Skip to content

Conversation

@crossplane-renovate
Copy link
Contributor

@crossplane-renovate crossplane-renovate bot commented Mar 13, 2025

This PR contains the following updates:

Package Type Update Change
golang.org/x/net require minor v0.33.0 -> v0.36.0

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.

GitHub Vulnerability Alerts

CVE-2025-22870

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.


HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net

CVE-2025-22870 / GHSA-qxp5-gwg8-xv66 / GO-2025-3503

More information

Details

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net

CVE-2025-22870 / GHSA-qxp5-gwg8-xv66 / GO-2025-3503

More information

Details

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

Severity

  • CVSS Score: 4.4 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@crossplane-renovate crossplane-renovate bot requested a review from a team as a code owner March 13, 2025 08:17
@crossplane-renovate crossplane-renovate bot requested a review from turkenh March 13, 2025 08:17
@crossplane-renovate crossplane-renovate bot force-pushed the renovate/release-1.18-go-golang.org-x-net-vulnerability branch from b5f71a8 to eb4257c Compare March 14, 2025 08:17
@crossplane-renovate
Copy link
Contributor Author

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 5 additional dependencies were updated

Details:

Package Change
golang.org/x/sync v0.10.0 -> v0.11.0
golang.org/x/crypto v0.32.0 -> v0.35.0
golang.org/x/sys v0.29.0 -> v0.30.0
golang.org/x/term v0.28.0 -> v0.29.0
golang.org/x/text v0.21.0 -> v0.22.0

@crossplane-renovate crossplane-renovate bot force-pushed the renovate/release-1.18-go-golang.org-x-net-vulnerability branch from eb4257c to 8a175c3 Compare March 18, 2025 18:50
@jbw976 jbw976 merged commit ec1fa1f into release-1.18 Mar 26, 2025
25 of 26 checks passed
@crossplane-renovate crossplane-renovate bot deleted the renovate/release-1.18-go-golang.org-x-net-vulnerability branch March 27, 2025 08:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants