Skip to content

fix(deps): vuln minor upgrades — 13 packages (minor: 12 · patch: 1) #19

Closed
gh-worker-campaigns-3e9aa4[bot] wants to merge 1 commit intomainfrom
engraver-auto-version-upgrade/minorpatch/go/0-1776935080
Closed

fix(deps): vuln minor upgrades — 13 packages (minor: 12 · patch: 1) #19
gh-worker-campaigns-3e9aa4[bot] wants to merge 1 commit intomainfrom
engraver-auto-version-upgrade/minorpatch/go/0-1776935080

Conversation

@gh-worker-campaigns-3e9aa4
Copy link
Copy Markdown

Summary: Critical-severity security update — 13 packages upgraded (MINOR changes included)

Manifests changed:

  • . (go)

✅ Action Required: Please review the changes below. If they look good, approve and merge this PR.


Updates

Package From To Type Dep Type Vulnerabilities Fixed
google.golang.org/grpc v1.65.0 v1.80.0 minor Transitive 3 CRITICAL
github.com/sirupsen/logrus v1.4.1 v1.9.4 minor Direct 3 HIGH
github.com/golang-jwt/jwt/v5 v5.2.1 v5.2.3 patch Transitive 3 HIGH
github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.3 v1.7.9 minor Transitive 1 MODERATE
github.com/aws/aws-sdk-go-v2/service/lambda v1.56.1 v1.89.1 minor Transitive 1 MODERATE
github.com/aws/aws-sdk-go-v2/service/s3 v1.58.0 v1.99.1 minor Transitive 1 MODERATE
github.com/aws/aws-sdk-go-v2 v1.30.3 v1.41.6 minor Direct -
github.com/aws/aws-sdk-go-v2/config v1.27.24 v1.32.16 minor Direct -
github.com/aws/aws-sdk-go-v2/service/cloudtrail v1.42.1 v1.55.10 minor Direct -
github.com/aws/aws-sdk-go-v2/service/sts v1.30.1 v1.42.0 minor Direct -
github.com/datadog/stratus-red-team/v2 v2.16.0 v2.31.1 minor Direct -
github.com/spf13/cobra v1.6.0 v1.10.2 minor Direct -
github.com/stretchr/testify v1.9.0 v1.11.1 minor Direct -

Packages marked with "-" are updated due to dependency constraints.


Security Details

🚨 Critical & High Severity (9 fixed)
Package CVE Severity Summary Unsafe Version Fixed In
google.golang.org/grpc GHSA-p77j-4mvh-x3m3 CRITICAL gRPC-Go has an authorization bypass via missing leading slash in :path v1.65.0 1.79.3
google.golang.org/grpc CVE-2026-33186 CRITICAL gRPC-Go has an authorization bypass via missing leading slash in :path v1.65.0 -
google.golang.org/grpc GO-2026-4762 CRITICAL Authorization bypass in gRPC-Go via missing leading slash in :path in google.golang.org/grpc v1.65.0 1.79.3
github.com/golang-jwt/jwt/v5 GO-2025-3553 high Excessive memory allocation during header parsing in github.com/golang-jwt/jwt v5.2.1 5.2.2
github.com/golang-jwt/jwt/v5 CVE-2025-30204 high jwt-go allows excessive memory allocation during header parsing v5.2.1 -
github.com/golang-jwt/jwt/v5 GHSA-mh63-6h87-95cp HIGH jwt-go allows excessive memory allocation during header parsing v5.2.1 5.2.2
github.com/sirupsen/logrus GO-2025-4188 high Logrus is vulnerable to DoS when using Entry.writerScanner in github.com/sirupsen/logrus v1.4.1 1.8.3
github.com/sirupsen/logrus CVE-2025-65637 high - v1.4.1 -
github.com/sirupsen/logrus GHSA-4f99-4q7p-p3gh HIGH Logrus is vulnerable to DoS when using Entry.Writer() v1.4.1 1.8.3
ℹ️ Other Vulnerabilities (3)
Package CVE Severity Summary Unsafe Version Fixed In
github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream GHSA-xmrv-pmrh-hhx2 MODERATE Denial of Service due to Panic in AWS SDK for Go v2 SDK EventStream Decoder v1.6.3 1.7.8
github.com/aws/aws-sdk-go-v2/service/lambda GHSA-xmrv-pmrh-hhx2 MODERATE Denial of Service due to Panic in AWS SDK for Go v2 SDK EventStream Decoder v1.56.1 1.88.5
github.com/aws/aws-sdk-go-v2/service/s3 GHSA-xmrv-pmrh-hhx2 MODERATE Denial of Service due to Panic in AWS SDK for Go v2 SDK EventStream Decoder v1.58.0 1.97.3
⚠️ Dependencies that have Reached EOL (1)
Dependency Unsafe Version EOL Date New Version Path
github.com/spf13/cobra v1.6.0 Oct 11, 2025 v1.10.2 go.mod

Review Checklist

Standard review:

  • Review changes for compatibility with your code
  • Check for breaking changes in release notes
  • Run tests locally or wait for CI
  • Approve and merge this PR

Update Mode: Vulnerability Remediation (Critical/High)

🤖 Generated by DataDog Automated Dependency Management System

@campaigner-prod
Copy link
Copy Markdown

Release Notes

google.golang.org/grpc (v1.65.0 → v1.80.0) — GitHub Release

v1.80.0

Behavior Changes

Bug Fixes

New Features

Performance Improvements

(truncated)

v1.79.3

Security

v1.79.2

Bug Fixes

v1.79.1

Bug Fixes

v1.79.0

API Changes

Behavior Changes

New Features

(truncated — see source for full notes)

github.com/sirupsen/logrus (v1.4.1 → v1.9.4) — GitHub Release

v1.9.4

Notable changes

Full Changelog: sirupsen/logrus@v1.9.3...v1.9.4

v1.9.3

Full Changelog: sirupsen/logrus@v1.9.2...v1.9.3

v1.9.2

Full Changelog: sirupsen/logrus@v1.9.1...v1.9.2

v1.9.1

What's Changed

New Contributors

Full Changelog: sirupsen/logrus@v1.9.0...v1.9.1

v1.8.3

What's Changed

New Contributors

Full Changelog: sirupsen/logrus@v1.8.2...v1.8.3

v1.8.2

What's Changed

(truncated — see source for full notes)

github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream (v1.6.3 → v1.7.9) — Changelog

https://github.com/aws/aws-sdk-go-v2/blob/main/CHANGELOG.md

github.com/aws/aws-sdk-go-v2/service/lambda (v1.56.1 → v1.89.1) — Changelog

https://github.com/aws/aws-sdk-go-v2/blob/main/CHANGELOG.md

github.com/aws/aws-sdk-go-v2/service/s3 (v1.58.0 → v1.99.1) — Changelog

https://github.com/aws/aws-sdk-go-v2/blob/main/CHANGELOG.md

github.com/aws/aws-sdk-go-v2 (v1.30.3 → v1.41.6) — Changelog

https://github.com/aws/aws-sdk-go-v2/blob/main/CHANGELOG.md

github.com/aws/aws-sdk-go-v2/config (v1.27.24 → v1.32.16) — Changelog

https://github.com/aws/aws-sdk-go-v2/blob/main/CHANGELOG.md

github.com/aws/aws-sdk-go-v2/service/cloudtrail (v1.42.1 → v1.55.10) — Changelog

https://github.com/aws/aws-sdk-go-v2/blob/main/CHANGELOG.md

github.com/aws/aws-sdk-go-v2/service/sts (v1.30.1 → v1.42.0) — Changelog

https://github.com/aws/aws-sdk-go-v2/blob/main/CHANGELOG.md

github.com/datadog/stratus-red-team/v2 (v2.16.0 → v2.31.1) — GitHub Release

v2.31.1

Bugfix

Bumping the hc-install library version to fix a expired pubkey issue when downloading Terraform

Changelog

v2.31.0

Changelog

New attack techniques:

New features:

(truncated)

v2.30.0

Changelog

New features:

Docs enhancements:

Bug fixes:

Chores:

v2.29.0

Changelog

v2.28.0

Changelog

Notable changes:

(truncated — see source for full notes)

github.com/spf13/cobra (v1.6.0 → v1.10.2) — GitHub Release

v1.10.2

🔧 Dependencies

📈 CI/CD

🔥✍🏼 Docs

🍂 Refactors

🤗 New Contributors

Full Changelog: spf13/cobra@v1.10.1...v1.10.2

Thank you to our amazing contributors!!!!! 🐍 🚀

v1.10.1

🐛 Fix

v1.0.9 of pflags brought back ParseErrorsWhitelist and marked it as deprecated

Full Changelog: spf13/cobra@v1.10.0...v1.10.1

v1.10.0

What's Changed

🚨 Attention!

This version of pflag carried a breaking change: it renamed ParseErrorsWhitelist to ParseErrorsAllowlist which can break builds if both pflag and cobra are dependencies in your project.

  • If you use both pflag and cobra, upgrade pflagto 1.0.8 andcobrato1.10.0`
  • or use the newer, fixed version of pflag v1.0.9 which keeps the deprecated ParseErrorsWhitelist

More details can be found here: spf13/cobra#2303 (comment)

✨ Features

🐛 Fix

🪠 Testing

📝 Docs

New Contributors

(truncated)

v1.9.1

🐛 Fixes

Full Changelog: spf13/cobra@v1.9.0...v1.9.1

v1.9.0

✨ Features

🐛 Fixes

(truncated — see source for full notes)

github.com/stretchr/testify (v1.9.0 → v1.11.1) — GitHub Release

v1.11.1

This release fixes stretchr/testify#1785 introduced in v1.11.0 where expected argument values implementing the stringer interface (String() string) with a method which mutates their value, when passed to mock.Mock.On (m.On("Method", <expected>).Return()) or actual argument values passed to mock.Mock.Called may no longer match one another where they previously did match. The behaviour prior to v1.11.0 where the stringer is always called is restored. Future testify releases may not call the stringer method at all in this case.

What's Changed

Full Changelog: stretchr/testify@v1.11.0...v1.11.1

v1.11.0

What's Changed

Functional Changes

v1.11.0 Includes a number of performance improvements.

Fixes

Documentation, Build & CI

(truncated)

v1.10.0

What's Changed

Functional Changes

Fixes

(truncated — see source for full notes)


Generated by ADMS Sources: 5 GitHub Releases, 7 Changelogs, 1 not available.

@seberm-6
Copy link
Copy Markdown

Hey, sorry for the noise. This was caused by a bug in our automated dependency update system that incorrectly included upstream changelog content in PR comments, triggering notifications to external contributors. The feature flag has been turned off and we're working on a fix. Sorry about that again.

@campaigner-prod campaigner-prod Bot closed this Apr 23, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant