Skip to content

Conversation

renovate[bot]
Copy link

@renovate renovate bot commented Aug 4, 2025

This PR contains the following updates:

Package Change Age Confidence
golang.org/x/oauth2 v0.10.0 -> v0.27.0 age confidence

GitHub Vulnerability Alerts

CVE-2025-22868

An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added the automated label Aug 4, 2025
Copy link
Author

renovate bot commented Aug 4, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.21 -> 1.23.0

@renovate renovate bot added the automated label Aug 4, 2025
@renovate renovate bot force-pushed the renovate/go-golang.org-x-oauth2-vulnerability branch from 47038c2 to 634554e Compare August 12, 2025 00:05
@renovate renovate bot force-pushed the renovate/go-golang.org-x-oauth2-vulnerability branch from 634554e to 8b7117d Compare August 15, 2025 12:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants