (added indirect), Kubernetes-related modules, and other transitive dependency updates. No source code or exported signatures changed.

Estimated code review effort

🎯 2 (Simple) | ⏱️ ~10 minutes

🚥 Pre-merge checks | ✅ 5
✅ Passed checks (5 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The title accurately describes the PR as a dependency group update with security-focused bumps across multiple packages (golang.org/x/crypto, go-git, selinux, fulcio, sigstore), matching the substantive changes in go.mod.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.
Stable And Deterministic Test Names ✅ Passed All test names use static, descriptive strings with no dynamic values like UUIDs, timestamps, pod names, or IP addresses.
Test Structure And Quality ✅ Passed This PR modifies only go.mod file with dependency updates and contains no test code changes.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment
  • Commit unit tests in branch dependabot/go_modules/oc-mirror-v2-security-updates-05c22a6b9b

Warning

There were issues while running some tools. Please review the errors and either fix the tool's configuration or disable the tool if it's a critical failure.

🔧 golangci-lint (2.5.0)

Error: can't load config: can't unmarshal config by viper (flags, file): 1 error(s) decoding:

  • 'output.formats' expected a map, got 'slice'
    The command is terminated due to an error: can't load config: can't unmarshal config by viper (flags, file): 1 error(s) decoding:

  • 'output.formats' expected a map, got 'slice'


Comment @coderabbitai help to get the list of available commands and usage tips.

@openshift-ci
Copy link

openshift-ci bot commented Feb 26, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: dependabot[bot]
Once this PR has been reviewed and has the lgtm label, please assign r4f4 for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Feb 26, 2026
@openshift-ci
Copy link

openshift-ci bot commented Feb 26, 2026

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@go.mod`:
- Line 3: Update the hard-pinned Go version to 1.25.0: change the Dockerfile's
GO_VERSION value (the GO_VERSION build ARG) from go1.23.5 to go1.25.0 and update
the v1/go.mod module directive from "go 1.24" to "go 1.25" so both the build
image and the v1 module match the root go.mod's go 1.25.0 requirement.

ℹ️ Review info

Configuration used: Repository: openshift/coderabbit/.coderabbit.yaml

Review profile: CHILL

Plan: Pro

Cache: Disabled due to data retention organization setting

Knowledge base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between e523ef7 and 2b10850.

⛔ Files ignored due to path filters (1)
  • go.sum is excluded by !**/*.sum
📒 Files selected for processing (1)
  • go.mod

module github.com/openshift/oc-mirror/v2

go 1.24.3
go 1.25.0
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🔴 Critical

🧩 Analysis chain

🏁 Script executed:

#!/bin/bash
# Read-only check for hard-pinned Go versions in common build/CI files.

fd -HI '(^|/)(\.github/workflows/.*\.ya?ml|Dockerfile(\..*)?|Makefile|.*\.mk|go\.mod)$' . \
| xargs -I{} sh -c 'echo "### {}"; rg -n -C2 "(go-version|golang:|^go[[:space:]]+[0-9]+\.[0-9]+|GO_VERSION|GOVERSION)" "{}" || true'

Repository: openshift/oc-mirror

Length of output: 2056


Update Dockerfile and v1/go.mod to align with Go 1.25.0 before merge.

Verification found hard-pinned Go versions that conflict:

  • Dockerfile (line 28) uses GO_VERSION=go1.23.5
  • v1/go.mod (line 3) requires go 1.24.0
  • Root go.mod now requires go 1.25.0

The build container will run an older Go version than required, causing compilation failures or inconsistent builds. Sync both the Dockerfile and v1/go.mod to Go 1.25.0.

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@go.mod` at line 3, Update the hard-pinned Go version to 1.25.0: change the
Dockerfile's GO_VERSION value (the GO_VERSION build ARG) from go1.23.5 to
go1.25.0 and update the v1/go.mod module directive from "go 1.24" to "go 1.25"
so both the build image and the v1 module match the root go.mod's go 1.25.0
requirement.

@aguidirh
Copy link
Contributor

/ok-to-test

@openshift-ci openshift-ci bot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Feb 27, 2026
…rectory with 5 updates

Bumps the oc-mirror-v2-security-updates group with 3 updates in the / directory: [golang.org/x/crypto](https://github.com/golang/crypto), [github.com/go-git/go-git/v5](https://github.com/go-git/go-git) and [github.com/sigstore/fulcio](https://github.com/sigstore/fulcio).


Updates `golang.org/x/crypto` from 0.41.0 to 0.45.0
- [Commits](golang/crypto@v0.41.0...v0.45.0)

Updates `github.com/go-git/go-git/v5` from 5.16.2 to 5.16.5
- [Release notes](https://github.com/go-git/go-git/releases)
- [Commits](go-git/go-git@v5.16.2...v5.16.5)

Updates `github.com/opencontainers/selinux` from 1.12.0 to 1.13.1
- [Release notes](https://github.com/opencontainers/selinux/releases)
- [Commits](opencontainers/selinux@v1.12.0...v1.13.1)

Updates `github.com/sigstore/fulcio` from 1.6.6 to 1.8.5
- [Release notes](https://github.com/sigstore/fulcio/releases)
- [Changelog](https://github.com/sigstore/fulcio/blob/main/CHANGELOG.md)
- [Commits](sigstore/fulcio@v1.6.6...v1.8.5)

Updates `github.com/sigstore/sigstore` from 1.9.5 to 1.10.3
- [Release notes](https://github.com/sigstore/sigstore/releases)
- [Commits](sigstore/sigstore@v1.9.5...v1.10.3)

---
updated-dependencies:
- dependency-name: golang.org/x/crypto
  dependency-version: 0.45.0
  dependency-type: direct:production
  dependency-group: oc-mirror-v2-security-updates
- dependency-name: github.com/go-git/go-git/v5
  dependency-version: 5.16.5
  dependency-type: indirect
  dependency-group: oc-mirror-v2-security-updates
- dependency-name: github.com/opencontainers/selinux
  dependency-version: 1.13.1
  dependency-type: indirect
  dependency-group: oc-mirror-v2-security-updates
- dependency-name: github.com/sigstore/fulcio
  dependency-version: 1.8.5
  dependency-type: indirect
  dependency-group: oc-mirror-v2-security-updates
- dependency-name: github.com/sigstore/sigstore
  dependency-version: 1.10.3
  dependency-type: indirect
  dependency-group: oc-mirror-v2-security-updates
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/oc-mirror-v2-security-updates-05c22a6b9b branch from 2b10850 to 823a720 Compare March 1, 2026 05:55
Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

♻️ Duplicate comments (1)
go.mod (1)

3-3: ⚠️ Potential issue | 🔴 Critical

Align all pinned Go versions with go 1.25.0 before merge.

Line 3 updates root go.mod to Go 1.25.0, but this was already flagged earlier as potentially conflicting with other pinned versions (Dockerfile, v1/go.mod). If still mismatched, builds can fail or become inconsistent.

#!/bin/bash
# Read-only verification of Go version pins across common build/module files.

fd -HI '(^|/)(go\.mod|Dockerfile(\..*)?|Makefile|.*\.mk|\.github/workflows/.*\.ya?ml)$' . \
| xargs -I{} sh -c 'echo "### {}"; rg -n -C2 "(^go[[:space:]]+[0-9]+\.[0-9]+(\.[0-9]+)?$|go-version:|GO_VERSION|golang:)" "{}" || true'

Expected: root go.mod, v1/go.mod, and build image/tooling pins all target Go 1.25.x.

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@go.mod` at line 3, Update all Go version pins to match go 1.25.0: find and
change any occurrences of module/go version declarations (root go.mod and
v1/go.mod's "go" directive), CI/workflow golang/golang-version or go-version
entries, Dockerfile image tags or ARGs (e.g., GO_VERSION), Makefile or *.mk
GO_VERSION variables, and any other build/tooling pins so they consistently
specify 1.25.0 (or 1.25.x as agreed). Ensure the "go" directive in both go.mod
files is 1.25.0 and that Dockerfile base images and CI variables reference the
same version, then run the verification script from the comment to confirm no
mismatches remain.
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@go.mod`:
- Line 198: Update the dependency go.opentelemetry.io/otel/sdk to v1.40.0 or
later in go.mod to address CVE-2026-24051: change the module version for
go.opentelemetry.io/otel/sdk to at least v1.40.0 (for example by running a
module upgrade such as go get go.opentelemetry.io/otel/sdk@v1.40.0), then run go
mod tidy and re-run tests/build to ensure the new version resolves correctly;
verify no other modules pin the older v1.38.0 version.

---

Duplicate comments:
In `@go.mod`:
- Line 3: Update all Go version pins to match go 1.25.0: find and change any
occurrences of module/go version declarations (root go.mod and v1/go.mod's "go"
directive), CI/workflow golang/golang-version or go-version entries, Dockerfile
image tags or ARGs (e.g., GO_VERSION), Makefile or *.mk GO_VERSION variables,
and any other build/tooling pins so they consistently specify 1.25.0 (or 1.25.x
as agreed). Ensure the "go" directive in both go.mod files is 1.25.0 and that
Dockerfile base images and CI variables reference the same version, then run the
verification script from the comment to confirm no mismatches remain.

ℹ️ Review info

Configuration used: Repository: openshift/coderabbit/.coderabbit.yaml

Review profile: CHILL

Plan: Pro

Cache: Disabled due to data retention organization setting

Knowledge base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between 2b10850 and 823a720.

⛔ Files ignored due to path filters (1)
  • go.sum is excluded by !**/*.sum
📒 Files selected for processing (1)
  • go.mod

go.opentelemetry.io/otel/metric v1.36.0 // indirect
go.opentelemetry.io/otel/sdk v1.36.0 // indirect
go.opentelemetry.io/otel/metric v1.38.0 // indirect
go.opentelemetry.io/otel/sdk v1.38.0 // indirect
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

🧩 Analysis chain

🏁 Script executed:

#!/bin/bash
python - <<'PY'
import json, urllib.request

query = {
  "package": {"ecosystem": "Go", "name": "go.opentelemetry.io/otel/sdk"},
  "version": "1.38.0"
}

req = urllib.request.Request(
  "https://api.osv.dev/v1/query",
  data=json.dumps(query).encode(),
  headers={"Content-Type": "application/json"},
  method="POST",
)

try:
    with urllib.request.urlopen(req) as r:
        data = json.load(r)
    print(json.dumps(data, indent=2))
except Exception as e:
    print(f"Error: {e}")
PY

Repository: openshift/oc-mirror

Length of output: 197


🏁 Script executed:

git ls-files | grep -E 'go\.mod$'

Repository: openshift/oc-mirror

Length of output: 174


🌐 Web query:

go.opentelemetry.io/otel/sdk v1.38.0 vulnerability PATH-hijacking RCE

💡 Result:

go.opentelemetry.io/otel/sdk v1.38.0 is affected by CVE-2026-24051 / GHSA-9h8m-3fm2-qjrq (Arbitrary Code Execution via local PATH hijacking) on macOS/Darwin. The issue is in sdk/resource/host_id.go (the WithHostID detector): it executes ioreg by name (searching PATH), so a local attacker who can influence PATH can cause execution of a malicious ioreg binary and get code execution in the app’s context. [1][2][3]

Fix: upgrade to v1.40.0+, which changes the call to use the absolute path /usr/sbin/ioreg. [1][2]
Example: go get go.opentelemetry.io/otel/sdk@v1.40.0 (and/or .../sdk/resource@v1.40.0). [1][3]

Scope note: this is local exploitation (depends on attacker control of environment/PATH), and only impacts macOS/Darwin. [1][3]

Sources: [1] GitHub Security Advisory GHSA-9h8m-3fm2-qjrq, [2] fix commit d45961b, [3] Snyk entry for CVE-2026-24051.


🌐 Web query:

go.opentelemetry.io/otel/sdk security advisory 2024 2025

💡 Result:

For go.opentelemetry.io/otel/sdk (OpenTelemetry-Go SDK), there were no published GitHub Security Advisories in 2024 or 2025. The repo’s advisories list shows a single published advisory, dated February 2, 2026 (GHSA-9h8m-3fm2-qjrq). [1]

The first published advisory (not 2024/2025, but relevant to the module) is:

Related but not a code vulnerability in the SDK: OpenTelemetry documented a Sep 25, 2025 incident where the go.opentelemetry.io SSL certificate expired, temporarily preventing downloads from that module domain. [3]

Sources: [1] [2] [3]


🏁 Script executed:

sed -n '195,201p' go.mod

Repository: openshift/oc-mirror

Length of output: 453


Upgrade go.opentelemetry.io/otel/sdk from v1.38.0 to v1.40.0 or later to fix CVE-2026-24051.

go.opentelemetry.io/otel/sdk v1.38.0 is affected by CVE-2026-24051 (GHSA-9h8m-3fm2-qjrq), a local arbitrary code execution vulnerability via PATH hijacking on macOS. The WithHostID detector executes ioreg by name instead of the absolute path, allowing local attackers to hijack the binary via PATH manipulation. Fixed in v1.40.0, which uses the absolute path /usr/sbin/ioreg.

🧰 Tools
🪛 OSV Scanner (2.3.3)

[HIGH] 198-198: go.opentelemetry.io/otel/sdk 1.38.0: OpenTelemetry Go SDK Vulnerable to Arbitrary Code Execution via PATH Hijacking in go.opentelemetry.io/otel/sdk

(GO-2026-4394)


[HIGH] 198-198: go.opentelemetry.io/otel/sdk 1.38.0: OpenTelemetry Go SDK Vulnerable to Arbitrary Code Execution via PATH Hijacking

(GHSA-9h8m-3fm2-qjrq)

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@go.mod` at line 198, Update the dependency go.opentelemetry.io/otel/sdk to
v1.40.0 or later in go.mod to address CVE-2026-24051: change the module version
for go.opentelemetry.io/otel/sdk to at least v1.40.0 (for example by running a
module upgrade such as go get go.opentelemetry.io/otel/sdk@v1.40.0), then run go
mod tidy and re-run tests/build to ensure the new version resolves correctly;
verify no other modules pin the older v1.38.0 version.

@openshift-ci
Copy link

openshift-ci bot commented Mar 1, 2026

@dependabot[bot]: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/unit 823a720 link true /test unit
ci/prow/images 823a720 link true /test images
ci/prow/okd-scos-images 823a720 link true /test okd-scos-images
ci/prow/integration 823a720 link true /test integration
ci/prow/sanity 823a720 link true /test sanity
ci/prow/lint 823a720 link true /test lint

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update Go code ok-to-test Indicates a non-member PR verified by an org member that is safe to test.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant