-
Notifications
You must be signed in to change notification settings - Fork 1.1k
chore(deps): update module golang.org/x/oauth2 to v0.27.0 [security] (release-1.18) #6313
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update module golang.org/x/oauth2 to v0.27.0 [security] (release-1.18) #6313
Conversation
|
b792aa0 to
bb64a4c
Compare
Signed-off-by: Jared Watts <[email protected]>
|
|
Edited/Blocked NotificationRenovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR. You can manually request rebase by checking the rebase/retry box above. |
Signed-off-by: Jared Watts <[email protected]>
Signed-off-by: Philippe Scorsolini <[email protected]> (cherry picked from commit 037f7c8)
021d357 to
5474c24
Compare
|
@phisco I would definitely appreciate your quick eyes on this PR! This PR started as a simple oauth2 bump, but also brought in:
|
phisco
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- Renovate automatically bumped golang to
v1.23.7, but only ingo.mod
This is weird, but I lost the hope to understand what's going on with go.mod toolchain and such a while ago, so fine, I guess...
check-diff is failing and needed to run
earthly +generate: 5474c24#diff-a44cbffff9be3b4e03352b68e867b1b315bf8fb2a69794260964dce2395676db
- ^^ this is the one I most want your eyes on, is this generated code change from the non-pointer receiver changing to a pointer receiver safe to do in this release branch? 🤔
yes, it's safe, all changed methods are only reading the struct.
Thank you for taking care of this, @jbw976!
This PR contains the following updates:
v0.22.0->v0.27.0Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Unexpected memory consumption during token parsing in golang.org/x/oauth2
CVE-2025-22868 / GO-2025-3488
More information
Details
An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.