Skip to content

Conversation

redhat-renovate-bot
Copy link
Collaborator

@redhat-renovate-bot redhat-renovate-bot commented Apr 30, 2025

This PR contains the following updates:

Package Type Update Change
golang.org/x/net require minor v0.34.0 -> v0.38.0

HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net

CVE-2025-22870 / GHSA-qxp5-gwg8-xv66 / GO-2025-3503

More information

Details

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net

CVE-2025-22870 / GHSA-qxp5-gwg8-xv66 / GO-2025-3503

More information

Details

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

Severity

  • CVSS Score: 4.4 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


golang.org/x/net vulnerable to Cross-site Scripting

CVE-2025-22872 / GHSA-vvgc-356p-c3xw / GO-2025-3595

More information

Details

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).

Severity

  • CVSS Score: Unknown
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net

CVE-2025-22872 / GHSA-vvgc-356p-c3xw / GO-2025-3595

More information

Details

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@redhat-renovate-bot redhat-renovate-bot added the release-note-none Denotes a PR that doesn't merit a release note. label Apr 30, 2025
@redhat-renovate-bot
Copy link
Collaborator Author

redhat-renovate-bot commented Apr 30, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 4 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.20 -> 1.23.0
golang.org/x/sys v0.29.0 -> v0.31.0
golang.org/x/crypto v0.32.0 -> v0.36.0
golang.org/x/term v0.28.0 -> v0.30.0
golang.org/x/text v0.21.0 -> v0.23.0

@kubevirt-bot kubevirt-bot added the dco-signoff: yes Indicates the PR's author has DCO signed all their commits. label Apr 30, 2025
@kubevirt-bot kubevirt-bot requested review from awels and mhenriks April 30, 2025 14:43
@redhat-renovate-bot redhat-renovate-bot force-pushed the renovate/release-v0.18-go-golang.org-x-net-vulnerability branch from fb50451 to 9273ee0 Compare June 7, 2025 15:41
@redhat-renovate-bot redhat-renovate-bot force-pushed the renovate/release-v0.18-go-golang.org-x-net-vulnerability branch from 9273ee0 to 33007b5 Compare July 10, 2025 13:42
@redhat-renovate-bot redhat-renovate-bot changed the title chore(deps): update module golang.org/x/net to v0.38.0 [security] (release-v0.18) chore(deps): update module golang.org/x/net to v0.38.0 [security] (release-v0.18) - autoclosed Jul 28, 2025
@redhat-renovate-bot redhat-renovate-bot deleted the renovate/release-v0.18-go-golang.org-x-net-vulnerability branch July 28, 2025 23:12
@redhat-renovate-bot redhat-renovate-bot changed the title chore(deps): update module golang.org/x/net to v0.38.0 [security] (release-v0.18) - autoclosed chore(deps): update module golang.org/x/net to v0.38.0 [security] (release-v0.18) Jul 29, 2025
@redhat-renovate-bot redhat-renovate-bot force-pushed the renovate/release-v0.18-go-golang.org-x-net-vulnerability branch from 33007b5 to 94665de Compare August 24, 2025 04:44
@kubevirt-bot
Copy link

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@kubevirt-bot
Copy link

@redhat-renovate-bot: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
pull-hostpath-provisioner-sanity 94665de link true /test pull-hostpath-provisioner-sanity
pull-hostpath-provisioner-e2e-k8s 94665de link true /test pull-hostpath-provisioner-e2e-k8s
pull-hpp-unit-test 94665de link false /test pull-hpp-unit-test
pull-hostpath-provisioner-k8s-e2e-storage 94665de link true /test pull-hostpath-provisioner-k8s-e2e-storage
pull-hostpath-provisioner-e2e-k8s-ceph 94665de link true /test pull-hostpath-provisioner-e2e-k8s-ceph

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@redhat-renovate-bot redhat-renovate-bot changed the title chore(deps): update module golang.org/x/net to v0.38.0 [security] (release-v0.18) chore(deps): update module golang.org/x/net to v0.38.0 [security] (release-v0.18) - autoclosed Sep 14, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dco-signoff: yes Indicates the PR's author has DCO signed all their commits. release-note-none Denotes a PR that doesn't merit a release note. size/XXL
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants