Upgrade golang.org/x/net from 0.23.0 to 0.33.0
#5940
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
As noted in #5939 (comment), the vulnerability addressed by this update to the
x/netGo module, reported as CVE-2024-45338, only pertains to thex/net/htmlpackage and the Git LFS client doesn't parse any HTML, so there is no immediate need to release a new version of Git LFS.While we do import some packages from the
x/netmodule, both directly and indirectly, none of them are thex/net/htmlpackage. We can confirm this is the case by runninggo list -json all | grep x/net/html, which returns no output.Nevertheless, we might as well upgrade the module, so that when we do release v3.7.0 of the Git LFS client, security scanners will not generate false positive reports.
For reference, the details of the vulnerability are described in golang/go#70906, the GO-2024-3333 report, and in the release announcement for version 0.33.0 of the
x/netmodule.Resolves #5939.