chore(deps): bump pgx, pin Go 1.26.2, base image to docker:29.4.1 (#706)
Summary
Followup to #705 (closed). Fresh trivy + govulncheck pass on master flagged additional CVEs that this batch resolves.
Fixed
pgx/v5 v5.9.1 -> v5.9.2- CVE-2026-33816 (memory-safety inpgproto3.Backend.Receive)- pin CI to
golang:1.26.2(-alpine)- clears 5 stdlib CVEs in our binary (CVE-2026-32280/32281/32282/32283/33810). Thegolang:1.26tag now points to 1.26.2 butpull_policy: if-not-presentwas reusing the cached 1.26.1 image on runners. docker:29.4.0 -> 29.4.1(sha256c77e5d79) in dblab-server, dblab-cli, ci-checker, dblab-server-debug- bump
Dockerfile.dblab-server-debugbuildergolang:1.26 -> 1.26.2
Dockerfile.dblab-server-zfs08 left alone (legacy zfs0.8 variant pinned to Alpine v3.12 repo, same as previous CVE batch).
Out of scope - require upstream action
- CVE-2026-34040 + CVE-2026-33997 (
github.com/docker/docker): the v1 module is no longer maintained. Fix is ingithub.com/moby/moby/v2 >= 2.0.0-beta.8. Migration touches ~9 import paths and the API surface changed. v2 is still beta. Reachable throughinit()in our code but the actual exploit conditions (Docker AuthZ plugins, plugin install with crafted privileges) don't apply to DLE. - Base-image binaries (containerd, buildkit, docker-buildx, docker-compose: grpc v1.78.0, otel/sdk v1.38.0, go-jose v4.1.3, moby/buildkit v0.27.1, moby/spdystream v0.5.0): shipped by Docker Inc. inside
docker:29.4.x. Verified by scanningdocker:29.4.1directly - same CVEs. Resolves when Docker Inc. ships a rebuilt image.
Edited by Artyom Kartasov