Skip to content

chore(deps): bump oauth2-proxy/oauth2-proxy from v7.15.1 to v7.15.2 in /helm/modelix#391

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/docker/helm/modelix/oauth2-proxy/oauth2-proxy-v7.15.2
Open

chore(deps): bump oauth2-proxy/oauth2-proxy from v7.15.1 to v7.15.2 in /helm/modelix#391
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/docker/helm/modelix/oauth2-proxy/oauth2-proxy-v7.15.2

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot bot commented on behalf of github Apr 15, 2026

Bumps oauth2-proxy/oauth2-proxy from v7.15.1 to v7.15.2.

Release notes

Sourced from oauth2-proxy/oauth2-proxy's releases.

v7.15.2

Release Highlights

Important Notes

We have had security audits performed on OAuth2 Proxy in the past couple of weeks and as a result we have fixed several CRITICAL vulnerabilities.

The security vulnerabilities include multiple authentication bypasses and a potential session fixation attack. For more details and to identify if you are effects, we urge all users of OAuth2 Proxy to read the security disclosures.

Furthermore, for improving the security of OAuth2 Proxy we introduced a new flag --trusted-proxy-ip that allows users to explicitly specify trusted reverse proxy IPs for the X-Forwarded-* headers. This is an important step to prevent potential header spoofing attacks and to ensure that OAuth2 Proxy only trusts headers from known and trusted sources. We highly recommend users to review their deployment architecture and consider using this flag to enhance the security of their OAuth2 Proxy instances. Check the docs for more details: https://oauth2-proxy.github.io/oauth2-proxy/configuration/overview#proxy-options

Furthermore, we want to thank everyone who contributed to the audits and reported potential issues to make open source software like OAuth2 Proxy more secure for everyone.

Breaking Changes

Changes since v7.15.1

Changelog

Sourced from oauth2-proxy/oauth2-proxy's changelog.

Changes since v7.15.2

V7.15.2

Release Highlights

Important Notes

We have had security audits performed on OAuth2 Proxy in the past couple of weeks and as a result we have fixed several CRITICAL vulnerabilities.

The security vulnerabilities include multiple authentication bypasses and a potential session fixation attack. For more details and to identify if you are effects, we urge all users of OAuth2 Proxy to read the security disclosures.

Furthermore, for improving the security of OAuth2 Proxy we introduced a new flag --trusted-proxy-ip that allows users to explicitly specify trusted reverse proxy IPs for the X-Forwarded-* headers. This is an important step to prevent potential header spoofing attacks and to ensure that OAuth2 Proxy only trusts headers from known and trusted sources. We highly recommend users to review their deployment architecture and consider using this flag to enhance the security of their OAuth2 Proxy instances. Check the docs for more details: https://oauth2-proxy.github.io/oauth2-proxy/configuration/overview#proxy-options

Furthermore, we want to thank everyone who contributed to the audits and reported potential issues to make open source software like OAuth2 Proxy more secure for everyone.

Breaking Changes

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [oauth2-proxy/oauth2-proxy](https://github.com/oauth2-proxy/oauth2-proxy) from v7.15.1 to v7.15.2.
- [Release notes](https://github.com/oauth2-proxy/oauth2-proxy/releases)
- [Changelog](https://github.com/oauth2-proxy/oauth2-proxy/blob/master/CHANGELOG.md)
- [Commits](oauth2-proxy/oauth2-proxy@v7.15.1...v7.15.2)

---
updated-dependencies:
- dependency-name: oauth2-proxy/oauth2-proxy
  dependency-version: v7.15.2
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file docker Pull requests that update docker code labels Apr 15, 2026
@github-actions
Copy link
Copy Markdown

Test Results

27 tests  ±0   27 ✅ ±0   1m 35s ⏱️ -1s
 7 suites ±0    0 💤 ±0 
 7 files   ±0    0 ❌ ±0 

Results for commit 81c44d5. ± Comparison against base commit c995ded.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file docker Pull requests that update docker code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants