-
Notifications
You must be signed in to change notification settings - Fork 182
Update module golang.org/x/net to v0.38.0 [SECURITY] #774
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #774 +/- ##
==========================================
- Coverage 79.87% 79.82% -0.06%
==========================================
Files 43 43
Lines 5651 5651
==========================================
- Hits 4514 4511 -3
- Misses 910 912 +2
- Partials 227 228 +1
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
a1a2bc1 to
a999dc5
Compare
a999dc5 to
044cfcd
Compare
c069b84 to
c328075
Compare
1e4fc09 to
6e50e7f
Compare
6e50e7f to
f2a1656
Compare
f2a1656 to
9b87fb8
Compare
9b87fb8 to
b7e7c46
Compare
db098d9 to
c7858a2
Compare
65a43a7 to
09fd14e
Compare
09fd14e to
f9659cd
Compare
Generated by renovateBot
f9659cd to
2904ae4
Compare
Renovate Ignore NotificationBecause you closed this PR without merging, Renovate will ignore this update ( If you accidentally closed this PR, or if you changed your mind: rename this PR to get a fresh replacement PR. |
This PR contains the following updates:
v0.34.0->v0.38.0GitHub Vulnerability Alerts
CVE-2025-22870
Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.
CVE-2025-22872
The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.