Skip to content

chore(deps): update module golang.org/x/crypto to v0.45.0 [security] (release-0.29)#443

Open
redhat-renovate-bot wants to merge 1 commit intorelease-0.29from
renovate/release-0.29-go-golang.org-x-crypto-vulnerability
Open

chore(deps): update module golang.org/x/crypto to v0.45.0 [security] (release-0.29)#443
redhat-renovate-bot wants to merge 1 commit intorelease-0.29from
renovate/release-0.29-go-golang.org-x-crypto-vulnerability

Conversation

@redhat-renovate-bot
Copy link
Collaborator

@redhat-renovate-bot redhat-renovate-bot commented Mar 13, 2026

This PR contains the following updates:

Package Type Update Change
golang.org/x/crypto indirect minor v0.31.0 -> v0.45.0

golang.org/x/crypto Vulnerable to Denial of Service (DoS) via Slow or Incomplete Key Exchange

CVE-2025-22869 / GHSA-hcg3-q754-cr77 / GO-2025-3487

More information

Details

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

Severity

  • CVSS Score: 7.5 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Potential denial of service in golang.org/x/crypto

CVE-2025-22869 / GHSA-hcg3-q754-cr77 / GO-2025-3487

More information

Details

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Potential denial of service in golang.org/x/crypto/ssh/agent

CVE-2025-47913 / GHSA-56w8-48fp-6mgv / GO-2025-4116

More information

Details

SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Unbounded memory consumption in golang.org/x/crypto/ssh

CVE-2025-58181 / GHSA-j5w8-q4qc-rx2x / GO-2025-4134

More information

Details

SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


golang.org/x/crypto/ssh allows an attacker to cause unbounded memory consumption

CVE-2025-58181 / GHSA-j5w8-q4qc-rx2x / GO-2025-4134

More information

Details

SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


golang.org/x/crypto/ssh/agent vulnerable to panic if message is malformed due to out of bounds read

CVE-2025-47914 / GHSA-f6x5-jh6r-wrfv / GO-2025-4135

More information

Details

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Malformed constraint may cause denial of service in golang.org/x/crypto/ssh/agent

CVE-2025-47914 / GHSA-f6x5-jh6r-wrfv / GO-2025-4135

More information

Details

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

Signed-off-by: redhat-renovate-bot <redhat-internal-renovate@redhat.com>
@redhat-renovate-bot redhat-renovate-bot added the release-note-none Denotes a PR that doesn't merit a release note. label Mar 13, 2026
@redhat-renovate-bot
Copy link
Collaborator Author

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 4 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
golang.org/x/net v0.33.0 -> v0.47.0
golang.org/x/sys v0.28.0 -> v0.38.0
golang.org/x/term v0.27.0 -> v0.37.0
golang.org/x/text v0.21.0 -> v0.31.0
go 1.18 -> 1.24.0

@kubevirt-bot kubevirt-bot added the dco-signoff: yes Indicates the PR's author has DCO signed all their commits. label Mar 13, 2026
@kubevirt-bot
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: redhat-renovate-bot
Once this PR has been reviewed and has the lgtm label, please assign alonakaplan for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@gemini-code-assist
Copy link

Summary of Changes

Hello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request primarily focuses on a critical security update for the golang.org/x/crypto module, mitigating several denial-of-service vulnerabilities. Alongside this, it incorporates a significant upgrade to Go 1.24.0 and updates other core golang.org/x dependencies. The changes also include substantial internal refactorings and enhancements across networking, HTML parsing, and terminal interaction components, aiming for improved performance, security, and maintainability.

Highlights

  • Security Update: Updated the golang.org/x/crypto module to v0.45.0 to address multiple denial-of-service (DoS) vulnerabilities (CVE-2025-22869, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181) in its SSH and SSH agent implementations.
  • Go Version Update: The project's Go version has been upgraded from 1.18 to 1.24.0.
  • HTTP/2 Enhancements: Introduced RFC 9218 priority scheduling for HTTP/2 streams, improved frame reading mechanisms, and refined header processing logic for both client and server implementations.
  • Context Package Modernization: Refactored the golang.org/x/net/context package to directly utilize the standard library's context package, removing older Go version compatibility layers.
  • HTML Parsing Robustness: Enhanced the HTML parser to handle malformed input more gracefully, including improved self-closing tag detection and a new panic for excessively deep element nesting.
  • Terminal Input Improvements: The golang.org/x/term package now supports a more flexible history mechanism and improved handling of pasted input, with auto-completion disabled during password entry.
Changelog
  • go.mod
    • Updated golang.org/x/crypto from v0.31.0 to v0.45.0.
    • Updated golang.org/x/net from v0.33.0 to v0.47.0.
    • Updated golang.org/x/sys from v0.28.0 to v0.38.0.
    • Updated golang.org/x/term from v0.27.0 to v0.37.0.
    • Updated golang.org/x/text from v0.21.0 to v0.31.0.
    • Updated Go language version from 1.18 to 1.24.0.
  • go.sum
    • Updated checksums for various golang.org/x modules and github.com/google/go-cmp.
  • vendor/golang.org/x/net/context/context.go
    • Refactored to use the standard library context package directly.
    • Marked package as deprecated.
  • vendor/golang.org/x/net/context/go17.go
    • Removed.
  • vendor/golang.org/x/net/context/go19.go
    • Removed.
  • vendor/golang.org/x/net/context/pre_go17.go
    • Removed.
  • vendor/golang.org/x/net/context/pre_go19.go
    • Removed.
  • vendor/golang.org/x/net/html/atom/table.go
    • Updated various HTML atom values.
  • vendor/golang.org/x/net/html/escape.go
    • Modified panic message for unrecognized escape characters.
  • vendor/golang.org/x/net/html/parse.go
    • Updated panic messages for internal errors to be more specific.
    • Introduced insertOpenElement function and added a panic for exceeding 512 nested elements.
    • Modified afterHeadIM to use insertOpenElement.
    • Added a.Search to a list of elements in inBodyIM.
    • Corrected section number in a comment.
    • Refined handling of table-related end tags in inRowIM.
    • Improved foreign content parsing for end tags.
    • Added a defer recover block to parse() to convert panics to errors.
    • Added a comment about HTML nesting depth limits.
  • vendor/golang.org/x/net/html/render.go
    • Corrected a typo in a comment.
  • vendor/golang.org/x/net/html/token.go
    • Improved self-closing tag detection to prevent misinterpretation with unquoted attribute values.
  • vendor/golang.org/x/net/http2/config.go
    • Added StrictMaxConcurrentRequests field to http2Config.
    • Refactored config filling logic into a single fillNetHTTPConfig function.
  • vendor/golang.org/x/net/http2/config_go124.go
    • Removed.
  • vendor/golang.org/x/net/http2/config_go125.go
    • Added for Go 1.25+ specific HTTP/2 config handling.
  • vendor/golang.org/x/net/http2/config_go126.go
    • Added for Go 1.26+ specific HTTP/2 config handling.
  • vendor/golang.org/x/net/http2/config_pre_go124.go
    • Removed.
  • vendor/golang.org/x/net/http2/frame.go
    • Changed frame name and parser maps to arrays for efficiency.
    • Added invalidHTTP1LookingFrameHeader function.
    • Added lastFrameType field to Framer for frame order verification.
    • Refactored ReadFrame into ReadFrameHeader and ReadFrameForHeader.
    • Updated checkFrameOrder to use FrameHeader.
    • Added more specific error messages for ErrFrameTooLarge when HTTP/1.1 headers are detected.
    • Added RFC9218 priority parameters (urgency, incremental) to PriorityParam struct.
  • vendor/golang.org/x/net/http2/gotrack.go
    • Added disableDebugGoroutines atomic boolean to control goroutine debugging.
  • vendor/golang.org/x/net/http2/http2.go
    • Removed context import.
    • Changed default for disableExtendedConnectProtocol to true and updated environment variable check.
    • Removed synctestGroupInterface and related timer/goroutine tracking methods.
  • vendor/golang.org/x/net/http2/server.go
    • Removed synctestGroupInterface and associated methods.
    • Moved errChanPool to serverInternalState for per-Server pooling.
    • Updated ServeConn to initialize opts if nil.
    • Replaced sc.srv.markNewGoroutine() calls.
    • Replaced sc.srv.afterFunc and sc.srv.newTimer with direct time.AfterFunc and time.NewTimer calls.
    • Replaced sc.srv.now() with time.Now().
    • Updated request parameter handling to use httpcommon.ServerRequestParam and httpcommon.NewServerRequest.
    • Replaced direct header canonicalization with httpcommon.CachedCanonicalHeader.
    • Removed inTests check from requestBody.Read.
  • vendor/golang.org/x/net/http2/timer.go
    • Removed.
  • vendor/golang.org/x/net/http2/transport.go
    • Removed transportTestHooks.group and related methods.
    • Added closedOnIdle field to ClientConn.
    • Replaced cc.t.afterFunc with time.AfterFunc.
    • Replaced cc.t.now() with time.Now().
    • Replaced cc.t.timeSince with time.Since.
    • Added errClientConnForceClosed error.
    • Removed commaSeparatedTrailers and checkConnHeaders functions, delegating to httpcommon.
    • Updated cs.requestedGzip logic to use httpcommon.IsRequestGzip.
    • Refactored encodeHeaders into encodeRequestHeaders and moved it to httpcommon.
    • Replaced lowerHeader with httpcommon.LowerHeader.
    • Updated errRequestHeaderListSize to use httpcommon.ErrRequestHeaderListSize.
    • Added errConcurrentReadOnResBody and refactored gzipReader to use a sync.Pool for gzip.Reader and handle concurrent reads.
  • vendor/golang.org/x/net/http2/write.go
    • Replaced lowerHeader with httpcommon.LowerHeader.
  • vendor/golang.org/x/net/http2/writesched.go
    • Added priority field to OpenStreamOptions.
    • Refactored writeQueue for more efficient queue management.
    • Added peek method to writeQueue.
    • Updated writeQueuePool.put to clear both internal queues.
  • vendor/golang.org/x/net/http2/writesched_priority.go
    • Renamed to writesched_priority_rfc7540.go.
    • Renamed priorityDefaultWeight to priorityDefaultWeightRFC7540.
    • Renamed priorityWriteScheduler to priorityWriteSchedulerRFC7540.
    • Renamed priorityNode to priorityNodeRFC7540.
    • Renamed priorityNodeState to priorityNodeStateRFC7540.
    • Renamed sortPriorityNodeSiblings to sortPriorityNodeSiblingsRFC7540.
  • vendor/golang.org/x/net/http2/writesched_priority_rfc9218.go
    • Added new file implementing RFC 9218 priority scheduling (priorityWriteSchedulerRFC9218).
  • vendor/golang.org/x/net/http2/writesched_roundrobin.go
    • Corrected typo from 'priorizes' to 'prioritizes'.
  • vendor/golang.org/x/net/internal/httpcommon/ascii.go
    • Added new file with ASCII-specific string utility functions.
  • vendor/golang.org/x/net/internal/httpcommon/headermap.go
    • Renamed from http2/headermap.go.
    • Updated CanonicalHeader and LowerHeader to use textproto.CanonicalMIMEHeaderKey.
    • Added CachedCanonicalHeader.
  • vendor/golang.org/x/net/internal/httpcommon/request.go
    • Added new file with common HTTP request header encoding logic and validation.
  • vendor/golang.org/x/sys/plan9/pwd_go15_plan9.go
    • Removed.
  • vendor/golang.org/x/sys/plan9/pwd_plan9.go
    • Simplified by directly calling syscall.Fixwd, syscall.Getwd, and syscall.Chdir.
  • vendor/golang.org/x/sys/unix/affinity_linux.go
    • Added clear(s[:]) to Zero() method.
    • Added Fill() method to CPUSet.
  • vendor/golang.org/x/sys/unix/auxv.go
    • Added new file with Auxv() function to read ELF auxiliary vector.
  • vendor/golang.org/x/sys/unix/auxv_unsupported.go
    • Added new file for unsupported Auxv() on non-ELF platforms.
  • vendor/golang.org/x/sys/unix/fdset.go
    • Replaced loop with clear(fds.Bits[:]) in Zero().
  • vendor/golang.org/x/sys/unix/ifreq_linux.go
    • Replaced loop with clear(ifr.raw.Ifru[:]) in clear().
  • vendor/golang.org/x/sys/unix/mkall.sh
    • Added set -e for error handling.
  • vendor/golang.org/x/sys/unix/mkerrors.sh
    • Added linux/elf.h include and new ELF-related regex for constants.
    • Added ETHTOOL_FAMILY_NAME and ETHTOOL_FAMILY_VERSION defines.
  • vendor/golang.org/x/sys/unix/syscall_darwin.go
    • Added Readv, Preadv, Writev, Pwritev functions for vectorized I/O.
  • vendor/golang.org/x/sys/unix/syscall_dragonfly.go
    • Added Dup3 function.
  • vendor/golang.org/x/sys/unix/syscall_linux.go
    • Replaced loops with range or clear for array operations.
    • Added slices import.
    • Added SetMemPolicy function.
  • vendor/golang.org/x/sys/unix/syscall_netbsd.go
    • Added Getvfsstat function.
  • vendor/golang.org/x/sys/unix/syscall_solaris.go
    • Changed Listen syscall from __xnet_llisten to __xnet_listen.
    • Added Ucred struct and related functions for user credentials.
  • vendor/golang.org/x/sys/unix/zerrors_linux.go
    • Updated various Linux constants related to audit, BPF, DM, ELF, ETHTOOL, FANOTIFY, FSCRYPT, F_DUPFD, IPPROTO, IPV6, LANDLOCK, MADV, MSG, NFC, NFT, NN, NT, PF, PR, PTRACE, RTA, RTM, RWF, SCM, SHF, SHN, SHT, SO, STATX, STB, STT, TASKSTATS, TCP, UDP, VER, WG, XDP.
  • vendor/golang.org/x/sys/unix/zerrors_linux_386.go
    • Updated various Linux 386 constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_amd64.go
    • Updated various Linux AMD64 constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_arm.go
    • Updated various Linux ARM constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_arm64.go
    • Updated various Linux ARM64 constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_loong64.go
    • Updated various Linux LOONG64 constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_mips.go
    • Updated various Linux MIPS constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_mips64.go
    • Updated various Linux MIPS64 constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_mips64le.go
    • Updated various Linux MIPS64LE constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_mipsle.go
    • Updated various Linux MIPSLE constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_ppc.go
    • Updated various Linux PPC constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_ppc64.go
    • Updated various Linux PPC64 constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_ppc64le.go
    • Updated various Linux PPC64LE constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_riscv64.go
    • Updated various Linux RISCV64 constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_s390x.go
    • Updated various Linux S390X constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_sparc64.go
    • Updated various Linux SPARC64 constants.
  • vendor/golang.org/x/sys/unix/zsyscall_darwin_amd64.go
    • Added readv, preadv, writev, pwritev syscalls.
  • vendor/golang.org/x/sys/unix/zsyscall_darwin_amd64.s
    • Added assembly stubs for readv, preadv, writev, pwritev.
  • vendor/golang.org/x/sys/unix/zsyscall_darwin_arm64.go
    • Added readv, preadv, writev, pwritev syscalls.
  • vendor/golang.org/x/sys/unix/zsyscall_darwin_arm64.s
    • Added assembly stubs for readv, preadv, writev, pwritev.
  • vendor/golang.org/x/sys/unix/zsyscall_linux.go
    • Added setMemPolicy syscall.
  • vendor/golang.org/x/sys/unix/zsyscall_solaris_amd64.go
    • Updated Listen syscall name.
    • Added getpeerucred, ucred_get, ucred_geteuid, ucred_getegid, ucred_getruid, ucred_getrgid, ucred_getsuid, ucred_getsgid, ucred_getpid, ucred_free syscalls.
  • vendor/golang.org/x/sys/unix/zsysnum_linux_386.go
    • Added new syscall numbers for SETXATTRAT, GETXATTRAT, LISTXATTRAT, REMOVEXATTRAT, OPEN_TREE_ATTR.
  • vendor/golang.org/x/sys/unix/zsysnum_linux_amd64.go
    • Added new syscall numbers for SETXATTRAT, GETXATTRAT, LISTXATTRAT, REMOVEXATTRAT, OPEN_TREE_ATTR.
  • vendor/golang.org/x/sys/unix/zsysnum_linux_arm.go
    • Added new syscall numbers for SETXATTRAT, GETXATTRAT, LISTXATTRAT, REMOVEXATTRAT, OPEN_TREE_ATTR.
  • vendor/golang.org/x/sys/unix/zsysnum_linux_arm64.go
    • Added new syscall numbers for SETXATTRAT, GETXATTRAT, LISTXATTRAT, REMOVEXATTRAT, OPEN_TREE_ATTR.
  • vendor/golang.org/x/sys/unix/zsysnum_linux_loong64.go
    • Added new syscall numbers for SETXATTRAT, GETXATTRAT, LISTXATTRAT, REMOVEXATTRAT, OPEN_TREE_ATTR.
  • vendor/golang.org/x/sys/unix/zsysnum_linux_mips.go
    • Added new syscall numbers for SETXATTRAT, GETXATTRAT, LISTXATTRAT, REMOVEXATTRAT, OPEN_TREE_ATTR.
  • vendor/golang.org/x/sys/unix/zsysnum_linux_mips64.go
    • Added new syscall numbers for SETXATTRAT, GETXATTRAT, LISTXATTRAT, REMOVEXATTRAT, OPEN_TREE_ATTR.
  • vendor/golang.org/x/sys/unix/zsysnum_linux_mips64le.go
    • Added new syscall numbers for SETXATTRAT, GETXATTRAT, LISTXATTRAT, REMOVEXATTRAT, OPEN_TREE_ATTR.
  • vendor/golang.org/x/sys/unix/zsysnum_linux_mipsle.go
    • Added new syscall numbers for SETXATTRAT, GETXATTRAT, LISTXATTRAT, REMOVEXATTRAT, OPEN_TREE_ATTR.
  • vendor/golang.org/x/sys/unix/zsysnum_linux_ppc.go
    • Added new syscall numbers for SETXATTRAT, GETXATTRAT, LISTXATTRAT, REMOVEXATTRAT, OPEN_TREE_ATTR.
  • vendor/golang.org/x/sys/unix/zsysnum_linux_ppc64.go
    • Added new syscall numbers for SETXATTRAT, GETXATTRAT, LISTXATTRAT, REMOVEXATTRAT, OPEN_TREE_ATTR.
  • vendor/golang.org/x/sys/unix/zsysnum_linux_ppc64le.go
    • Added new syscall numbers for SETXATTRAT, GETXATTRAT, LISTXATTRAT, REMOVEXATTRAT, OPEN_TREE_ATTR.
  • vendor/golang.org/x/sys/unix/zsysnum_linux_riscv64.go
    • Added new syscall numbers for SETXATTRAT, GETXATTRAT, LISTXATTRAT, REMOVEXATTRAT, OPEN_TREE_ATTR.
  • vendor/golang.org/x/sys/unix/zsysnum_linux_s390x.go
    • Added new syscall numbers for SETXATTRAT, GETXATTRAT, LISTXATTRAT, REMOVEXATTRAT, OPEN_TREE_ATTR.
  • vendor/golang.org/x/sys/unix/zsysnum_linux_sparc64.go
    • Added new syscall numbers for SETXATTRAT, GETXATTRAT, LISTXATTRAT, REMOVEXATTRAT, OPEN_TREE_ATTR.
  • vendor/golang.org/x/sys/unix/ztypes_linux.go
    • Updated Statx_t and FscryptAddKeyArg structs.
    • Added IfAddrlblmsg struct and related constants.
    • Updated NFT_PAYLOAD and NFT_CT constants.
    • Updated SOF_TIMESTAMPING_LAST and SOF_TIMESTAMPING_MASK.
    • Added TCA_* and RTNLGRP_* constants.
    • Added SizeofNhmsg and SizeofNexthopGrp constants.
    • Updated ETHTOOL_MSG_* and ETHTOOL_A_RINGS_* constants.
    • Added TCP_V4_FLOW, UDP_V4_FLOW, ESP_V4_FLOW, IP_USER_FLOW, IPV6_USER_FLOW, IPV6_FLOW, ETHER_FLOW constants.
    • Updated various NL80211_* constants.
    • Added RTM_NEWNVLAN and MPOL_* constants.
  • vendor/golang.org/x/sys/unix/ztypes_linux_386.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_amd64.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_arm.go
    • Updated Stat_t struct.
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_arm64.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_loong64.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_mips.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_mips64.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_mips64le.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_mipsle.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_ppc.go
    • Updated Stat_t struct.
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_ppc64.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_ppc64le.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_riscv64.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_s390x.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_sparc64.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/windows/dll_windows.go
    • Updated comments for LoadDLL and NewLazyDLL for safety recommendations.
    • Removed errString type.
  • vendor/golang.org/x/sys/windows/security_windows.go
    • Modified ToAbsolute method for SECURITY_DESCRIPTOR to use unsafe.SliceData and add pointer validation.
  • vendor/golang.org/x/sys/windows/syscall_windows.go
    • Added GetNumberOfConsoleInputEvents and FlushConsoleInputBuffer syscalls.
    • Added WSADuplicateSocket syscall.
    • Added GetIpForwardEntry2, GetIpForwardTable2, FreeMibTable, NotifyRouteChange2 syscalls.
    • Added RawSockaddrInet struct.
    • Updated NTUnicodeString.Slice() to correctly handle length.
  • vendor/golang.org/x/sys/windows/types_windows.go
    • Added O_FILE_FLAG_* constants.
    • Added IP_MTU_DISCOVER, IPV6_MTU_DISCOVER, IP_PMTUDISC_* constants.
    • Added WSACMSGHDR, IN_PKTINFO, IN6_PKTINFO structs.
    • Added FileZeroDataInformation struct.
    • Added IpAddressPrefix, MibIpForwardRow2, MibIpForwardTable2 structs and related constants.
    • Added various VK_*, mouse button, control key state, mouse event, and input record event types.
  • vendor/golang.org/x/term/term_windows.go
    • Removed windows.ENABLE_PROCESSED_OUTPUT from makeRaw mode flags.
  • vendor/golang.org/x/term/terminal.go
    • Added History interface and a default stRingBuffer implementation.
    • Updated handleKey to use historyAt and historyAdd.
    • Modified handleKey to also process keyLF.
    • Disabled AutoCompleteCallback during ReadPassword.
    • Modified readLine to consume keyLF after keyEnter for CRLF sequences.
    • Updated stRingBuffer to implement History interface.
  • vendor/golang.org/x/text/language/parse.go
    • Corrected return value for CanonType.Parse to always return nil error.
  • vendor/golang.org/x/text/unicode/bidi/core.go
    • Removed maxLevel function and replaced its usage with max.
  • vendor/modules.txt
    • Updated module versions for golang.org/x/crypto, golang.org/x/net, golang.org/x/sys, golang.org/x/term, golang.org/x/text.
    • Added golang.org/x/net/internal/httpcommon.
Activity
  • This pull request was automatically generated by Renovate Bot to update dependencies.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for GitHub and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

@kubevirt-bot
Copy link
Collaborator

@redhat-renovate-bot: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
pull-e2e-ovs-cni c008243 link true /test pull-e2e-ovs-cni-0.29
Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Copy link

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request updates golang.org/x/crypto to v0.45.0 to address several security vulnerabilities. As part of this update, other golang.org/x/... dependencies are also updated, and the Go version for the module is bumped from 1.18 to 1.24.0. This is a significant Go version upgrade that should be carefully tested.

)

go 1.18
go 1.24.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

high

The Go version is being updated from 1.18 to 1.24.0. This is a significant jump and may have implications for the build environment and dependencies. While this is likely necessary to support the updated dependencies, it's a major change that warrants careful review and testing to ensure there are no unintended side effects.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dco-signoff: yes Indicates the PR's author has DCO signed all their commits. release-note-none Denotes a PR that doesn't merit a release note.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants