Skip to content

chore(deps): update module golang.org/x/net to v0.45.0 [security]#85

Open
redhat-renovate-bot wants to merge 1 commit intomainfrom
renovate/go-golang.org-x-net-vulnerability
Open

chore(deps): update module golang.org/x/net to v0.45.0 [security]#85
redhat-renovate-bot wants to merge 1 commit intomainfrom
renovate/go-golang.org-x-net-vulnerability

Conversation

@redhat-renovate-bot
Copy link
Copy Markdown
Collaborator

@redhat-renovate-bot redhat-renovate-bot commented Mar 13, 2025

This PR contains the following updates:

Package Type Update Change
golang.org/x/net indirect minor v0.33.0v0.45.0

GitHub Vulnerability Alerts

CVE-2025-22870

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

CVE-2025-22872

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).


HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net

CVE-2025-22870 / GHSA-qxp5-gwg8-xv66 / GO-2025-3503

More information

Details

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net

CVE-2025-22870 / GHSA-qxp5-gwg8-xv66 / GO-2025-3503

More information

Details

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

Severity

  • CVSS Score: 4.4 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net

CVE-2025-22872 / GHSA-vvgc-356p-c3xw / GO-2025-3595

More information

Details

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


golang.org/x/net vulnerable to Cross-site Scripting

CVE-2025-22872 / GHSA-vvgc-356p-c3xw / GO-2025-3595

More information

Details

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Quadratic parsing complexity in golang.org/x/net/html

CVE-2025-47911 / GHSA-w4gw-w5jq-g9jh / GO-2026-4440

More information

Details

The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Infinite parsing loop in golang.org/x/net

CVE-2025-58190 / GO-2026-4441

More information

Details

The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@redhat-renovate-bot redhat-renovate-bot added the release-note-none Denotes a PR that doesn't merit a release note. label Mar 13, 2025
@redhat-renovate-bot
Copy link
Copy Markdown
Collaborator Author

redhat-renovate-bot commented Mar 13, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 4 additional dependencies were updated

Details:

Package Change
golang.org/x/sys v0.28.0 -> v0.36.0
golang.org/x/term v0.27.0 -> v0.35.0
golang.org/x/text v0.21.0 -> v0.29.0
golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d -> v0.36.0

@kubevirt-bot kubevirt-bot added the dco-signoff: yes Indicates the PR's author has DCO signed all their commits. label Mar 13, 2025
@kubevirt-bot kubevirt-bot requested review from RamLavi and qinqon March 13, 2025 02:19
Comment thread go.mod Outdated
module github.com/kubevirt/bridge-marker

go 1.22.0
go 1.23.0
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

iiuc this is safe for main

@redhat-renovate-bot redhat-renovate-bot changed the title chore(deps): update module golang.org/x/net to v0.36.0 [security] chore(deps): update module golang.org/x/net to v0.38.0 [security] Apr 16, 2025
@redhat-renovate-bot redhat-renovate-bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 33c885b to 2b8d2ad Compare April 16, 2025 23:22
@kubevirt-bot
Copy link
Copy Markdown

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign qinqon for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@redhat-renovate-bot redhat-renovate-bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 2b8d2ad to 77e9f0a Compare October 20, 2025 14:40
@kubevirt-bot kubevirt-bot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jan 7, 2026
@redhat-renovate-bot redhat-renovate-bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 77e9f0a to e64a842 Compare January 10, 2026 11:41
@kubevirt-bot kubevirt-bot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jan 10, 2026
@redhat-renovate-bot redhat-renovate-bot changed the title chore(deps): update module golang.org/x/net to v0.38.0 [security] chore(deps): update module golang.org/x/net to v0.45.0 [security] Feb 7, 2026
@redhat-renovate-bot redhat-renovate-bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from e64a842 to 41ad424 Compare February 7, 2026 02:43
@redhat-renovate-bot redhat-renovate-bot changed the title chore(deps): update module golang.org/x/net to v0.45.0 [security] chore(deps): update module golang.org/x/net to v0.38.0 [security] Feb 11, 2026
@redhat-renovate-bot redhat-renovate-bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 41ad424 to be03d5a Compare February 11, 2026 22:12
@redhat-renovate-bot redhat-renovate-bot changed the title chore(deps): update module golang.org/x/net to v0.38.0 [security] chore(deps): update module golang.org/x/net to v0.45.0 [security] Feb 14, 2026
@redhat-renovate-bot redhat-renovate-bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from be03d5a to 76e919c Compare February 14, 2026 04:39
@redhat-renovate-bot redhat-renovate-bot changed the title chore(deps): update module golang.org/x/net to v0.45.0 [security] chore(deps): update module golang.org/x/net to v0.38.0 [security] Mar 4, 2026
@redhat-renovate-bot redhat-renovate-bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 2 times, most recently from e35f7b4 to 7817149 Compare March 5, 2026 23:38
@redhat-renovate-bot redhat-renovate-bot changed the title chore(deps): update module golang.org/x/net to v0.38.0 [security] chore(deps): update module golang.org/x/net to v0.45.0 [security] Mar 5, 2026
@redhat-renovate-bot redhat-renovate-bot changed the title chore(deps): update module golang.org/x/net to v0.45.0 [security] chore(deps): update module golang.org/x/net to v0.38.0 [security] Mar 7, 2026
@redhat-renovate-bot redhat-renovate-bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 7817149 to 0512f28 Compare March 7, 2026 20:11
@redhat-renovate-bot redhat-renovate-bot changed the title chore(deps): update module golang.org/x/net to v0.38.0 [security] chore(deps): update module golang.org/x/net to v0.45.0 [security] Mar 8, 2026
@redhat-renovate-bot redhat-renovate-bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 0512f28 to 32b0ada Compare March 8, 2026 19:39
@redhat-renovate-bot redhat-renovate-bot changed the title chore(deps): update module golang.org/x/net to v0.45.0 [security] chore(deps): update module golang.org/x/net to v0.38.0 [security] Apr 6, 2026
@redhat-renovate-bot
Copy link
Copy Markdown
Collaborator Author

redhat-renovate-bot commented Apr 6, 2026

ℹ️ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 4 additional dependencies were updated

Details:

Package Change
golang.org/x/sys v0.28.0 -> v0.36.0
golang.org/x/term v0.27.0 -> v0.35.0
golang.org/x/text v0.21.0 -> v0.29.0
golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d -> v0.36.0

@redhat-renovate-bot redhat-renovate-bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 2 times, most recently from 4efe02c to 52efd7a Compare April 7, 2026 09:40
@redhat-renovate-bot redhat-renovate-bot changed the title chore(deps): update module golang.org/x/net to v0.38.0 [security] chore(deps): update module golang.org/x/net to v0.45.0 [security] Apr 7, 2026
@redhat-renovate-bot redhat-renovate-bot changed the title chore(deps): update module golang.org/x/net to v0.45.0 [security] chore(deps): update module golang.org/x/net to v0.38.0 [security] Apr 13, 2026
@redhat-renovate-bot redhat-renovate-bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 52efd7a to 123cf33 Compare April 13, 2026 16:17
Signed-off-by: redhat-renovate-bot <redhat-internal-renovate@redhat.com>
@redhat-renovate-bot redhat-renovate-bot changed the title chore(deps): update module golang.org/x/net to v0.38.0 [security] chore(deps): update module golang.org/x/net to v0.45.0 [security] Apr 13, 2026
@redhat-renovate-bot redhat-renovate-bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 123cf33 to fdf7fc6 Compare April 13, 2026 20:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dco-signoff: yes Indicates the PR's author has DCO signed all their commits. release-note-none Denotes a PR that doesn't merit a release note. size/XXL

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants