Skip to content

fix(deps): vuln minor upgrades — 15 packages (minor: 6 · patch: 9) [sdk]#86

Closed
gh-worker-campaigns-3e9aa4[bot] wants to merge 1 commit intomasterfrom
engraver-auto-version-upgrade/minorpatch/go/sdk/5-1776935212
Closed

fix(deps): vuln minor upgrades — 15 packages (minor: 6 · patch: 9) [sdk]#86
gh-worker-campaigns-3e9aa4[bot] wants to merge 1 commit intomasterfrom
engraver-auto-version-upgrade/minorpatch/go/sdk/5-1776935212

Conversation

@gh-worker-campaigns-3e9aa4
Copy link
Copy Markdown

Summary: Critical-severity security update — 15 packages upgraded (MINOR changes included)

Manifests changed:

  • sdk (go)

✅ Action Required: Please review the changes below. If they look good, approve and merge this PR.


Updates

Package From To Type Dep Type Vulnerabilities Fixed
google.golang.org/grpc v1.70.0 v1.80.0 minor Direct 3 CRITICAL
github.com/go-jose/go-jose/v4 v4.0.5 v4.1.4 minor Transitive 1 HIGH
cloud.google.com/go/cloudsqlconn v1.4.3 v1.21.0 minor Direct -
github.com/evanphx/json-patch/v5 v5.6.0 v5.9.11 minor Direct -
github.com/hashicorp/go-version v1.7.0 v1.9.0 minor Direct -
github.com/hashicorp/vault/api v1.16.0 v1.23.0 minor Direct -
github.com/go-ldap/ldap/v3 v3.4.10 v3.4.13 patch Direct -
github.com/google/certificate-transparency-go v1.3.1 v1.3.3 patch Direct -
github.com/hashicorp/go-kms-wrapping/v2 v2.0.18 v2.0.21 patch Direct -
github.com/hashicorp/go-plugin v1.6.1 v1.6.3 patch Direct -
github.com/hashicorp/go-retryablehttp v0.7.7 v0.7.8 patch Direct -
github.com/hashicorp/go-secure-stdlib/password v0.1.1 v0.1.5 patch Direct -
github.com/hashicorp/go-secure-stdlib/plugincontainer v0.4.1 v0.4.2 patch Direct -
github.com/sasha-s/go-deadlock v0.3.5 v0.3.9 patch Direct -
google.golang.org/protobuf v1.36.5 v1.36.11 patch Direct -

Packages marked with "-" are updated due to dependency constraints.


Security Details

🚨 Critical & High Severity (4 fixed)
Package CVE Severity Summary Unsafe Version Fixed In
google.golang.org/grpc GO-2026-4762 critical Authorization bypass in gRPC-Go via missing leading slash in :path in google.golang.org/grpc v1.70.0 1.79.3
google.golang.org/grpc CVE-2026-33186 critical gRPC-Go has an authorization bypass via missing leading slash in :path v1.70.0 -
google.golang.org/grpc GHSA-p77j-4mvh-x3m3 CRITICAL gRPC-Go has an authorization bypass via missing leading slash in :path v1.70.0 1.79.3
github.com/go-jose/go-jose/v4 GHSA-78h2-9frx-2jm8 HIGH Go JOSE Panics in JWE decryption v4.0.5 4.1.4
⚠️ Dependencies that have Reached EOL (2)
Dependency Unsafe Version EOL Date New Version Path
github.com/evanphx/json-patch/v5 v5.6.0 - v5.9.11 sdk/go.mod
github.com/hashicorp/go-secure-stdlib/password v0.1.1 - v0.1.5 sdk/go.mod

Review Checklist

Standard review:

  • Review changes for compatibility with your code
  • Check for breaking changes in release notes
  • Run tests locally or wait for CI
  • Approve and merge this PR

Update Mode: Vulnerability Remediation (Critical/High)

🤖 Generated by DataDog Automated Dependency Management System

@campaigner-prod
Copy link
Copy Markdown

Release Notes

google.golang.org/grpc (v1.70.0 → v1.80.0) — GitHub Release

v1.80.0

Behavior Changes

Bug Fixes

New Features

Performance Improvements

(truncated)

v1.79.3

Security

v1.79.2

Bug Fixes

v1.79.1

Bug Fixes

v1.79.0

API Changes

Behavior Changes

New Features

(truncated — see source for full notes)

github.com/go-jose/go-jose/v4 (v4.0.5 → v4.1.4) — GitHub Release

v4.1.4

What's Changed

Fixes Panic in JWE decryption. See GHSA-78h2-9frx-2jm8

Full Changelog: go-jose/go-jose@v4.1.3...v4.1.4

v4.1.3

This release drops Go 1.23 support as that Go release is no longer supported. With that, we can drop x/crypto and no longer have any external dependencies in go-jose outside of the standard library!

This release fixes a bug where a critical b64 header was ignored if in an unprotected header. It is now rejected instead of ignored.

What's Changed

Full Changelog: go-jose/go-jose@v4.1.2...v4.1.3

v4.1.2

What's Changed

go-jose v4.1.2 improves some documentation, errors, and removes the only 3rd-party dependency.

New Contributors

Full Changelog: go-jose/go-jose@v4.1.1...v4.1.2

v4.1.1

What's Changed

New Contributors

Full Changelog: go-jose/go-jose@v4.1.0...v4.1.1

v4.1.0

What's Changed

New Contributors

Full Changelog: go-jose/go-jose@v4.0.5...v4.1.0

cloud.google.com/go/cloudsqlconn (v1.4.3 → v1.21.0) — GitHub Release

v1.21.0

1.21.0 (2026-04-16)

Features

v1.20.2

1.20.2 (2026-03-17)

Bug Fixes

Note

  • Deprecate support for pgx v4. The pgx v4 library was declared end life by its maintainer as of July 2025. We will remove support for the Cloud SQL Connector in July 2026

v1.20.1

1.20.1 (2026-02-17)

Bug Fixes

v1.20.0

1.20.0 (2026-01-12)

Features

v1.19.1

1.19.1 (2025-12-09)

Bug Fixes

v1.19.0

1.19.0 (2025-10-23)

Features

Bug Fixes

(truncated — see source for full notes)

github.com/hashicorp/go-version (v1.7.0 → v1.9.0) — GitHub Release

v1.9.0

What's Changed

Enhancements

Internal

New Contributors

Full Changelog: hashicorp/go-version@v1.8.0...v1.9.0

v1.8.0

What's Changed

New Contributors

(truncated)

github.com/hashicorp/vault/api (v1.16.0 → v1.23.0) — GitHub Release

v1.21.4

SECURITY:

  • Upgrade cloudflare/circl to v1.6.3 to resolve CVE-2026-1229
  • Upgrade filippo.io/edwards25519 to v1.1.1 to resolve GO-2026-4503
  • vault/sdk: Upgrade cloudflare/circl to v1.6.3 to resolve CVE-2026-1229
  • vault/sdk: Upgrade go.opentelemetry.io/otel/sdk to v1.40.0 to resolve GO-2026-4394

CHANGES:

  • core: Bump Go version to 1.25.7
  • mfa/duo: Upgrade duo_api_golang client to 0.2.0 to include the new Duo certificate authorities
  • ui: Remove ability to bulk delete secrets engines from the list view.

IMPROVEMENTS:

  • core/seal: Enhance sys/seal-backend-status to provide more information about seal backends.
  • secrets/kmip (Enterprise): Obey configured best_effort_wal_wait_duration when forwarding kmip requests.
  • secrets/pki (enterprise): Return the POSTPKIOperation capability within SCEP GetCACaps endpoint for better legacy client support.

BUG FIXES:

  • core (enterprise): Buffer the POST body on binary paths to allow re-reading on non-logical forwarding attempts. Addresses an issue for SCEP, EST and CMPv2 certificate issuances with slow replication of entities
  • core/identity (enterprise): Fix excessive logging when updating existing aliases
  • core/managed-keys (enterprise): client credentials should not be required when using Azure Managed Identities in managed keys.
  • plugins (enterprise): Fix bug where requests to external plugins that modify storage weren't populating the X-Vault-Index response header.
  • secrets (pki): Allow issuance of certificates without the server_flag key usage from SCEP, EST and CMPV2 protocols.
  • secrets/pki (enterprise): Address cache invalidation issues with CMPv2 on performance standby nodes.
  • secrets/pki (enterprise): Address issues using SCEP on performance standby nodes failing due to configuration invalidation issues along with errors writing to storage
  • secrets/pki (enterprise): Modify the SCEP GetCACaps endpoint to dynamically reflect the configured encryption and digest algorithm

(truncated)

v1.21.3

February 05, 2026

SECURITY:

auth/cert: ensure that the certificate being renewed matches the certificate attached to the session.

CHANGES:

core: Bump Go version to 1.25.6

FEATURES:

UI: Hashi-Built External Plugin Support: Recognize and support Hashi-built plugins when run as external binaries

IMPROVEMENTS:

core/managed-keys (enterprise): Allow GCP managed keys to leverage workload identity federation credentials
sdk: Add alias_metadata to tokenutil fields that auth method roles use.
secret-sync (enterprise): Added telemetry counters for reconciliation loop operations, including the number of corrections detected, retry attempts, and operation outcomes (success or failure with internal/external cause labels).
secret-sync (enterprise): Added telemetry counters for sync/unsync operations with status breakdown by destination type, and exposed operation counters in the destinations list API response.

BUG FIXES:

agent: Fix Vault Agent discarding cached tokens on transient server errors instead of retrying
core (enterprise): Fix crash when seal HSM is disconnected
default-auth: Fix issue when specifying "root" explicitly in Default Auth UI
identity: Fix issue where Vault may consume more memory than intended under heavy authentication load.
secrets/pki (enterprise): Fix SCEP related digest errors when requests contained compound octet strings
ui: Fixes login form so ?with= query param correctly displays only the specified mount when multiple mounts of the same auth type are configured with listing_visibility="unauth"
ui: Reverts Kubernetes CA Certificate auth method configuration form field type to file selector

v1.21.2

1.21.2

January 07, 2026

CHANGES:

  • auth/oci: bump plugin to v0.20.1
  • core: Bump Go version to 1.25.5
  • packaging: Container images are now exported using a compressed OCI image layout.

(truncated — see source for full notes)

github.com/go-ldap/ldap/v3 (v3.4.10 → v3.4.13) — GitHub Release

v3.4.13

What's Changed

New Contributors

Full Changelog: go-ldap/ldap@v3.4.12...v3.4.13

v3.4.12

What's New

What's Changed

New Contributors

Full Changelog: go-ldap/ldap@v3.4.11...v3.4.12

v3.4.11

What's Changed

New Contributors

(truncated — see source for full notes)

github.com/google/certificate-transparency-go (v1.3.1 → v1.3.3) — GitHub Release

v1.3.3

What's Changed

CTFE

Tools

Log list library

Submission proxy

Other

Misc

Dependency updates

  • Bump golangci-lint version to v2.10.1 by @rog

(truncated)

v1.3.2

v1.3.2

What's changed?

  • CTFE - thanks to @robstradling and @rolandshoemaker
    • New feature: Rate Limiting Of Non-Fresh Submissions
    • Optimizations:
      • Better extra data storage saving
      • Better cache max-age for get-entries
    • Fixes: Disalllow mismatching signature algorithm identifiers
  • Migrillian: removed support for etcd
  • preloader / ct_hammer / jsconlient: a bunch of new features and fixes.
  • go: bump to go 1.23 and bump to golangci-lint to 1.61.0

Misc

CTFE Storage Saving: Extra Data Issuance Chain Deduplication

CTFE Rate Limiting Of Non-Fresh Submissions

(truncated — see source for full notes)

github.com/hashicorp/go-kms-wrapping/v2 (v2.0.18 → v2.0.21) — Commit comparison

... and 2 more commits

github.com/hashicorp/go-secure-stdlib/password (v0.1.1 → v0.1.5) — Commit comparison

... and 85 more commits

github.com/hashicorp/go-secure-stdlib/plugincontainer (v0.4.1 → v0.4.2) — Commit comparison

... and 11 more commits

github.com/sasha-s/go-deadlock (v0.3.5 → v0.3.9) — GitHub Release

v0.3.9

Reduce allocations from callers (sasha-s/go-deadlock#54), add new unit tests, and fix existing -race unit test failures

v0.3.8

What's Changed

Full Changelog: sasha-s/go-deadlock@v0.3.7...v0.3.8

v0.3.7

Release v0.3.7

Changes

  • Fix testing/synctest compatibility, including Go 1.25 support and related build tags
  • Fix concurrent lock tracking under contention
  • Prevent lock-order tracking from retaining mutex-containing structs on Go 1.24+

What's New

This release improves synctest compatibility, fixes concurrent lock tracking, and resolves a GC-retention issue in lock-order bookkeeping.

v0.3.6

Release v0.3.6

Changes

  • Go 1.25 support
  • Updated dependencies (github.com/petermattis/goid)
  • Improved test coverage (90.5%)

What's New

This release includes compatibility updates for Go 1.25 and dependency updates to ensure continued reliability of deadlock detection.

google.golang.org/protobuf (v1.36.5 → v1.36.11) — GitHub Release

v1.36.11

Full Changelog: protocolbuffers/protobuf-go@v1.36.10...v1.36.11

User-visible changes:
CL/726780: encoding/prototext: Support URL chars in type URLs in text-format.

Bug fixes:
CL/728680: internal/impl: check recursion limit in lazy decoding validation
CL/711015: reflect/protodesc: fix handling of import options in dynamic builds

Maintenance:
CL/728681: reflect/protodesc: add support for edition unstable
CL/727960: all: add EDITION_UNSTABLE support
CL/727940: types: regenerate using latest protobuf v33.2 release
CL/727140: internal/testprotos/lazy: convert .proto files to editions
CL/723440: cmd/protoc-gen-go: add missing annotations for few generated protobuf symbols.
CL/720980: internal/filedesc: remove duplicative Message.unmarshalOptions
CL/716360: internal/encoding/tag: use proto3 defaults if proto3
CL/716520: proto: un-flake TestHasExtensionNoAlloc
CL/713342: compiler/protogen: properly filter option dependencies in go-protobuf plugin.
CL/711200: proto: add test for oneofs containing messages with required fields
CL/710855: proto: add explicit test for a non-nil but empty byte slice

v1.36.10

Full Changelog: protocolbuffers/protobuf-go@v1.36.9...v1.36.10

Bug fixes:
CL/704415: reflect/protodesc: edition-2024-specific properties should not be lost when converting FileDescriptorProto to protoreflect.FileDescriptor

Maintenance:
CL/708555: internal/race_test: add missing impl.LazyEnabled() t.Skip
CL/703295: proto: add more invalid group encoding test cases
CL/703276: internal/impl: verify lazy unmarshal on Deterministic encoding
CL/703275: internal/impl: stop using deprecated .Field in lazy_test.go
CL/702795: all: update to latest github.com/google/go-cmp

v1.36.9

Full Changelog: protocolbuffers/protobuf-go@v1.36.8...v1.36.9

User-visible changes:
CL/699715: cmd/protoc-gen-go: add test for "import option" directive
CL/699115: internal/editionssupport: declare support for edition 2024
CL/697595: editions: Fix spelling mistake in panic message

v1.36.8

Maintenance:

CL/696316: all: set Go language version to Go 1.23
CL/696315: types: regenerate using latest protobuf v32 release

v1.36.7

Maintenance / optimizations:

CL/683955: encoding/protowire: micro-optimize SizeVarint (-20% on Intel)

(truncated — see source for full notes)


Generated by ADMS Sources: 9 GitHub Releases, 3 Commit comparisons, 3 not available.

@seberm-6
Copy link
Copy Markdown

Hey, sorry for the noise. This was caused by a bug in our automated dependency update system that incorrectly included upstream changelog content in PR comments, triggering notifications to external contributors. The feature flag has been turned off and we're working on a fix. Sorry about that again.

@seberm-6 seberm-6 closed this Apr 23, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant