Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

NO-ISSUE: Bump the go-security-dependencies group with 4 updates #932

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Mar 19, 2025

Bumps the go-security-dependencies group with 4 updates: github.com/containerd/containerd, github.com/golang-jwt/jwt/v4, github.com/golang/glog and golang.org/x/net.

Updates github.com/containerd/containerd from 1.7.12 to 1.7.27

Release notes

Sourced from github.com/containerd/containerd's releases.

containerd 1.7.27

Welcome to the v1.7.27 release of containerd!

The twenty-seventh patch release for containerd 1.7 contains various fixes and updates.

Highlights

  • Fix integer overflow in User ID handling (GHSA-265r-hfxg-fhmg)
  • Update image type checks to avoid unnecessary logs for attestations (#11538)

Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.

Contributors

  • Jin Dong
  • Akhil Mohan
  • Derek McGowan
  • Maksym Pavlenko
  • Paweł Gronowski
  • Phil Estes
  • Akihiro Suda
  • Craig Ingram
  • Krisztian Litkey
  • Samuel Karp

Changes

  • 05044ec0a Merge commit from fork
  • 11504c3fc validate uid/gid
  • Prepare release notes for v1.7.27 (#11540)
    • 1be04be6c Prepare release notes for v1.7.27
  • Update image type checks to avoid unnecessary logs for attestations (#11538)
    • 82b5c43fe core/remotes: Handle attestations in MakeRefKey
    • 2c670e79b core/images: Ignore attestations when traversing children
  • update build to go1.23.7, test go1.24.1 (#11515)
    • a39863c9f update build to go1.23.7, test go1.24.1
  • Remove hashicorp/go-multierror dependency and fix CI (#11499)
    • 49537b3a7 e2e: use the shim bundled with containerd artifact
    • fe490b76f Bump up github.com/intel/goresctrl to 0.5.0
    • 13fc9d313 update containerd/project-checks to 1.2.1
    • 585699c94 Remove unnecessary joinError unwrap
    • 4b9df59be Remove hashicorp/go-multierror
  • go.{mod,sum}: bump CDI deps to v0.8.1. (#11422)
    • 5ba28f8dc go.{mod,sum}: bump CDI deps to v0.8.1, re-vendor.
  • CI: arm64-8core-32gb -> ubuntu-24.04-arm (#11437)
    • 85f10bd92 CI: arm64-8core-32gb -> ubuntu-24.04-arm

... (truncated)

Commits
  • 05044ec Merge commit from fork
  • 0b7f2a5 Merge pull request #11540 from dmcgowan/prepare-1.7.27
  • 574a304 Merge pull request #11538 from dmcgowan/backport-11327
  • 1be04be Prepare release notes for v1.7.27
  • 82b5c43 core/remotes: Handle attestations in MakeRefKey
  • 2c670e7 core/images: Ignore attestations when traversing children
  • 11504c3 validate uid/gid
  • 576178b Merge pull request #11515 from akhilerm/1.7-updatego1.24.1
  • a39863c update build to go1.23.7, test go1.24.1
  • 8946aa0 Merge pull request #11499 from djdongjin/1-7-remove-hashi-multierror
  • Additional commits viewable in compare view

Updates github.com/golang-jwt/jwt/v4 from 4.5.0 to 4.5.1

Release notes

Sourced from github.com/golang-jwt/jwt/v4's releases.

v4.5.1

Security

Unclear documentation of the error behavior in ParseWithClaims in <= 4.5.0 could lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by ParseWithClaims return both error codes. If users only check for the jwt.ErrTokenExpired using error.Is, they will ignore the embedded jwt.ErrTokenSignatureInvalid and thus potentially accept invalid tokens.

This issue was documented in GHSA-29wx-vh33-7x7r and fixed in this release.

Note: v5 was not affected by this issue. So upgrading to this release version is also recommended.

What's Changed

  • Back-ported error-handling logic in ParseWithClaims from v5 branch. This fixes GHSA-29wx-vh33-7x7r.

Full Changelog: golang-jwt/jwt@v4.5.0...v4.5.1

Commits

Updates github.com/golang/glog from 1.2.0 to 1.2.4

Release notes

Sourced from github.com/golang/glog's releases.

v1.2.4

What's Changed

  • Fail if log file already exists by @​chressie in golang/glog#74:
    • glog: Don't try to create/rotate a given syncBuffer twice in the same second
    • glog: introduce createInDir function as in internal version
    • glog: have createInDir fail if the file already exists

Full Changelog: golang/glog@v1.2.3...v1.2.4

v1.2.3

What's Changed

Full Changelog: golang/glog@v1.2.2...v1.2.3

v1.2.2

What's Changed

Full Changelog: golang/glog@v1.2.1...v1.2.2

v1.2.1

What's Changed

Full Changelog: golang/glog@v1.2.0...v1.2.1

Commits
  • a0e3c40 glog: have createInDir fail if the file already exists
  • 7139da2 glog: introduce createInDir function as in internal version
  • dd58629 glog: Don't try to create/rotate a given syncBuffer twice in the same second
  • 04dbec0 glog: fix typo (#73)
  • 459cf3b glog: check that stderr is valid before using it by default (#72)
  • 9730314 glog: avoid calling user.Current() on windows (#69)
  • 861d094 glog: don't hold mutex when sync'ing (#68)
  • See full diff in compare view

Updates golang.org/x/net from 0.33.0 to 0.36.0

Commits
  • 85d1d54 go.mod: update golang.org/x dependencies
  • cde1dda proxy, http/httpproxy: do not mismatch IPv6 zone ids against hosts
  • fe7f039 publicsuffix: spruce up code gen and speed up PublicSuffix
  • 459513d internal/http3: move more common stream processing to genericConn
  • aad0180 http2: fix flakiness from t.Log when GOOS=js
  • b73e574 http2: don't log expected errors from writing invalid trailers
  • 5f45c77 internal/http3: make read-data tests usable for server handlers
  • 43c2540 http2, internal/httpcommon: reject userinfo in :authority
  • 1d78a08 http2, internal/httpcommon: factor out server header logic for h2/h3
  • 0d7dc54 quic: add Conn.ConnectionState
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

@dependabot dependabot bot added approved Indicates a PR has been approved by an approver from all required OWNERS files. dependabot go Pull requests that update Go code lgtm Indicates that a PR is ready to be merged. labels Mar 19, 2025
@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Mar 19, 2025
@openshift-ci-robot
Copy link

@dependabot[bot]: This pull request explicitly references no jira issue.

In response to this:

Bumps the go-security-dependencies group with 4 updates: github.com/containerd/containerd, github.com/golang-jwt/jwt/v4, github.com/golang/glog and golang.org/x/net.

Updates github.com/containerd/containerd from 1.7.12 to 1.7.27

Release notes

Sourced from github.com/containerd/containerd's releases.

containerd 1.7.27

Welcome to the v1.7.27 release of containerd!

The twenty-seventh patch release for containerd 1.7 contains various fixes and updates.

Highlights

  • Fix integer overflow in User ID handling (GHSA-265r-hfxg-fhmg)
  • Update image type checks to avoid unnecessary logs for attestations (#11538)

Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.

Contributors

  • Jin Dong
  • Akhil Mohan
  • Derek McGowan
  • Maksym Pavlenko
  • Paweł Gronowski
  • Phil Estes
  • Akihiro Suda
  • Craig Ingram
  • Krisztian Litkey
  • Samuel Karp

Changes

  • 05044ec0a Merge commit from fork
  • 11504c3fc validate uid/gid
  • Prepare release notes for v1.7.27 (#11540)
    • 1be04be6c Prepare release notes for v1.7.27
  • Update image type checks to avoid unnecessary logs for attestations (#11538)
    • 82b5c43fe core/remotes: Handle attestations in MakeRefKey
    • 2c670e79b core/images: Ignore attestations when traversing children
  • update build to go1.23.7, test go1.24.1 (#11515)
    • a39863c9f update build to go1.23.7, test go1.24.1
  • Remove hashicorp/go-multierror dependency and fix CI (#11499)
    • 49537b3a7 e2e: use the shim bundled with containerd artifact
    • fe490b76f Bump up github.com/intel/goresctrl to 0.5.0
    • 13fc9d313 update containerd/project-checks to 1.2.1
    • 585699c94 Remove unnecessary joinError unwrap
    • 4b9df59be Remove hashicorp/go-multierror
  • go.{mod,sum}: bump CDI deps to v0.8.1. (#11422)
    • 5ba28f8dc go.{mod,sum}: bump CDI deps to v0.8.1, re-vendor.
  • CI: arm64-8core-32gb -> ubuntu-24.04-arm (#11437)
    • 85f10bd92 CI: arm64-8core-32gb -> ubuntu-24.04-arm

... (truncated)

Commits
  • 05044ec Merge commit from fork
  • 0b7f2a5 Merge pull request #11540 from dmcgowan/prepare-1.7.27
  • 574a304 Merge pull request #11538 from dmcgowan/backport-11327
  • 1be04be Prepare release notes for v1.7.27
  • 82b5c43 core/remotes: Handle attestations in MakeRefKey
  • 2c670e7 core/images: Ignore attestations when traversing children
  • 11504c3 validate uid/gid
  • 576178b Merge pull request #11515 from akhilerm/1.7-updatego1.24.1
  • a39863c update build to go1.23.7, test go1.24.1
  • 8946aa0 Merge pull request #11499 from djdongjin/1-7-remove-hashi-multierror
  • Additional commits viewable in compare view

Updates github.com/golang-jwt/jwt/v4 from 4.5.0 to 4.5.1

Release notes

Sourced from github.com/golang-jwt/jwt/v4's releases.

v4.5.1

Security

Unclear documentation of the error behavior in ParseWithClaims in <= 4.5.0 could lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by ParseWithClaims return both error codes. If users only check for the jwt.ErrTokenExpired using error.Is, they will ignore the embedded jwt.ErrTokenSignatureInvalid and thus potentially accept invalid tokens.

This issue was documented in GHSA-29wx-vh33-7x7r and fixed in this release.

Note: v5 was not affected by this issue. So upgrading to this release version is also recommended.

What's Changed

  • Back-ported error-handling logic in ParseWithClaims from v5 branch. This fixes GHSA-29wx-vh33-7x7r.

Full Changelog: golang-jwt/jwt@v4.5.0...v4.5.1

Commits

Updates github.com/golang/glog from 1.2.0 to 1.2.4

Release notes

Sourced from github.com/golang/glog's releases.

v1.2.4

What's Changed

  • Fail if log file already exists by @​chressie in golang/glog#74:
    • glog: Don't try to create/rotate a given syncBuffer twice in the same second
    • glog: introduce createInDir function as in internal version
    • glog: have createInDir fail if the file already exists

Full Changelog: golang/glog@v1.2.3...v1.2.4

v1.2.3

What's Changed

Full Changelog: golang/glog@v1.2.2...v1.2.3

v1.2.2

What's Changed

Full Changelog: golang/glog@v1.2.1...v1.2.2

v1.2.1

What's Changed

Full Changelog: golang/glog@v1.2.0...v1.2.1

Commits
  • a0e3c40 glog: have createInDir fail if the file already exists
  • 7139da2 glog: introduce createInDir function as in internal version
  • dd58629 glog: Don't try to create/rotate a given syncBuffer twice in the same second
  • 04dbec0 glog: fix typo (#73)
  • 459cf3b glog: check that stderr is valid before using it by default (#72)
  • 9730314 glog: avoid calling user.Current() on windows (#69)
  • 861d094 glog: don't hold mutex when sync'ing (#68)
  • See full diff in compare view

Updates golang.org/x/net from 0.33.0 to 0.36.0

Commits
  • 85d1d54 go.mod: update golang.org/x dependencies
  • cde1dda proxy, http/httpproxy: do not mismatch IPv6 zone ids against hosts
  • fe7f039 publicsuffix: spruce up code gen and speed up PublicSuffix
  • 459513d internal/http3: move more common stream processing to genericConn
  • aad0180 http2: fix flakiness from t.Log when GOOS=js
  • b73e574 http2: don't log expected errors from writing invalid trailers
  • 5f45c77 internal/http3: make read-data tests usable for server handlers
  • 43c2540 http2, internal/httpcommon: reject userinfo in :authority
  • 1d78a08 http2, internal/httpcommon: factor out server header logic for h2/h3
  • 0d7dc54 quic: add Conn.ConnectionState
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci openshift-ci bot requested review from omertuc and ori-amizur March 19, 2025 15:34
@openshift-ci openshift-ci bot added the size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. label Mar 19, 2025
@openshift-ci-robot
Copy link

/retest-required

Remaining retests: 0 against base HEAD 466dff5 and 2 for PR HEAD e104448 in total

2 similar comments
@openshift-ci-robot
Copy link

/retest-required

Remaining retests: 0 against base HEAD 466dff5 and 2 for PR HEAD e104448 in total

@openshift-ci-robot
Copy link

/retest-required

Remaining retests: 0 against base HEAD 466dff5 and 2 for PR HEAD e104448 in total

@openshift-ci-robot
Copy link

@dependabot[bot]: This pull request explicitly references no jira issue.

In response to this:

⚠️ Dependabot is rebasing this PR ⚠️

Rebasing might not happen immediately, so don't worry if this takes some time.

Note: if you make any changes to this PR yourself, they will take precedence over the rebase.


Bumps the go-security-dependencies group with 4 updates: github.com/containerd/containerd, github.com/golang-jwt/jwt/v4, github.com/golang/glog and golang.org/x/net.

Updates github.com/containerd/containerd from 1.7.12 to 1.7.27

Release notes

Sourced from github.com/containerd/containerd's releases.

containerd 1.7.27

Welcome to the v1.7.27 release of containerd!

The twenty-seventh patch release for containerd 1.7 contains various fixes and updates.

Highlights

  • Fix integer overflow in User ID handling (GHSA-265r-hfxg-fhmg)
  • Update image type checks to avoid unnecessary logs for attestations (#11538)

Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.

Contributors

  • Jin Dong
  • Akhil Mohan
  • Derek McGowan
  • Maksym Pavlenko
  • Paweł Gronowski
  • Phil Estes
  • Akihiro Suda
  • Craig Ingram
  • Krisztian Litkey
  • Samuel Karp

Changes

  • 05044ec0a Merge commit from fork
  • 11504c3fc validate uid/gid
  • Prepare release notes for v1.7.27 (#11540)
    • 1be04be6c Prepare release notes for v1.7.27
  • Update image type checks to avoid unnecessary logs for attestations (#11538)
    • 82b5c43fe core/remotes: Handle attestations in MakeRefKey
    • 2c670e79b core/images: Ignore attestations when traversing children
  • update build to go1.23.7, test go1.24.1 (#11515)
    • a39863c9f update build to go1.23.7, test go1.24.1
  • Remove hashicorp/go-multierror dependency and fix CI (#11499)
    • 49537b3a7 e2e: use the shim bundled with containerd artifact
    • fe490b76f Bump up github.com/intel/goresctrl to 0.5.0
    • 13fc9d313 update containerd/project-checks to 1.2.1
    • 585699c94 Remove unnecessary joinError unwrap
    • 4b9df59be Remove hashicorp/go-multierror
  • go.{mod,sum}: bump CDI deps to v0.8.1. (#11422)
    • 5ba28f8dc go.{mod,sum}: bump CDI deps to v0.8.1, re-vendor.
  • CI: arm64-8core-32gb -> ubuntu-24.04-arm (#11437)
    • 85f10bd92 CI: arm64-8core-32gb -> ubuntu-24.04-arm

... (truncated)

Commits
  • 05044ec Merge commit from fork
  • 0b7f2a5 Merge pull request #11540 from dmcgowan/prepare-1.7.27
  • 574a304 Merge pull request #11538 from dmcgowan/backport-11327
  • 1be04be Prepare release notes for v1.7.27
  • 82b5c43 core/remotes: Handle attestations in MakeRefKey
  • 2c670e7 core/images: Ignore attestations when traversing children
  • 11504c3 validate uid/gid
  • 576178b Merge pull request #11515 from akhilerm/1.7-updatego1.24.1
  • a39863c update build to go1.23.7, test go1.24.1
  • 8946aa0 Merge pull request #11499 from djdongjin/1-7-remove-hashi-multierror
  • Additional commits viewable in compare view

Updates github.com/golang-jwt/jwt/v4 from 4.5.0 to 4.5.1

Release notes

Sourced from github.com/golang-jwt/jwt/v4's releases.

v4.5.1

Security

Unclear documentation of the error behavior in ParseWithClaims in <= 4.5.0 could lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by ParseWithClaims return both error codes. If users only check for the jwt.ErrTokenExpired using error.Is, they will ignore the embedded jwt.ErrTokenSignatureInvalid and thus potentially accept invalid tokens.

This issue was documented in GHSA-29wx-vh33-7x7r and fixed in this release.

Note: v5 was not affected by this issue. So upgrading to this release version is also recommended.

What's Changed

  • Back-ported error-handling logic in ParseWithClaims from v5 branch. This fixes GHSA-29wx-vh33-7x7r.

Full Changelog: golang-jwt/jwt@v4.5.0...v4.5.1

Commits

Updates github.com/golang/glog from 1.2.0 to 1.2.4

Release notes

Sourced from github.com/golang/glog's releases.

v1.2.4

What's Changed

  • Fail if log file already exists by @​chressie in golang/glog#74:
    • glog: Don't try to create/rotate a given syncBuffer twice in the same second
    • glog: introduce createInDir function as in internal version
    • glog: have createInDir fail if the file already exists

Full Changelog: golang/glog@v1.2.3...v1.2.4

v1.2.3

What's Changed

Full Changelog: golang/glog@v1.2.2...v1.2.3

v1.2.2

What's Changed

Full Changelog: golang/glog@v1.2.1...v1.2.2

v1.2.1

What's Changed

Full Changelog: golang/glog@v1.2.0...v1.2.1

Commits
  • a0e3c40 glog: have createInDir fail if the file already exists
  • 7139da2 glog: introduce createInDir function as in internal version
  • dd58629 glog: Don't try to create/rotate a given syncBuffer twice in the same second
  • 04dbec0 glog: fix typo (#73)
  • 459cf3b glog: check that stderr is valid before using it by default (#72)
  • 9730314 glog: avoid calling user.Current() on windows (#69)
  • 861d094 glog: don't hold mutex when sync'ing (#68)
  • See full diff in compare view

Updates golang.org/x/net from 0.33.0 to 0.36.0

Commits
  • 85d1d54 go.mod: update golang.org/x dependencies
  • cde1dda proxy, http/httpproxy: do not mismatch IPv6 zone ids against hosts
  • fe7f039 publicsuffix: spruce up code gen and speed up PublicSuffix
  • 459513d internal/http3: move more common stream processing to genericConn
  • aad0180 http2: fix flakiness from t.Log when GOOS=js
  • b73e574 http2: don't log expected errors from writing invalid trailers
  • 5f45c77 internal/http3: make read-data tests usable for server handlers
  • 43c2540 http2, internal/httpcommon: reject userinfo in :authority
  • 1d78a08 http2, internal/httpcommon: factor out server header logic for h2/h3
  • 0d7dc54 quic: add Conn.ConnectionState
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot
Copy link

/retest-required

Remaining retests: 0 against base HEAD 466dff5 and 2 for PR HEAD e104448 in total

1 similar comment
@openshift-ci-robot
Copy link

/retest-required

Remaining retests: 0 against base HEAD 466dff5 and 2 for PR HEAD e104448 in total

@openshift-ci-robot
Copy link

@dependabot[bot]: This pull request explicitly references no jira issue.

In response to this:

⚠️ Dependabot is rebasing this PR ⚠️

Rebasing might not happen immediately, so don't worry if this takes some time.

Note: if you make any changes to this PR yourself, they will take precedence over the rebase.


Bumps the go-security-dependencies group with 4 updates: github.com/containerd/containerd, github.com/golang-jwt/jwt/v4, github.com/golang/glog and golang.org/x/net.

Updates github.com/containerd/containerd from 1.7.12 to 1.7.27

Release notes

Sourced from github.com/containerd/containerd's releases.

containerd 1.7.27

Welcome to the v1.7.27 release of containerd!

The twenty-seventh patch release for containerd 1.7 contains various fixes and updates.

Highlights

  • Fix integer overflow in User ID handling (GHSA-265r-hfxg-fhmg)
  • Update image type checks to avoid unnecessary logs for attestations (#11538)

Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.

Contributors

  • Jin Dong
  • Akhil Mohan
  • Derek McGowan
  • Maksym Pavlenko
  • Paweł Gronowski
  • Phil Estes
  • Akihiro Suda
  • Craig Ingram
  • Krisztian Litkey
  • Samuel Karp

Changes

  • 05044ec0a Merge commit from fork
  • 11504c3fc validate uid/gid
  • Prepare release notes for v1.7.27 (#11540)
    • 1be04be6c Prepare release notes for v1.7.27
  • Update image type checks to avoid unnecessary logs for attestations (#11538)
    • 82b5c43fe core/remotes: Handle attestations in MakeRefKey
    • 2c670e79b core/images: Ignore attestations when traversing children
  • update build to go1.23.7, test go1.24.1 (#11515)
    • a39863c9f update build to go1.23.7, test go1.24.1
  • Remove hashicorp/go-multierror dependency and fix CI (#11499)
    • 49537b3a7 e2e: use the shim bundled with containerd artifact
    • fe490b76f Bump up github.com/intel/goresctrl to 0.5.0
    • 13fc9d313 update containerd/project-checks to 1.2.1
    • 585699c94 Remove unnecessary joinError unwrap
    • 4b9df59be Remove hashicorp/go-multierror
  • go.{mod,sum}: bump CDI deps to v0.8.1. (#11422)
    • 5ba28f8dc go.{mod,sum}: bump CDI deps to v0.8.1, re-vendor.
  • CI: arm64-8core-32gb -> ubuntu-24.04-arm (#11437)
    • 85f10bd92 CI: arm64-8core-32gb -> ubuntu-24.04-arm

... (truncated)

Commits
  • 05044ec Merge commit from fork
  • 0b7f2a5 Merge pull request #11540 from dmcgowan/prepare-1.7.27
  • 574a304 Merge pull request #11538 from dmcgowan/backport-11327
  • 1be04be Prepare release notes for v1.7.27
  • 82b5c43 core/remotes: Handle attestations in MakeRefKey
  • 2c670e7 core/images: Ignore attestations when traversing children
  • 11504c3 validate uid/gid
  • 576178b Merge pull request #11515 from akhilerm/1.7-updatego1.24.1
  • a39863c update build to go1.23.7, test go1.24.1
  • 8946aa0 Merge pull request #11499 from djdongjin/1-7-remove-hashi-multierror
  • Additional commits viewable in compare view

Updates github.com/golang-jwt/jwt/v4 from 4.5.0 to 4.5.1

Release notes

Sourced from github.com/golang-jwt/jwt/v4's releases.

v4.5.1

Security

Unclear documentation of the error behavior in ParseWithClaims in <= 4.5.0 could lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by ParseWithClaims return both error codes. If users only check for the jwt.ErrTokenExpired using error.Is, they will ignore the embedded jwt.ErrTokenSignatureInvalid and thus potentially accept invalid tokens.

This issue was documented in GHSA-29wx-vh33-7x7r and fixed in this release.

Note: v5 was not affected by this issue. So upgrading to this release version is also recommended.

What's Changed

  • Back-ported error-handling logic in ParseWithClaims from v5 branch. This fixes GHSA-29wx-vh33-7x7r.

Full Changelog: golang-jwt/jwt@v4.5.0...v4.5.1

Commits

Updates github.com/golang/glog from 1.2.0 to 1.2.4

Release notes

Sourced from github.com/golang/glog's releases.

v1.2.4

What's Changed

  • Fail if log file already exists by @​chressie in golang/glog#74:
    • glog: Don't try to create/rotate a given syncBuffer twice in the same second
    • glog: introduce createInDir function as in internal version
    • glog: have createInDir fail if the file already exists

Full Changelog: golang/glog@v1.2.3...v1.2.4

v1.2.3

What's Changed

Full Changelog: golang/glog@v1.2.2...v1.2.3

v1.2.2

What's Changed

Full Changelog: golang/glog@v1.2.1...v1.2.2

v1.2.1

What's Changed

Full Changelog: golang/glog@v1.2.0...v1.2.1

Commits
  • a0e3c40 glog: have createInDir fail if the file already exists
  • 7139da2 glog: introduce createInDir function as in internal version
  • dd58629 glog: Don't try to create/rotate a given syncBuffer twice in the same second
  • 04dbec0 glog: fix typo (#73)
  • 459cf3b glog: check that stderr is valid before using it by default (#72)
  • 9730314 glog: avoid calling user.Current() on windows (#69)
  • 861d094 glog: don't hold mutex when sync'ing (#68)
  • See full diff in compare view

Updates golang.org/x/net from 0.33.0 to 0.36.0

Commits
  • 85d1d54 go.mod: update golang.org/x dependencies
  • cde1dda proxy, http/httpproxy: do not mismatch IPv6 zone ids against hosts
  • fe7f039 publicsuffix: spruce up code gen and speed up PublicSuffix
  • 459513d internal/http3: move more common stream processing to genericConn
  • aad0180 http2: fix flakiness from t.Log when GOOS=js
  • b73e574 http2: don't log expected errors from writing invalid trailers
  • 5f45c77 internal/http3: make read-data tests usable for server handlers
  • 43c2540 http2, internal/httpcommon: reject userinfo in :authority
  • 1d78a08 http2, internal/httpcommon: factor out server header logic for h2/h3
  • 0d7dc54 quic: add Conn.ConnectionState
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@dependabot dependabot bot force-pushed the dependabot/go_modules/go-security-dependencies-784758e5a3 branch from e104448 to 6d77da3 Compare March 23, 2025 08:15
@openshift-ci openshift-ci bot removed the lgtm Indicates that a PR is ready to be merged. label Mar 23, 2025
Copy link

openshift-ci bot commented Mar 23, 2025

New changes are detected. LGTM label has been removed.

@dependabot dependabot bot force-pushed the dependabot/go_modules/go-security-dependencies-784758e5a3 branch from 6d77da3 to 2d6ccb4 Compare March 24, 2025 17:02
Copy link

openshift-ci bot commented Mar 24, 2025

[APPROVALNOTIFIER] This PR is APPROVED

Approval requirements bypassed by manually added approval.

This pull-request has been approved by: dependabot[bot]

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Bumps the go-security-dependencies group with 4 updates: [github.com/containerd/containerd](https://github.com/containerd/containerd), [github.com/golang-jwt/jwt/v4](https://github.com/golang-jwt/jwt), [github.com/golang/glog](https://github.com/golang/glog) and [golang.org/x/net](https://github.com/golang/net).


Updates `github.com/containerd/containerd` from 1.7.12 to 1.7.27
- [Release notes](https://github.com/containerd/containerd/releases)
- [Changelog](https://github.com/containerd/containerd/blob/main/RELEASES.md)
- [Commits](containerd/containerd@v1.7.12...v1.7.27)

Updates `github.com/golang-jwt/jwt/v4` from 4.5.0 to 4.5.1
- [Release notes](https://github.com/golang-jwt/jwt/releases)
- [Changelog](https://github.com/golang-jwt/jwt/blob/main/VERSION_HISTORY.md)
- [Commits](golang-jwt/jwt@v4.5.0...v4.5.1)

Updates `github.com/golang/glog` from 1.2.0 to 1.2.4
- [Release notes](https://github.com/golang/glog/releases)
- [Commits](golang/glog@v1.2.0...v1.2.4)

Updates `golang.org/x/net` from 0.33.0 to 0.36.0
- [Commits](golang/net@v0.33.0...v0.36.0)

---
updated-dependencies:
- dependency-name: github.com/containerd/containerd
  dependency-type: indirect
  dependency-group: go-security-dependencies
- dependency-name: github.com/golang-jwt/jwt/v4
  dependency-type: indirect
  dependency-group: go-security-dependencies
- dependency-name: github.com/golang/glog
  dependency-type: indirect
  dependency-group: go-security-dependencies
- dependency-name: golang.org/x/net
  dependency-type: indirect
  dependency-group: go-security-dependencies
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot force-pushed the dependabot/go_modules/go-security-dependencies-784758e5a3 branch from 2d6ccb4 to fee6e8b Compare March 26, 2025 16:56
Copy link

openshift-ci bot commented Mar 26, 2025

@dependabot[bot]: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/edge-e2e-ai-operator-ztp fee6e8b link true /test edge-e2e-ai-operator-ztp
ci/prow/edge-lint fee6e8b link true /test edge-lint
ci/prow/edge-subsystem-test fee6e8b link true /test edge-subsystem-test
ci/prow/mce-images fee6e8b link true /test mce-images
ci/prow/edge-e2e-metal-assisted-4-18 fee6e8b link true /test edge-e2e-metal-assisted-4-18
ci/prow/edge-images fee6e8b link true /test edge-images
ci/prow/edge-unit-test fee6e8b link true /test edge-unit-test

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. dependabot go Pull requests that update Go code jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant