Skip to content

chore(deps): update module golang.org/x/net to v0.38.0 [SECURITY]#14

Open
renovate[bot] wants to merge 1 commit into
mainfrom
renovate/go-golang.org-x-net-vulnerability
Open

chore(deps): update module golang.org/x/net to v0.38.0 [SECURITY]#14
renovate[bot] wants to merge 1 commit into
mainfrom
renovate/go-golang.org-x-net-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Dec 22, 2024

This PR contains the following updates:

Package Change Age Confidence
golang.org/x/net v0.24.0v0.38.0 age confidence

HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net

CVE-2025-22870 / GHSA-qxp5-gwg8-xv66

More information

Details

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

Severity

  • CVSS Score: 4.4 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


golang.org/x/net vulnerable to Cross-site Scripting

CVE-2025-22872 / GHSA-vvgc-356p-c3xw

More information

Details

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate
Copy link
Copy Markdown
Contributor Author

renovate Bot commented Dec 22, 2024

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 3 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.22.2 -> 1.24.1
golang.org/x/text v0.15.0 -> v0.22.0
golang.org/x/crypto v0.22.0 -> v0.35.0
golang.org/x/sys v0.19.0 -> v0.30.0

@renovate renovate Bot added the type: dependencies This change updates, adds, or removes a dependency label Dec 22, 2024
@renovate renovate Bot changed the title chore(deps): update module golang.org/x/net to v0.33.0 [SECURITY] chore(deps): update module golang.org/x/net to v0.36.0 [SECURITY] Mar 13, 2025
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 2 times, most recently from 0de24f4 to c8871e5 Compare March 13, 2025 18:19
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from c8871e5 to 7075d00 Compare April 16, 2025 22:46
@renovate renovate Bot changed the title chore(deps): update module golang.org/x/net to v0.36.0 [SECURITY] chore(deps): update module golang.org/x/net to v0.38.0 [SECURITY] Apr 16, 2025
@renovate
Copy link
Copy Markdown
Contributor Author

renovate Bot commented Feb 2, 2026

ℹ️ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 3 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.22.2 -> 1.23.0
golang.org/x/text v0.15.0 -> v0.23.0
golang.org/x/crypto v0.22.0 -> v0.36.0
golang.org/x/sys v0.19.0 -> v0.31.0

@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 7075d00 to 105cc90 Compare February 2, 2026 21:51
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 105cc90 to 6d71147 Compare February 12, 2026 10:48
@renovate renovate Bot changed the title chore(deps): update module golang.org/x/net to v0.38.0 [SECURITY] chore(deps): update module golang.org/x/net to v0.38.0 [SECURITY] - autoclosed Mar 27, 2026
@renovate renovate Bot closed this Mar 27, 2026
@renovate renovate Bot deleted the renovate/go-golang.org-x-net-vulnerability branch March 27, 2026 00:45
@renovate renovate Bot changed the title chore(deps): update module golang.org/x/net to v0.38.0 [SECURITY] - autoclosed chore(deps): update module golang.org/x/net to v0.38.0 [SECURITY] Apr 1, 2026
@renovate renovate Bot reopened this Apr 1, 2026
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 2 times, most recently from 6d71147 to 54e8c31 Compare April 1, 2026 20:57
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

type: dependencies This change updates, adds, or removes a dependency

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants