Skip to content

Conversation

renovate[bot]
Copy link

@renovate renovate bot commented Aug 9, 2024

This PR contains the following updates:

Package Change Age Confidence
golang.org/x/net v0.17.0 -> v0.38.0 age confidence

GitHub Vulnerability Alerts

CVE-2023-45288

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVE-2025-22870

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

CVE-2025-22872

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added the automated label Aug 9, 2024
@renovate renovate bot requested a review from ulucinar as a code owner August 9, 2024 02:44
Copy link
Author

renovate bot commented Aug 9, 2024

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 5 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.21 -> 1.23.0
golang.org/x/mod v0.13.0 -> v0.17.0
golang.org/x/sys v0.14.0 -> v0.31.0
golang.org/x/term v0.13.0 -> v0.30.0
golang.org/x/text v0.14.0 -> v0.23.0
golang.org/x/tools v0.13.0 -> v0.21.1-0.20240508182429-e35e4ccd0d2d

@renovate renovate bot changed the title Update module golang.org/x/net to v0.23.0 [SECURITY] Update module golang.org/x/net to v0.33.0 [SECURITY] Dec 21, 2024
@renovate renovate bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from ae4023f to 4bdab21 Compare December 21, 2024 02:41
@renovate renovate bot changed the title Update module golang.org/x/net to v0.33.0 [SECURITY] Update module golang.org/x/net to v0.36.0 [SECURITY] Mar 14, 2025
@renovate renovate bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 4bdab21 to 1a2abf4 Compare March 14, 2025 03:19
@renovate renovate bot requested a review from sergenyalcin as a code owner March 14, 2025 03:19
@renovate renovate bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 1a2abf4 to bbecf39 Compare March 19, 2025 04:02
@renovate renovate bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from bbecf39 to ddadcc2 Compare April 9, 2025 00:19
@renovate renovate bot changed the title Update module golang.org/x/net to v0.36.0 [SECURITY] Update module golang.org/x/net to v0.38.0 [SECURITY] Apr 17, 2025
@renovate renovate bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from ddadcc2 to 0a970d4 Compare April 17, 2025 04:13
@renovate renovate bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 0a970d4 to 770718a Compare May 9, 2025 23:49
@renovate renovate bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 770718a to da26513 Compare August 12, 2025 00:05
@renovate renovate bot changed the title Update module golang.org/x/net to v0.38.0 [SECURITY] Update module golang.org/x/net to v0.38.0 [SECURITY] - autoclosed Aug 15, 2025
@renovate renovate bot closed this Aug 15, 2025
@renovate renovate bot deleted the renovate/go-golang.org-x-net-vulnerability branch August 15, 2025 12:04
@renovate renovate bot changed the title Update module golang.org/x/net to v0.38.0 [SECURITY] - autoclosed Update module golang.org/x/net to v0.38.0 [SECURITY] Aug 16, 2025
@renovate renovate bot reopened this Aug 16, 2025
@renovate renovate bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from af3e341 to da26513 Compare August 16, 2025 23:42
@renovate renovate bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from da26513 to 238b24b Compare August 17, 2025 19:55
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants