-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
security(gomod): 🛡️ minor indirect to v0.33.0 #178
base: main
Are you sure you want to change the base?
Conversation
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #178 +/- ##
===========================================
+ Coverage 32.61% 51.05% +18.44%
===========================================
Files 80 87 +7
Lines 10855 11983 +1128
===========================================
+ Hits 3540 6118 +2578
+ Misses 7027 5565 -1462
- Partials 288 300 +12 ☔ View full report in Codecov by Sentry. |
Pull request was closed
Pull request was closed
f021460
to
06bdb41
Compare
Pull request was closed
f19988c
to
06bdb41
Compare
d9fb6a0
to
06bdb41
Compare
Pull request was closed
c416c14
to
06bdb41
Compare
Pull request was closed
04c20a7
to
06bdb41
Compare
Pull request was closed
a62e83b
to
06bdb41
Compare
Pull request was closed
b3445fd
to
06bdb41
Compare
This PR contains the following updates:
v0.26.0
->v0.33.0
GitHub Vulnerability Alerts
CVE-2024-45338
An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.
Non-linear parsing of case-insensitive content in golang.org/x/net/html
CVE-2024-45338 / GHSA-w32m-9786-jp63 / GO-2024-3333
More information
Details
An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Non-linear parsing of case-insensitive content in golang.org/x/net/html
CVE-2024-45338 / GHSA-w32m-9786-jp63 / GO-2024-3333
More information
Details
An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.
Severity
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR was generated by Mend Renovate. View the repository job log.