-
Notifications
You must be signed in to change notification settings - Fork 1.6k
fix(deps): update module golang.org/x/net to v0.38.0 [security] (release-1.6) #15102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(deps): update module golang.org/x/net to v0.38.0 [security] (release-1.6) #15102
Conversation
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
File name: staging/src/kubevirt.io/api/go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
File name: staging/src/kubevirt.io/client-go/go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
|
/retest-required |
xpivarc
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: xpivarc The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/lgtm |
Signed-off-by: Renovate Bot <[email protected]>
3dfd223 to
c121484
Compare
|
/lgtm |
|
/retest-required |
|
/retest-required |
|
/retest-required |
|
✋🧢 /hold Dear @dominikholler 🔎 Please check that the changes you committed are fine and that there are no infrastructure issues present! DetailsChecklist:
💬 How we calculate the number of retests: The number of retest comments are the number of 👌 After all issues have been resolved, you can remove the hold on this pull request by commenting 🙇 Thank you, your friendly referee automation, on behalf of the @sig-buildsystem and the KubeVirt community! |
|
/unhold |
|
/retest-required |
|
✋🧢 /hold Dear @dominikholler 🔎 Please check that the changes you committed are fine and that there are no infrastructure issues present! DetailsChecklist:
💬 How we calculate the number of retests: The number of retest comments are the number of 👌 After all issues have been resolved, you can remove the hold on this pull request by commenting 🙇 Thank you, your friendly referee automation, on behalf of the @sig-buildsystem and the KubeVirt community! |
|
/unhold |
|
/retest-required |
|
✋🧢 /hold Dear @dominikholler 🔎 Please check that the changes you committed are fine and that there are no infrastructure issues present! DetailsChecklist:
💬 How we calculate the number of retests: The number of retest comments are the number of 👌 After all issues have been resolved, you can remove the hold on this pull request by commenting 🙇 Thank you, your friendly referee automation, on behalf of the @sig-buildsystem and the KubeVirt community! |
|
/unhold |
This PR contains the following updates:
v0.36.0->v0.38.0Release note
golang.org/x/net vulnerable to Cross-site Scripting
CVE-2025-22872 / GHSA-vvgc-356p-c3xw / GO-2025-3595
More information
Details
The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).
Severity
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:NReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net
CVE-2025-22872 / GHSA-vvgc-356p-c3xw / GO-2025-3595
More information
Details
The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR has been generated by Renovate Bot.