Skip to content

chore(deps): bump github.com/slackhq/nebula from 1.9.7 to 1.10.3 in /caddy#1164

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/caddy/github.com/slackhq/nebula-1.10.3
Open

chore(deps): bump github.com/slackhq/nebula from 1.9.7 to 1.10.3 in /caddy#1164
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/caddy/github.com/slackhq/nebula-1.10.3

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Feb 6, 2026

Bumps github.com/slackhq/nebula from 1.9.7 to 1.10.3.

Release notes

Sourced from github.com/slackhq/nebula's releases.

Release v1.10.3

No release notes provided.

Release v1.10.2

Fixed

  • Fix panic when using use_system_route_table that was introduced in v1.10.1. (#1580)

Changed

  • Fix some typos in comments. (#1582)
  • Dependency updates. (#1581)

Release v1.10.1

See the v1.10.1 milestone for a complete list of changes.

Fixed

  • Fix a bug where an unsafe route derived from the system route table could be lost on a config reload. (#1573)
  • Fix the PEM banner for ECDSA P256 public keys. (#1552)
  • Fix a regression on Windows from 1.9.x where nebula could fall back to a less performant UDP listener if non-critical ioctls failed. (#1568)
  • Fix a bug in handshake processing when a peer sends an unexpected public key. (#1566)

Added

  • Add a config option to control accepting recv_error packets which defaults to always. (#1569)

Changed

Release v1.10.0

See the v1.10.0 milestone for a complete list of changes.

NOTE: If you use unsafe_routes, please read the note in the Changed section about default_local_cidr_any. You may need to update your firewall rules in order to maintain connectivity.

Added

Changed

  • NOTE: default_local_cidr_any now defaults to false, meaning that any firewall rule

... (truncated)

Changelog

Sourced from github.com/slackhq/nebula's changelog.

[1.10.3] - 2026-02-06

Security

  • Fix an issue where blocklist bypass is possible when using curve P256 since the signature can have 2 valid representations. Both fingerprint representations will be tested against the blocklist. Any newly issued P256 based certificates will have their signature clamped to the low-s form. Nebula will assert the low-s signature form when validating certificates in a future version. GHSA-69x3-g4r3-p962

Changed

  • Improve error reporting if nebula fails to start due to a tun device naming issue. (#1588)

[1.10.2] - 2026-01-21

Fixed

  • Fix panic when using use_system_route_table that was introduced in v1.10.1. (#1580)

Changed

  • Fix some typos in comments. (#1582)
  • Dependency updates. (#1581)

[1.10.1] - 2026-01-16

See the v1.10.1 milestone for a complete list of changes.

Fixed

  • Fix a bug where an unsafe route derived from the system route table could be lost on a config reload. (#1573)
  • Fix the PEM banner for ECDSA P256 public keys. (#1552)
  • Fix a regression on Windows from 1.9.x where nebula could fall back to a less performant UDP listener if non-critical ioctls failed. (#1568)
  • Fix a bug in handshake processing when a peer sends an unexpected public key. (#1566)

Added

  • Add a config option to control accepting recv_error packets which defaults to always. (#1569)

Changed

[1.10.0] - 2025-12-04

See the v1.10.0 milestone for a complete list of changes.

Added

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [github.com/slackhq/nebula](https://github.com/slackhq/nebula) from 1.9.7 to 1.10.3.
- [Release notes](https://github.com/slackhq/nebula/releases)
- [Changelog](https://github.com/slackhq/nebula/blob/master/CHANGELOG.md)
- [Commits](slackhq/nebula@v1.9.7...v1.10.3)

---
updated-dependencies:
- dependency-name: github.com/slackhq/nebula
  dependency-version: 1.10.3
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Feb 6, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update Go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants