Skip to content

fix(deps): vuln minor upgrades — 15 packages (minor: 7 · patch: 8) #87

Closed
gh-worker-campaigns-3e9aa4[bot] wants to merge 1 commit intomasterfrom
engraver-auto-version-upgrade/minorpatch/go/0-1776935211
Closed

fix(deps): vuln minor upgrades — 15 packages (minor: 7 · patch: 8) #87
gh-worker-campaigns-3e9aa4[bot] wants to merge 1 commit intomasterfrom
engraver-auto-version-upgrade/minorpatch/go/0-1776935211

Conversation

@gh-worker-campaigns-3e9aa4
Copy link
Copy Markdown

Summary: Critical-severity security update — 15 packages upgraded (MINOR changes included)

Manifests changed:

  • . (go)

✅ Action Required: Please review the changes below. If they look good, approve and merge this PR.


Updates

Package From To Type Dep Type Vulnerabilities Fixed
github.com/jackc/pgx/v5 v5.7.4 v5.9.2 minor Transitive 4 CRITICAL, 1 LOW
github.com/opencontainers/runc v1.2.6 v1.4.2 minor Transitive 9 HIGH
go.opentelemetry.io/otel/sdk v1.35.0 v1.43.0 minor Direct 4 HIGH
github.com/dvsekhvalnov/jose2go v1.6.0 v1.8.0 minor Transitive 3 HIGH
github.com/go-jose/go-jose/v3 v3.0.4 v3.0.5 patch Direct 1 HIGH
github.com/go-jose/go-jose/v4 v4.1.0 v4.1.4 patch Transitive 1 HIGH
github.com/go-git/go-git/v5 v5.14.0 v5.18.0 minor Direct 5 MODERATE, 2 MEDIUM, 3 LOW
github.com/aws/aws-sdk-go v1.55.7 v1.55.8 patch Direct 2 MODERATE, 2 LOW
github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.2 v1.7.9 minor Transitive 1 MODERATE
github.com/aws/aws-sdk-go-v2/service/s3 v1.53.1 v1.99.1 minor Transitive 1 MODERATE
filippo.io/edwards25519 v1.1.0 v1.1.1 patch Transitive 3 LOW
github.com/Azure/go-autorest/autorest v0.11.29 v0.11.30 patch Direct -
github.com/Azure/go-autorest/autorest/adal v0.9.23 v0.9.24 patch Direct -
github.com/go-zookeeper/zk v1.0.3 v1.0.4 patch Direct -
github.com/hashicorp/go-bexpr v0.1.12 v0.1.16 patch Direct -

Packages marked with "-" are updated due to dependency constraints.


Security Details

🚨 Critical & High Severity (22 fixed)
Package CVE Severity Summary Unsafe Version Fixed In
github.com/jackc/pgx/v5 GHSA-xgrm-4fwx-7qm8 CRITICAL pgx contains memory-safety vulnerability v5.7.4 -
github.com/jackc/pgx/v5 GO-2026-4771 CRITICAL CVE-2026-33815 in github.com/jackc/pgx v5.7.4 5.9.0
github.com/jackc/pgx/v5 GHSA-9jj7-4m8r-rfcm CRITICAL Memory-safety vulnerability in github.com/jackc/pgx/v5. v5.7.4 5.9.0
github.com/jackc/pgx/v5 GO-2026-4772 CRITICAL CVE-2026-33816 in github.com/jackc/pgx v5.7.4 5.9.0
github.com/dvsekhvalnov/jose2go GO-2025-4123 high Denial-of-Service (DoS) via crafted JSON Web Encryption (JWE) token high compression ratio in github.com/dvsekhvalnov/jose2go v1.6.0 1.7.0
github.com/dvsekhvalnov/jose2go CVE-2025-63811 high - v1.6.0 -
github.com/dvsekhvalnov/jose2go GHSA-9mj6-hxhv-w67j HIGH jose2go is vulnerable to a JWT bomb attack through its decode function v1.6.0 1.7.0
github.com/go-jose/go-jose/v3 GHSA-78h2-9frx-2jm8 HIGH Go JOSE Panics in JWE decryption v3.0.4 3.0.5
github.com/go-jose/go-jose/v4 GHSA-78h2-9frx-2jm8 HIGH Go JOSE Panics in JWE decryption v4.1.0 4.1.4
github.com/opencontainers/runc GO-2025-4098 HIGH Container escape and DDoS due to arbitrary write gadgets and procfs write redirects in github.com/opencontainers/runc v1.2.6 1.2.8
github.com/opencontainers/runc CVE-2025-52881 HIGH runc: LSM labels can be bypassed with malicious config using dummy procfs files v1.2.6 -
github.com/opencontainers/runc GO-2025-4096 high Container escape via "masked path" abuse due to mount race conditions in github.com/opencontainers/runc v1.2.6 1.2.8
github.com/opencontainers/runc GHSA-cgrx-mc8f-2prm HIGH runc container escape and denial of service due to arbitrary write gadgets and procfs write redirects v1.2.6 1.2.8
github.com/opencontainers/runc GHSA-qw9x-cqr3-wc7r HIGH runc container escape with malicious config due to /dev/console mount and related races v1.2.6 1.2.8
github.com/opencontainers/runc CVE-2025-31133 high runc container escape via "masked path" abuse due to mount race conditions v1.2.6 -
github.com/opencontainers/runc GHSA-9493-h29p-rfm2 HIGH runc container escape via "masked path" abuse due to mount race conditions v1.2.6 1.2.8
github.com/opencontainers/runc GO-2025-4097 high Container escape with malicious config due to /dev/console mount and related races in github.com/opencontainers/runc v1.2.6 1.2.8
github.com/opencontainers/runc CVE-2025-52565 high container escape due to /dev/console mount and related races v1.2.6 -
go.opentelemetry.io/otel/sdk CVE-2026-24051 HIGH OpenTelemetry-Go Affected by Arbitrary Code Execution via PATH Hijacking v1.35.0 -
go.opentelemetry.io/otel/sdk GHSA-9h8m-3fm2-qjrq HIGH OpenTelemetry Go SDK Vulnerable to Arbitrary Code Execution via PATH Hijacking v1.35.0 1.40.0
go.opentelemetry.io/otel/sdk GHSA-hfvc-g4fc-pqhx HIGH opentelemetry-go: BSD kenv command not using absolute path enables PATH hijacking v1.35.0 1.43.0
go.opentelemetry.io/otel/sdk GO-2026-4394 HIGH OpenTelemetry Go SDK Vulnerable to Arbitrary Code Execution via PATH Hijacking in go.opentelemetry.io/otel/sdk v1.35.0 1.40.0
ℹ️ Other Vulnerabilities (20)
Package CVE Severity Summary Unsafe Version Fixed In
github.com/go-git/go-git/v5 GO-2026-4910 medium Maliciously crafted idx file can cause asymmetric memory consumption in github.com/go-git/go-git v5.14.0 5.17.1
github.com/go-git/go-git/v5 CVE-2026-34165 medium go-git: Maliciously crafted idx file can cause asymmetric memory consumption v5.14.0 -
github.com/aws/aws-sdk-go GHSA-f5pg-7wfw-84q9 MODERATE CBC padding oracle issue in AWS S3 Crypto SDK for golang v1.55.7 1.34.0
github.com/aws/aws-sdk-go GO-2022-0646 MODERATE CBC padding oracle issue in AWS S3 Crypto SDK for golang in github.com/aws/aws-sdk-go v1.55.7 -
github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream GHSA-xmrv-pmrh-hhx2 MODERATE Denial of Service due to Panic in AWS SDK for Go v2 SDK EventStream Decoder v1.6.2 1.7.8
github.com/aws/aws-sdk-go-v2/service/s3 GHSA-xmrv-pmrh-hhx2 MODERATE Denial of Service due to Panic in AWS SDK for Go v2 SDK EventStream Decoder v1.53.1 1.97.3
github.com/go-git/go-git/v5 GHSA-37cx-329c-33x3 MODERATE go-git improperly verifies data integrity values for .idx and .pack files v5.14.0 5.16.5
github.com/go-git/go-git/v5 GO-2026-4473 MODERATE Improper verification of data integrity values for .idx and .pack files in github.com/go-git/go-git v5.14.0 5.16.5
github.com/go-git/go-git/v5 GHSA-3xc5-wrhm-f963 MODERATE go-git: Credential leak via cross-host redirect in smart HTTP transport v5.14.0 5.18.0
github.com/go-git/go-git/v5 GHSA-jhf3-xxhw-2wpp MODERATE go-git: Maliciously crafted idx file can cause asymmetric memory consumption v5.14.0 5.17.1
github.com/go-git/go-git/v5 CVE-2026-25934 MODERATE go-git improperly verifies data integrity values for .idx and .pack files v5.14.0 -
filippo.io/edwards25519 GHSA-fw7p-63qq-7hpr LOW filippo.io/edwards25519 MultiScalarMult produces invalid results or undefined behavior if receiver is not the identity v1.1.0 1.1.1
filippo.io/edwards25519 GO-2026-4503 LOW Invalid result or undefined behavior in filippo.io/edwards25519 v1.1.0 1.1.1
filippo.io/edwards25519 CVE-2026-26958 LOW filippo.io/edwards25519 MultiScalarMult function produces invalid results or undefined behavior if receiver is not the identity v1.1.0 -
github.com/aws/aws-sdk-go GO-2022-0635 LOW In-band key negotiation issue in AWS S3 Crypto SDK for golang in github.com/aws/aws-sdk-go v1.55.7 -
github.com/aws/aws-sdk-go GHSA-7f33-f4f5-xwgw LOW In-band key negotiation issue in AWS S3 Crypto SDK for golang v1.55.7 1.34.0
github.com/go-git/go-git/v5 CVE-2026-33762 LOW go-git: Missing validation decoding Index v4 files leads to panic v5.14.0 -
github.com/go-git/go-git/v5 GHSA-gm2x-2g9h-ccm8 LOW go-git missing validation decoding Index v4 files leads to panic v5.14.0 5.17.1
github.com/go-git/go-git/v5 GO-2026-4909 LOW Missing validation decoding Index v4 files leads to panic in github.com/go-git/go-git v5.14.0 5.17.1
github.com/jackc/pgx/v5 GHSA-j88v-2chj-qfwx LOW pgx: SQL Injection via placeholder confusion with dollar quoted string literals v5.7.4 5.9.2
⚠️ Dependencies that have Reached EOL (2)
Dependency Unsafe Version EOL Date New Version Path
github.com/Azure/go-autorest/autorest/adal v0.9.23 - v0.9.24 go.mod
github.com/go-zookeeper/zk v1.0.3 Jul 22, 2025 v1.0.4 go.mod
📅 Dependencies Nearing EOL (2)
Dependency Unsafe Version EOL Date New Version Path
github.com/Azure/go-autorest/autorest v0.11.29 Apr 27, 2026 v0.11.30 go.mod
github.com/hashicorp/go-bexpr v0.1.12 Apr 26, 2026 v0.1.16 go.mod

Review Checklist

Standard review:

  • Review changes for compatibility with your code
  • Check for breaking changes in release notes
  • Run tests locally or wait for CI
  • Approve and merge this PR

Update Mode: Vulnerability Remediation (Critical/High)

🤖 Generated by DataDog Automated Dependency Management System

@campaigner-prod
Copy link
Copy Markdown

Release Notes

github.com/jackc/pgx/v5 (v5.7.4 → v5.9.2) — Changelog

Fix SQL Injection via placeholder confusion with dollar quoted string literals (GHSA-j88v-2chj-qfwx)

SQL injection can occur when:

  1. The non-default simple protocol is used.
  2. A dollar quoted string literal is used in the SQL query.
  3. That query contains text that would be would be interpreted outside as a placeholder outside of a string literal.
  4. The value of that placeholder is controllable by the attacker.

e.g.

attackValue := `$tag$; drop table canary; --`
_, err = tx.Exec(ctx, `select $tag$ $1 $tag$, $1`, pgx.QueryExecModeSimpleProtocol, attackValue)

This is unlikely to occur outside of a contrived scenario.

github.com/opencontainers/runc (v1.2.6 → v1.4.2) — GitHub Release

v1.4.2

This is the second patch release of the 1.4.z release series of runc.

Fixed

Static Linking Notices

The runc binary distributed with this release are statically linked with
the following GNU LGPL-2.1 licensed libraries, with runc acting
as a "work that uses the Library":

The versions of these libraries were not modified from their upstream versions,
but in order to comply with the LGPL-2.1 (§6(a)), we have attached the
complete source code for those libraries which (when combined with the attached
runc source code) may be used to exercise your rights under the LGPL-2.1.

However we strongly suggest that you make use of your distribution's packages
or download them from the authoritative upstream sources, especially since
these libraries are related to the security of your containers.


Thanks to the following contributors for making this release possible:

Signed-off-by: Kir Kolyshkin kolyshkin@gmail.com

v1.3.5

This is the fifth patch release of the 1.3.z release series of runc,
and primarily contains a few fixes for issues found in 1.3.4.

Fixed

Changed

Static Linking Notices

The runc binary distributed with this release are statically linked with
the following GNU LGPL-2.1 licensed libraries, with runc acting
as a "work that uses the Library":

The versions of these libraries were not modified from their upstream versions,
but in order to comply with the LGPL-2.1 (§6(a)), we have attached the
complete source code for those libraries which (when combined with the attached
runc source code) may be used to exercise your rights under the LGPL-2.1.

(truncated — see source for full notes)

go.opentelemetry.io/otel/sdk (v1.35.0 → v1.43.0) — GitHub Release

v1.43.0

Added

Changed

  • Introduce the EMPTY Type in go.opentelemetry.io/otel/attribute to reflect that an empty value is now a valid value, with INVALID remaining as a deprecated

(truncated)

v1.42.0

Added

Changed

Fixed

(truncated — see source for full notes)

github.com/go-jose/go-jose/v3 (v3.0.4 → v3.0.5) — GitHub Release

What's Changed

Fixes GHSA-78h2-9frx-2jm8

We recommend migrating from v3 to v4, and we will stop support v3 in the near future.

Full Changelog: go-jose/go-jose@v3.0.4...v3.0.5

github.com/go-jose/go-jose/v4 (v4.1.0 → v4.1.4) — GitHub Release

v4.1.4

What's Changed

Fixes Panic in JWE decryption. See GHSA-78h2-9frx-2jm8

Full Changelog: go-jose/go-jose@v4.1.3...v4.1.4

v4.1.3

This release drops Go 1.23 support as that Go release is no longer supported. With that, we can drop x/crypto and no longer have any external dependencies in go-jose outside of the standard library!

This release fixes a bug where a critical b64 header was ignored if in an unprotected header. It is now rejected instead of ignored.

What's Changed

Full Changelog: go-jose/go-jose@v4.1.2...v4.1.3

v4.1.2

What's Changed

go-jose v4.1.2 improves some documentation, errors, and removes the only 3rd-party dependency.

New Contributors

Full Changelog: go-jose/go-jose@v4.1.1...v4.1.2

v4.1.1

What's Changed

New Contributors

Full Changelog: go-jose/go-jose@v4.1.0...v4.1.1

github.com/go-git/go-git/v5 (v5.14.0 → v5.18.0) — GitHub Release

v5.18.0

What's Changed

Full Changelog: go-git/go-git@v5.17.2...v5.18.0

v5.17.2

What's Changed

⚠️ This release fixes a bug (go-git/go-git#1942) that blocked some users from upgrading to v5.17.1. Thanks @pskrbasu for reporting it. 🙇

Full Changelog: go-git/go-git@v5.17.1...v5.17.2

v5.17.1

What's Changed

Full Changelog: go-git/go-git@v5.17.0...v5.17.1

v5.17.0

What's Changed

Full Changelog: go-git/go-git@v5.16.5...v5.17.0

v5.16.5

What's Changed

Full Changelog: go-git/go-git@v5.16.4...v5.16.5

v5.16.4

What's Changed

Full Changelog: go-git/go-git@v5.16.3...v5.16.4

v5.16.3

What's Changed

Full Changelog: go-git/go-git@v5.16.2...v5.16.3

v5.16.2

What's Changed

(truncated — see source for full notes)

github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream (v1.6.2 → v1.7.9) — Changelog

https://github.com/aws/aws-sdk-go-v2/blob/main/CHANGELOG.md

github.com/aws/aws-sdk-go-v2/service/s3 (v1.53.1 → v1.99.1) — Changelog

https://github.com/aws/aws-sdk-go-v2/blob/main/CHANGELOG.md

filippo.io/edwards25519 (v1.1.0 → v1.1.1) — Commit comparison
  • d1c650a extra: initialize receiver in MultiScalarMult
github.com/hashicorp/go-bexpr (v0.1.12 → v0.1.16) — GitHub Release

v0.1.16

Improvements

  • Adds "is nil" and "is not nil" selector. [GH-129]

Bug Fixes

  • Fixed a bug where using "is empty" or "is not empty" with a non-slice or non-map value would panic. [GH-129]

Full Changelog: hashicorp/go-bexpr@v0.1.15...v0.1.16

v0.1.15

What's Changed

New Contributors

Full Changelog: hashicorp/go-bexpr@v0.1.14...v0.1.15

v0.1.14

What's Changed

New Contributors

Full Changelog: hashicorp/go-bexpr@v0.1.13...v0.1.14

v0.1.13

What's Changed

Full Changelog: hashicorp/go-bexpr@v0.1.12...v0.1.13


Generated by ADMS Sources: 6 GitHub Releases, 3 Changelogs, 1 Commit comparison, 5 not available.

@seberm-6
Copy link
Copy Markdown

Hey, sorry for the noise. This was caused by a bug in our automated dependency update system that incorrectly included upstream changelog content in PR comments, triggering notifications to external contributors. The feature flag has been turned off and we're working on a fix. Sorry about that again.

@seberm-6 seberm-6 closed this Apr 23, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant