Skip to content

Update module golang.org/x/net to v0.38.0 [SECURITY]#547

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/go-golang.org-x-net-vulnerability
Open

Update module golang.org/x/net to v0.38.0 [SECURITY]#547
renovate[bot] wants to merge 1 commit intomainfrom
renovate/go-golang.org-x-net-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Dec 19, 2024

This PR contains the following updates:

Package Change Age Confidence
golang.org/x/net v0.23.0v0.38.0 age confidence

HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net

CVE-2025-22870 / GHSA-qxp5-gwg8-xv66

More information

Details

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

Severity

  • CVSS Score: 4.4 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


golang.org/x/net vulnerable to Cross-site Scripting

CVE-2025-22872 / GHSA-vvgc-356p-c3xw

More information

Details

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot requested a review from mkmik as a code owner December 19, 2024 02:50
@renovate
Copy link
Copy Markdown
Contributor Author

renovate Bot commented Dec 19, 2024

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 3 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.21 -> 1.23.0
golang.org/x/crypto v0.21.0 -> v0.36.0
golang.org/x/sys v0.18.0 -> v0.31.0
golang.org/x/text v0.14.0 -> v0.23.0

@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 3 times, most recently from c2336fc to 1f98581 Compare December 23, 2024 15:49
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 1f98581 to 883db36 Compare December 30, 2024 18:53
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 2 times, most recently from 0045724 to 7869d96 Compare January 8, 2025 09:34
@renovate renovate Bot changed the title Update module golang.org/x/net to v0.33.0 [SECURITY] Update module golang.org/x/net to v0.33.0 [SECURITY] - autoclosed Jan 9, 2025
@renovate renovate Bot closed this Jan 9, 2025
@renovate renovate Bot deleted the renovate/go-golang.org-x-net-vulnerability branch January 9, 2025 00:57
@renovate renovate Bot changed the title Update module golang.org/x/net to v0.33.0 [SECURITY] - autoclosed Update module golang.org/x/net to v0.33.0 [SECURITY] Jan 9, 2025
@renovate renovate Bot reopened this Jan 9, 2025
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 3 times, most recently from f18cfa9 to 1d76638 Compare January 15, 2025 15:32
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 2 times, most recently from 794e8d0 to cb881a5 Compare January 24, 2025 15:32
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 3 times, most recently from 8849ebf to e3ce1ed Compare February 6, 2025 19:07
@renovate renovate Bot changed the title Update module golang.org/x/net to v0.33.0 [SECURITY] Update module golang.org/x/net to v0.36.0 [SECURITY] Mar 13, 2025
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 6 times, most recently from 5955ea0 to cbc9599 Compare March 19, 2025 04:54
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 2 times, most recently from 66897a9 to 333c45d Compare June 27, 2025 01:04
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 333c45d to 68aacca Compare August 10, 2025 13:32
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 3 times, most recently from a27075c to e0c309c Compare August 25, 2025 17:21
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from e0c309c to 56a4243 Compare September 3, 2025 20:32
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 3 times, most recently from 15c2a8d to 138fcc9 Compare October 7, 2025 12:37
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 2 times, most recently from 9dc3f71 to 151ed56 Compare November 20, 2025 17:35
@renovate
Copy link
Copy Markdown
Contributor Author

renovate Bot commented Dec 15, 2025

ℹ️ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 3 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.21 -> 1.23.0
golang.org/x/crypto v0.21.0 -> v0.36.0
golang.org/x/sys v0.18.0 -> v0.31.0
golang.org/x/text v0.14.0 -> v0.23.0

@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 2 times, most recently from 6ae34db to e0a0ea1 Compare December 18, 2025 09:49
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 2 times, most recently from c858229 to bc2fbe7 Compare January 27, 2026 14:47
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 2 times, most recently from e401237 to feb88d8 Compare February 14, 2026 00:54
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from feb88d8 to 6a2c783 Compare March 5, 2026 23:56
@renovate renovate Bot changed the title Update module golang.org/x/net to v0.38.0 [SECURITY] Update module golang.org/x/net to v0.38.0 [SECURITY] - autoclosed Mar 27, 2026
@renovate renovate Bot closed this Mar 27, 2026
@renovate renovate Bot changed the title Update module golang.org/x/net to v0.38.0 [SECURITY] - autoclosed Update module golang.org/x/net to v0.38.0 [SECURITY] Mar 30, 2026
@renovate renovate Bot reopened this Mar 30, 2026
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 2 times, most recently from 6a2c783 to 7b7ba22 Compare March 30, 2026 20:48
@renovate renovate Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 7b7ba22 to cc19c8d Compare April 25, 2026 22:19
@renovate renovate Bot changed the title Update module golang.org/x/net to v0.38.0 [SECURITY] Update module golang.org/x/net to v0.38.0 [SECURITY] - autoclosed Apr 27, 2026
@renovate renovate Bot closed this Apr 27, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants