chore(deps): bump github.com/open-policy-agent/opa from 1.12.3 to 1.13.1 in /policy/opa in the opa-deps group#69
Conversation
Bumps the opa-deps group in /policy/opa with 1 update: [github.com/open-policy-agent/opa](https://github.com/open-policy-agent/opa). Updates `github.com/open-policy-agent/opa` from 1.12.3 to 1.13.1 - [Release notes](https://github.com/open-policy-agent/opa/releases) - [Changelog](https://github.com/open-policy-agent/opa/blob/main/CHANGELOG.md) - [Commits](open-policy-agent/opa@v1.12.3...v1.13.1) --- updated-dependencies: - dependency-name: github.com/open-policy-agent/opa dependency-version: 1.13.1 dependency-type: direct:production update-type: version-update:semver-minor dependency-group: opa-deps ... Signed-off-by: dependabot[bot] <support@github.com>
LabelsThe following labels could not be found: Please fix the above issues or remove invalid values from |
Deploying with
|
| Status | Name | Latest Commit | Preview URL | Updated (UTC) |
|---|---|---|---|---|
| ✅ Deployment successful! View logs |
blob | bee6373 | Commit Preview URL Branch Preview URL |
Feb 09 2026, 10:14 AM |
Kusari Analysis Results:Caution Flagged Issues Detected While the OPA dependency upgrade from v1.12.3 to v1.13.1 is safe with no vulnerabilities in the updated packages themselves, this PR cannot be merged due to 3 critical vulnerabilities in the Go standard library (v1.25.5). The affected components include crypto/tls (CVE-2025-68121: unexpected session resumption, CVE-2025-61730: handshake messages at incorrect encryption level) and net/url (CVE-2025-61726: memory exhaustion in query parsing). These vulnerabilities directly compromise secure communications and system stability. Action required: Update the Go version in go.mod to a patched release that addresses GO-2026-4337, GO-2026-4340, and GO-2026-4341, then run 'go mod tidy'. The OPA upgrade itself is sound and should be retained once the Go stdlib is patched. Note View full detailed analysis result for more information on the output and the checks that were run. Required Code MitigationsUpdate the Go version to address the three critical vulnerabilities in the standard library. The current version (v1.25.5) has known security issues in crypto/tls and net/url packages. Upgrade to the latest patched Go version that addresses CVE-2025-68121, CVE-2025-61730, and CVE-2025-61726.
Found this helpful? Give it a 👍 or 👎 reaction! |
Bumps the opa-deps group in /policy/opa with 1 update: github.com/open-policy-agent/opa.
Updates
github.com/open-policy-agent/opafrom 1.12.3 to 1.13.1Release notes
Sourced from github.com/open-policy-agent/opa's releases.
... (truncated)
Changelog
Sourced from github.com/open-policy-agent/opa's changelog.
... (truncated)
Commits
9c3bb90capabilities file92637c5Prepare v1.13.1 release5442885Fix issue in array.flatten handling of single item arrays (#8273)a232916Prepare v1.13.0 release (#8268)e2acecewebsite: Display 2025 survey results on the website (#8258)0fed5e8ast: Improve type error message when referencing functions (#8253)a87219eEnable sorting JSON test results by duration (#8260)262c4f1Add redirect section for immutable referrers (#8265)0f48904Support arrays as input for json.match_schema (#8264)cb92be6build(deps): bump the dependencies group across 2 directories with 8 updates ...Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore <dependency name> major versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)@dependabot ignore <dependency name> minor versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)@dependabot ignore <dependency name>will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)@dependabot unignore <dependency name>will remove all of the ignore conditions of the specified dependency@dependabot unignore <dependency name> <ignore condition>will remove the ignore condition of the specified dependency and ignore conditions