Skip to content

chore(deps): update module golang.org/x/crypto to v0.45.0 [security] (release-0.32)#449

Open
redhat-renovate-bot wants to merge 1 commit intorelease-0.32from
renovate/release-0.32-go-golang.org-x-crypto-vulnerability
Open

chore(deps): update module golang.org/x/crypto to v0.45.0 [security] (release-0.32)#449
redhat-renovate-bot wants to merge 1 commit intorelease-0.32from
renovate/release-0.32-go-golang.org-x-crypto-vulnerability

Conversation

@redhat-renovate-bot
Copy link
Collaborator

This PR contains the following updates:

Package Type Update Change
golang.org/x/crypto indirect minor v0.31.0 -> v0.45.0

golang.org/x/crypto Vulnerable to Denial of Service (DoS) via Slow or Incomplete Key Exchange

CVE-2025-22869 / GHSA-hcg3-q754-cr77 / GO-2025-3487

More information

Details

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

Severity

  • CVSS Score: 7.5 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Potential denial of service in golang.org/x/crypto

CVE-2025-22869 / GHSA-hcg3-q754-cr77 / GO-2025-3487

More information

Details

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Potential denial of service in golang.org/x/crypto/ssh/agent

CVE-2025-47913 / GHSA-56w8-48fp-6mgv / GO-2025-4116

More information

Details

SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Unbounded memory consumption in golang.org/x/crypto/ssh

CVE-2025-58181 / GHSA-j5w8-q4qc-rx2x / GO-2025-4134

More information

Details

SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


golang.org/x/crypto/ssh allows an attacker to cause unbounded memory consumption

CVE-2025-58181 / GHSA-j5w8-q4qc-rx2x / GO-2025-4134

More information

Details

SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


golang.org/x/crypto/ssh/agent vulnerable to panic if message is malformed due to out of bounds read

CVE-2025-47914 / GHSA-f6x5-jh6r-wrfv / GO-2025-4135

More information

Details

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Malformed constraint may cause denial of service in golang.org/x/crypto/ssh/agent

CVE-2025-47914 / GHSA-f6x5-jh6r-wrfv / GO-2025-4135

More information

Details

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

Signed-off-by: redhat-renovate-bot <redhat-internal-renovate@redhat.com>
@redhat-renovate-bot
Copy link
Collaborator Author

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 4 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
golang.org/x/net v0.33.0 -> v0.47.0
golang.org/x/sys v0.28.0 -> v0.38.0
golang.org/x/term v0.27.0 -> v0.37.0
golang.org/x/text v0.21.0 -> v0.31.0
go 1.18 -> 1.24.0

@redhat-renovate-bot redhat-renovate-bot added the release-note-none Denotes a PR that doesn't merit a release note. label Mar 15, 2026
@kubevirt-bot kubevirt-bot added the dco-signoff: yes Indicates the PR's author has DCO signed all their commits. label Mar 15, 2026
@kubevirt-bot
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: redhat-renovate-bot
Once this PR has been reviewed and has the lgtm label, please assign phoracek for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@kubevirt-bot
Copy link
Collaborator

@redhat-renovate-bot: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
pull-e2e-ovs-cni 7d8ba8c link true /test pull-e2e-ovs-cni-0.32
Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@gemini-code-assist
Copy link

Summary of Changes

Hello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request primarily focuses on enhancing the security and stability of the project by updating critical Go dependencies, particularly golang.org/x/crypto, to mitigate known vulnerabilities. It also incorporates broader updates across other golang.org/x modules and refines internal code structures for better maintainability and performance.

Highlights

  • Security Updates: Updated golang.org/x/crypto to v0.45.0 to address multiple security vulnerabilities (CVE-2025-22869, CVE-2025-47913, CVE-2025-58181, CVE-2025-47914) related to denial of service and unbounded memory consumption in SSH components.
  • Go Module Updates: Updated several golang.org/x modules, including golang.org/x/net, golang.org/x/sys, golang.org/x/term, and golang.org/x/text, to their latest versions.
  • Go Version Bump: The required Go version has been updated from 1.18 to 1.24.0.
  • Internal Refactoring and Improvements: Significant internal refactoring in golang.org/x/net packages, including direct usage of the standard library context package, improved HTML parsing robustness, and enhancements to HTTP/2 configuration and frame handling.
Changelog
  • go.mod
    • Updated golang.org/x/crypto from v0.31.0 to v0.45.0.
    • Updated golang.org/x/net from v0.33.0 to v0.47.0.
    • Updated golang.org/x/sys from v0.28.0 to v0.38.0.
    • Updated golang.org/x/term from v0.27.0 to v0.37.0.
    • Updated golang.org/x/text from v0.21.0 to v0.31.0.
    • Updated Go language version requirement from 1.18 to 1.24.0.
  • go.sum
    • Updated checksums for various golang.org/x modules.
    • Added a new checksum entry for github.com/google/go-cmp v0.5.9/go.mod.
  • vendor/golang.org/x/net/context/context.go
    • Refactored to directly use the standard library context package and marked the package as deprecated.
  • vendor/golang.org/x/net/context/go17.go
    • Removed the file.
  • vendor/golang.org/x/net/context/go19.go
    • Removed the file.
  • vendor/golang.org/x/net/context/pre_go17.go
    • Removed the file.
  • vendor/golang.org/x/net/context/pre_go19.go
    • Removed the file.
  • vendor/golang.org/x/net/html/atom/table.go
    • Updated internal hash constant and atom values.
  • vendor/golang.org/x/net/html/escape.go
    • Updated a panic message for unrecognized escape characters.
  • vendor/golang.org/x/net/html/parse.go
    • Updated internal panic messages for unknown scopes.
    • Added a check to panic if the open element stack exceeds 512 nodes.
    • Modified logic for handling elements within table rows and foreign content.
  • vendor/golang.org/x/net/html/render.go
    • Corrected a typo in a comment.
  • vendor/golang.org/x/net/html/token.go
    • Improved self-closing tag detection logic to prevent misinterpretation with unquoted attribute values.
  • vendor/golang.org/x/net/http2/config.go
    • Added StrictMaxConcurrentRequests field to http2Config.
    • Refactored configuration loading to use a new fillNetHTTPConfig function.
  • vendor/golang.org/x/net/http2/config_go124.go
    • Removed the file.
  • vendor/golang.org/x/net/http2/config_go125.go
    • Added a new file defining http2ConfigStrictMaxConcurrentRequests for Go versions before 1.26.
  • vendor/golang.org/x/net/http2/config_go126.go
    • Added a new file defining http2ConfigStrictMaxConcurrentRequests for Go versions 1.26 and later.
  • vendor/golang.org/x/net/http2/config_pre_go124.go
    • Removed the file.
  • vendor/golang.org/x/net/http2/frame.go
    • Changed frameName map to frameNames array for efficiency.
    • Updated FrameType.String() method to use the frameNames array.
    • Changed frameParsers map to an array.
    • Added invalidHTTP1LookingFrameHeader function.
    • Added lastFrameType field to Framer for frame order verification.
    • Refactored ReadFrame into ReadFrameHeader and ReadFrameForHeader.
    • Updated PriorityParam to include RFC 9218 fields (urgency, incremental).
  • vendor/golang.org/x/net/http2/gotrack.go
    • Added disableDebugGoroutines atomic boolean for controlling goroutine debugging in tests.
  • vendor/golang.org/x/net/http2/http2.go
    • Removed context import.
    • Changed default disableExtendedConnectProtocol to true.
    • Removed inTests variable and synctestGroupInterface.
    • Replaced custom timer interfaces with standard time.Timer.
    • Refactored newBufferedWriter to remove the group parameter.
    • Removed validPseudoPath function.
  • vendor/golang.org/x/net/http2/server.go
    • Removed synctestGroupInterface and related methods.
    • Replaced custom timer interfaces with standard time.Timer.
    • Moved errChanPool to serverInternalState for per-Server pooling.
    • Refactored request parsing logic to use httpcommon.ServerRequestParam and httpcommon.NewServerRequest.
    • Removed requestParam struct.
  • vendor/golang.org/x/net/http2/timer.go
    • Removed the file.
  • vendor/golang.org/x/net/http2/transport.go
    • Removed synctestGroupInterface and related methods.
    • Replaced custom timer interfaces with standard time.Timer.
    • Added closedOnIdle field to ClientConn.
    • Removed commaSeparatedTrailers and checkConnHeaders functions.
    • Refactored header encoding to use httpcommon.EncodeHeaders.
    • Added errClientConnForceClosed error.
    • Updated gzipReader to use a sync.Pool for gzip.Reader instances.
  • vendor/golang.org/x/net/http2/write.go
    • Updated lowerHeader to use httpcommon.LowerHeader.
  • vendor/golang.org/x/net/http2/writesched.go
    • Added priority field to OpenStreamOptions.
    • Refactored writeQueue to use a two-stage queue for improved efficiency.
  • vendor/golang.org/x/net/http2/writesched_priority.go
    • Renamed to writesched_priority_rfc7540.go and updated constants and struct names to reflect RFC 7540 prioritization.
  • vendor/golang.org/x/net/http2/writesched_priority_rfc9218.go
    • Added a new file implementing RFC 9218 priority scheduling.
  • vendor/golang.org/x/net/http2/writesched_roundrobin.go
    • Corrected a typo in a comment.
  • vendor/golang.org/x/net/internal/httpcommon/ascii.go
    • Added a new file with ASCII-specific string utility functions.
  • vendor/golang.org/x/net/internal/httpcommon/headermap.go
    • Renamed from vendor/golang.org/x/net/http2/headermap.go.
    • Moved header canonicalization and lowercasing logic here.
  • vendor/golang.org/x/net/internal/httpcommon/request.go
    • Added a new file with common HTTP request encoding and parsing logic, including EncodeHeaders and NewServerRequest.
  • vendor/golang.org/x/sys/plan9/pwd_go15_plan9.go
    • Removed the file.
  • vendor/golang.org/x/sys/plan9/pwd_plan9.go
    • Updated fixwd, Getwd, and Chdir to directly use syscall functions.
  • vendor/golang.org/x/sys/unix/affinity_linux.go
    • Added Fill method to CPUSet.
    • Used clear for Zero method.
  • vendor/golang.org/x/sys/unix/auxv.go
    • Added a new file to provide Auxv function for reading ELF auxiliary vector.
  • vendor/golang.org/x/sys/unix/auxv_unsupported.go
    • Added a new file for unsupported Auxv function.
  • vendor/golang.org/x/sys/unix/fdset.go
    • Used clear for Zero method.
  • vendor/golang.org/x/sys/unix/ifreq_linux.go
    • Used clear for clear method.
  • vendor/golang.org/x/sys/unix/mkall.sh
    • Added set -e to exit on error.
  • vendor/golang.org/x/sys/unix/mkerrors.sh
    • Added linux/elf.h include.
    • Added new patterns for ELF-related constants.
  • vendor/golang.org/x/sys/unix/syscall_darwin.go
    • Added Readv, Preadv, Writev, Pwritev functions.
    • Added race detection helpers for vector I/O operations.
  • vendor/golang.org/x/sys/unix/syscall_dragonfly.go
    • Added Dup3 function.
  • vendor/golang.org/x/sys/unix/syscall_linux.go
    • Used slices.Contains for isGroupMember.
    • Used range for loops in SockaddrUnix, SockaddrL2, SockaddrCAN, SockaddrCANJ1939, SockaddrIUCV.
    • Used clear for SockaddrPPPoE.sockaddr.
    • Added SetMemPolicy function.
  • vendor/golang.org/x/sys/unix/syscall_netbsd.go
    • Added Getvfsstat function.
  • vendor/golang.org/x/sys/unix/syscall_solaris.go
    • Updated Listen syscall to use __xnet_listen.
    • Added Ucred struct and related functions for user credentials.
  • vendor/golang.org/x/sys/unix/zerrors_linux.go
    • Updated DM_VERSION_EXTRA constant.
    • Added numerous ELF-related constants (e.g., DT_, EI_, ELFCLASS, ELFMAG, ELFOSABI, ET_, NN_, NT_, PF_, SHF_, SHN_, SHT_, STB_, STT_, VER_).
  • vendor/golang.org/x/sys/unix/zerrors_linux_386.go
    • Added DM_MPATH_PROBE_PATHS, IPV6_FLOWINFO_MASK, IPV6_FLOWLABEL_MASK, SCM_TS_OPT_ID, SO_PASSRIGHTS, SO_RCVPRIORITY constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_amd64.go
    • Added DM_MPATH_PROBE_PATHS, IPV6_FLOWINFO_MASK, IPV6_FLOWLABEL_MASK, SCM_TS_OPT_ID, SO_PASSRIGHTS, SO_RCVPRIORITY constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_arm.go
    • Added DM_MPATH_PROBE_PATHS, IPV6_FLOWINFO_MASK, IPV6_FLOWLABEL_MASK, SCM_TS_OPT_ID, SO_PASSRIGHTS, SO_RCVPRIORITY constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_arm64.go
    • Added DM_MPATH_PROBE_PATHS, GCS_MAGIC, IPV6_FLOWINFO_MASK, IPV6_FLOWLABEL_MASK, SCM_TS_OPT_ID, SO_PASSRIGHTS, SO_RCVPRIORITY constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_loong64.go
    • Added DM_MPATH_PROBE_PATHS, IPV6_FLOWINFO_MASK, IPV6_FLOWLABEL_MASK, SCM_TS_OPT_ID, SO_PASSRIGHTS, SO_RCVPRIORITY constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_mips.go
    • Added DM_MPATH_PROBE_PATHS, IPV6_FLOWINFO_MASK, IPV6_FLOWLABEL_MASK, SCM_TS_OPT_ID, SO_PASSRIGHTS, SO_RCVPRIORITY constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_mips64.go
    • Added DM_MPATH_PROBE_PATHS, IPV6_FLOWINFO_MASK, IPV6_FLOWLABEL_MASK, SCM_TS_OPT_ID, SO_PASSRIGHTS, SO_RCVPRIORITY constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_mips64le.go
    • Added DM_MPATH_PROBE_PATHS, IPV6_FLOWINFO_MASK, IPV6_FLOWLABEL_MASK, SCM_TS_OPT_ID, SO_PASSRIGHTS, SO_RCVPRIORITY constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_mipsle.go
    • Added DM_MPATH_PROBE_PATHS, IPV6_FLOWINFO_MASK, IPV6_FLOWLABEL_MASK, SCM_TS_OPT_ID, SO_PASSRIGHTS, SO_RCVPRIORITY constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_ppc.go
    • Added DM_MPATH_PROBE_PATHS, IPV6_FLOWINFO_MASK, IPV6_FLOWLABEL_MASK, SCM_TS_OPT_ID, SO_PASSRIGHTS, SO_RCVPRIORITY constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_ppc64.go
    • Added DM_MPATH_PROBE_PATHS, IPV6_FLOWINFO_MASK, IPV6_FLOWLABEL_MASK, SCM_TS_OPT_ID, SO_PASSRIGHTS, SO_RCVPRIORITY constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_ppc64le.go
    • Added DM_MPATH_PROBE_PATHS, IPV6_FLOWINFO_MASK, IPV6_FLOWLABEL_MASK, SCM_TS_OPT_ID, SO_PASSRIGHTS, SO_RCVPRIORITY constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_riscv64.go
    • Added DM_MPATH_PROBE_PATHS, IPV6_FLOWINFO_MASK, IPV6_FLOWLABEL_MASK, SCM_TS_OPT_ID, SO_PASSRIGHTS, SO_RCVPRIORITY constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_s390x.go
    • Added DM_MPATH_PROBE_PATHS, IPV6_FLOWINFO_MASK, IPV6_FLOWLABEL_MASK, SCM_TS_OPT_ID, SO_PASSRIGHTS, SO_RCVPRIORITY constants.
  • vendor/golang.org/x/sys/unix/zerrors_linux_sparc64.go
    • Added DM_MPATH_PROBE_PATHS, IPV6_FLOWINFO_MASK, IPV6_FLOWLABEL_MASK, SCM_TS_OPT_ID, SO_PASSRIGHTS, SO_RCVPRIORITY constants.
  • vendor/golang.org/x/sys/unix/zsyscall_darwin_amd64.go
    • Added readv, preadv, writev, pwritev syscall wrappers.
  • vendor/golang.org/x/sys/unix/zsyscall_darwin_amd64.s
    • Added assembly stubs for readv, preadv, writev, pwritev.
  • vendor/golang.org/x/sys/unix/zsyscall_darwin_arm64.go
    • Added readv, preadv, writev, pwritev syscall wrappers.
  • vendor/golang.org/x/sys/unix/zsyscall_darwin_arm64.s
    • Added assembly stubs for readv, preadv, writev, pwritev.
  • vendor/golang.org/x/sys/unix/zsyscall_linux.go
    • Added setMemPolicy syscall wrapper.
  • vendor/golang.org/x/sys/unix/zsyscall_solaris_amd64.go
    • Updated Listen syscall linkname.
    • Added linknames for ucred functions.
  • vendor/golang.org/x/sys/unix/ztypes_linux.go
    • Updated Statx_t and FscryptAddKeyArg structs.
    • Added IfAddrlblmsg struct and related constants.
    • Updated various ETHTOOL and NL80211 constants.
    • Added RTM_NEWNVLAN and MPOL constants.
  • vendor/golang.org/x/sys/unix/ztypes_linux_386.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_amd64.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_arm.go
    • Updated Stat_t and Taskstats structs with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_arm64.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_loong64.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_mips.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_mips64.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_mips64le.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_mipsle.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_ppc.go
    • Updated Stat_t and Taskstats structs with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_ppc64.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_ppc64le.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_riscv64.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_s390x.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/unix/ztypes_linux_sparc64.go
    • Updated Taskstats struct with new delay fields.
  • vendor/golang.org/x/sys/windows/dll_windows.go
    • Updated comments for LoadDLL and NewLazyDLL to recommend NewLazySystemDLL for system DLLs.
    • Removed errString type.
  • vendor/golang.org/x/sys/windows/security_windows.go
    • Modified ToAbsolute method to handle SECURITY_DESCRIPTOR allocation and pointer verification more robustly.
  • vendor/golang.org/x/sys/windows/syscall_windows.go
    • Added GetNumberOfConsoleInputEvents and FlushConsoleInputBuffer syscalls.
    • Added WSADuplicateSocket syscall.
    • Added GetIpForwardEntry2, GetIpForwardTable2, FreeMibTable, NotifyRouteChange2 syscalls.
    • Added RawSockaddrInet struct.
    • Updated NTUnicodeString.Slice to correctly handle length.
    • Added various VK_ and console event constants.
  • vendor/golang.org/x/sys/windows/types_windows.go
    • Added O_FILE_FLAG_ constants.
    • Added IP_MTU_DISCOVER and IPV6_MTU_DISCOVER constants.
    • Added WSACMSGHDR, IN_PKTINFO, IN6_PKTINFO structs.
    • Added FileZeroDataInformation struct.
    • Added IpAddressPrefix, MibIpForwardRow2, MibIpForwardTable2 structs and related constants.
    • Added various VK_ and console event constants.
  • vendor/golang.org/x/term/term_windows.go
    • Removed windows.ENABLE_PROCESSED_OUTPUT from makeRaw to align with standard library behavior.
  • vendor/golang.org/x/term/terminal.go
    • Added History interface and historyAt, historyAdd methods.
    • Updated NewTerminal to use a default stRingBuffer for History.
    • Added keyLF constant.
    • Modified handleKey to handle keyLF.
    • Modified ReadPassword to disable AutoCompleteCallback.
    • Modified readLine to consume LF after CR and use historyAdd.
    • Updated stRingBuffer to implement History interface and changed NthPreviousEntry to At.
  • vendor/golang.org/x/text/language/parse.go
    • Changed CanonType.Parse to always return nil error if changed is true.
  • vendor/golang.org/x/text/unicode/bidi/core.go
    • Removed maxLevel function and replaced its usage with max.
  • vendor/modules.txt
    • Updated module versions and Go version requirements.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for GitHub and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

Copy link

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request updates golang.org/x/crypto and other related dependencies to address several security vulnerabilities. A key consequence of these updates is the required Go version bump from 1.18 to 1.24.0. I've added a comment on go.mod to highlight this significant change on a release branch, as it may impact your build process and release compatibility. The other changes are within the vendor directory and reflect the dependency updates.

)

go 1.18
go 1.24.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

high

This pull request updates the Go version from 1.18 to 1.24.0. This is a significant jump, especially for a release branch (release-0.32). While this is required by the updated dependencies, it could introduce breaking changes or require adjustments in the build and deployment pipeline. Please ensure that this version bump is intentional and compatible with the project's support policy for this release.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dco-signoff: yes Indicates the PR's author has DCO signed all their commits. release-note-none Denotes a PR that doesn't merit a release note.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants