Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update module golang.org/x/net to v0.33.0 [security] (release-1.14) - abandoned #794

Conversation

crossplane-renovate[bot]
Copy link
Contributor

This PR contains the following updates:

Package Type Update Change
golang.org/x/net indirect minor v0.23.0 -> v0.33.0

GitHub Vulnerability Alerts

CVE-2024-45338

An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.


Non-linear parsing of case-insensitive content in golang.org/x/net/html

CVE-2024-45338 / GHSA-w32m-9786-jp63 / GO-2024-3333

More information

Details

An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.

Severity

  • CVSS Score: Unknown
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Non-linear parsing of case-insensitive content in golang.org/x/net/html

CVE-2024-45338 / GHSA-w32m-9786-jp63 / GO-2024-3333

More information

Details

An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@crossplane-renovate crossplane-renovate bot requested review from a team as code owners December 19, 2024 08:06
@crossplane-renovate crossplane-renovate bot requested review from negz and removed request for a team December 19, 2024 08:06
@crossplane-renovate
Copy link
Contributor Author

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 5 additional dependencies were updated

Details:

Package Change
golang.org/x/mod v0.13.0 -> v0.17.0
golang.org/x/sys v0.18.0 -> v0.28.0
golang.org/x/term v0.18.0 -> v0.27.0
golang.org/x/text v0.14.0 -> v0.21.0
golang.org/x/tools v0.14.0 -> v0.21.1-0.20240508182429-e35e4ccd0d2d

@crossplane-renovate crossplane-renovate bot requested review from nullable-eth and removed request for a team December 19, 2024 08:06
@crossplane-renovate crossplane-renovate bot changed the title chore(deps): update module golang.org/x/net to v0.33.0 [security] (release-1.14) chore(deps): update module golang.org/x/net to v0.33.0 [security] (release-1.14) - abandoned Dec 19, 2024
@crossplane-renovate
Copy link
Contributor Author

Autoclosing Skipped

This PR has been flagged for autoclosing. However, it is being skipped due to the branch being already modified. Please close/delete it manually or report a bug if you think this is in error.

@jbw976
Copy link
Member

jbw976 commented Dec 19, 2024

This should be closed now that we have our renovate config up to date with #797

@jbw976 jbw976 closed this Dec 19, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant