Skip to content

Conversation

cq-bot
Copy link
Contributor

@cq-bot cq-bot commented Mar 13, 2025

This PR contains the following updates:

Package Type Update Change
golang.org/x/net indirect minor v0.34.0 -> v0.36.0

GitHub Vulnerability Alerts

CVE-2025-22870

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@cq-bot
Copy link
Contributor Author

cq-bot commented Mar 13, 2025

ℹ Artifact update notice

File name: examples/simple_plugin/go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 3 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.22.7 -> 1.24.1
golang.org/x/sync v0.10.0 -> v0.11.0
golang.org/x/sys v0.29.0 -> v0.30.0
golang.org/x/text v0.21.0 -> v0.22.0
File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 3 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.23.3 -> 1.24.1
golang.org/x/sync v0.10.0 -> v0.11.0
golang.org/x/text v0.21.0 -> v0.22.0
golang.org/x/sys v0.29.0 -> v0.30.0
@github-actions github-actions bot added the fix label Mar 13, 2025
@kodiakhq kodiakhq bot merged commit b41044d into main Mar 13, 2025
11 checks passed
@kodiakhq kodiakhq bot deleted the renovate/go-golang.org-x-net-vulnerability branch March 13, 2025 02:04
kodiakhq bot pushed a commit that referenced this pull request Mar 24, 2025
🤖 I have created a release *beep* *boop* --- ## [4.74.2](v4.74.1...v4.74.2) (2025-03-24) ### Bug Fixes * **deps:** Update aws-sdk-go-v2 monorepo ([#2096](#2096)) ([f49534a](f49534a)) * **deps:** Update aws-sdk-go-v2 monorepo ([#2100](#2100)) ([07a3ed8](07a3ed8)) * **deps:** Update module github.com/apache/arrow-go/v18 to v18.2.0 ([#2103](#2103)) ([f6b7143](f6b7143)) * **deps:** Update module github.com/aws/aws-sdk-go-v2/service/marketplacemetering to v1.26.2 ([#2102](#2102)) ([ddae6e0](ddae6e0)) * **deps:** Update module github.com/cloudquery/cloudquery-api-go to v1.13.7 ([#2099](#2099)) ([316ff40](316ff40)) * **deps:** Update module golang.org/x/net to v0.36.0 [SECURITY] ([#2098](#2098)) ([b41044d](b41044d)) * **deps:** Update module google.golang.org/grpc to v1.71.0 ([#2101](#2101)) ([7086507](7086507)) --- This PR was generated with [Release Please](https://github.com/googleapis/release-please). See [documentation](https://github.com/googleapis/release-please#release-please).
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

1 participant