Skip to content

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Mar 20, 2025

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
golang.org/x/net v0.33.0 -> v0.38.0 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2025-22870

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

CVE-2025-22872

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Never, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added the security label Mar 20, 2025
Copy link
Contributor Author

renovate bot commented Mar 20, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 5 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.22 -> 1.23.0
golang.org/x/text v0.21.0 -> v0.23.0
golang.org/x/crypto v0.31.0 -> v0.36.0
golang.org/x/sync v0.10.0 -> v0.12.0
golang.org/x/sys v0.28.0 -> v0.31.0
golang.org/x/term v0.27.0 -> v0.30.0

@renovate renovate bot changed the title Update module golang.org/x/net to v0.36.0 [SECURITY] Update module golang.org/x/net to v0.36.0 [SECURITY] - autoclosed Aug 15, 2025
@renovate renovate bot closed this Aug 15, 2025
@renovate renovate bot deleted the renovate/go-golang.org-x-net-vulnerability branch August 15, 2025 11:54
@renovate renovate bot changed the title Update module golang.org/x/net to v0.36.0 [SECURITY] - autoclosed Update module golang.org/x/net to v0.36.0 [SECURITY] Aug 15, 2025
@renovate renovate bot reopened this Aug 15, 2025
@renovate renovate bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from c0fc74c to 60e9b17 Compare August 15, 2025 13:39
@renovate renovate bot changed the title Update module golang.org/x/net to v0.36.0 [SECURITY] Update module golang.org/x/net to v0.38.0 [SECURITY] Aug 15, 2025
@bitrise-ip-bot
Copy link

bitrise-ip-bot commented Aug 15, 2025

Summary

This PR updates Go dependencies, primarily golang.org/x/net for security fixes. However, there's a critical version mismatch: the actual update is to v0.36.0 instead of the expected v0.38.0, potentially leaving security vulnerabilities unpatched.

Walkthrough

File Summary
go.mod, go.sum Updated golang.org/x/net and related dependencies for security fixes, but version mismatch identified

Copy link

@bitrise-ip-bot bitrise-ip-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is an AI-generated review. Please review it carefully.

Actionable comments posted: 1

golang.org/x/sys v0.28.0 // indirect
golang.org/x/term v0.27.0 // indirect
golang.org/x/crypto v0.35.0 // indirect
golang.org/x/net v0.36.0 // indirect

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🔒 Security Issue

Critical version mismatch: The PR description states this should update golang.org/x/net to v0.38.0 to address CVE-2025-22870 and CVE-2025-22872, but the actual version in go.mod is v0.36.0. This may leave the security vulnerabilities unpatched.

🔄 Suggestion:

Suggested change
golang.org/x/net v0.36.0 // indirect
golang.org/x/net v0.38.0 // indirect

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant