Bump golang.org/x/image from 0.33.0 to 0.38.0 in /packages/sandbox-container/native/desktop-wrapper#542
Merged
ghostwriternr merged 5 commits intomainfrom Apr 1, 2026
Conversation
Bumps [golang.org/x/image](https://github.com/golang/image) from 0.33.0 to 0.38.0. - [Commits](golang/image@v0.33.0...v0.38.0) --- updated-dependencies: - dependency-name: golang.org/x/image dependency-version: 0.38.0 dependency-type: indirect ... Signed-off-by: dependabot[bot] <support@github.com>
🦋 Changeset detectedLatest commit: bcde80a The changes in this PR will be included in the next version bump. This PR includes changesets to release 1 package
Not sure what this means? Click here to learn what changesets are. Click here if you're a maintainer who wants to add another changeset to this PR |
golang.org/x/image 0.38.0 (CVE-2026-33809 fix) requires Go 1.25.
ghostwriternr
previously approved these changes
Apr 1, 2026
The privileged build now sources .github/crane-copy-retry.sh when it tags images with the content hash. This branch predates that helper, so adding it keeps the PR compatible with the current reusable workflow.
…iner/native/desktop-wrapper/golang.org/x/image-0.38.0
commit: |
Contributor
🐳 Docker Images Published
Usage: FROM cloudflare/sandbox:0.0.0-pr-542-bcde80aVersion: 📦 Standalone BinaryFor arbitrary Dockerfiles: COPY --from=cloudflare/sandbox:0.0.0-pr-542-bcde80a /container-server/sandbox /sandbox
ENTRYPOINT ["/sandbox"]Download via GitHub CLI: gh run download 23860553563 -n sandbox-binaryExtract from Docker: docker run --rm cloudflare/sandbox:0.0.0-pr-542-bcde80a cat /container-server/sandbox > sandbox && chmod +x sandbox |
whoiskatrin
approved these changes
Apr 1, 2026
Merged
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Bumps golang.org/x/image from 0.33.0 to 0.38.0.
Commits
23ae9edtiff: cap buffer growth to prevent OOM from malicious IFD offsete589e60webp: allow VP8L + VP8X(with alpha)fe7d73dgo.mod: update golang.org/x dependenciese3d762ball: upgrade go directive to at least 1.25.0 [generated]833c6edgo.mod: update golang.org/x dependenciesbc7fe0bgo.mod: update golang.org/x dependenciesc53c97fgo.mod: update golang.org/x dependencies9032ff7all: eliminate vet diagnosticsDependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)You can disable automated security fix PRs for this repo from the Security Alerts page.