Skip to content

fix(deps): update module golang.org/x/text to v0.3.8 [security]#23

Open
renovate[bot] wants to merge 1 commit intotidbcloud/masterfrom
renovate/go-golang.org-x-text-vulnerability
Open

fix(deps): update module golang.org/x/text to v0.3.8 [security]#23
renovate[bot] wants to merge 1 commit intotidbcloud/masterfrom
renovate/go-golang.org-x-text-vulnerability

Conversation

@renovate
Copy link
Copy Markdown

@renovate renovate bot commented Aug 8, 2024

This PR contains the following updates:

Package Change Age Confidence
golang.org/x/text v0.3.3v0.3.8 age confidence

GitHub Vulnerability Alerts

CVE-2022-32149

The BCP 47 tag parser has quadratic time complexity due to inherent aspects of its design. Since the parser is, by design, exposed to untrusted user input, this can be leveraged to force a program to consume significant time parsing Accept-Language headers. The parser cannot be easily rewritten to fix this behavior for various reasons. Instead the solution implemented in this CL is to limit the total complexity of tags passed into ParseAcceptLanguage by limiting the number of dashes in the string to 1000. This should be more than enough for the majority of real world use cases, where the number of tags being sent is likely to be in the single digits.

Specific Go Packages Affected

golang.org/x/text/language

CVE-2021-38561

golang.org/x/text/language in golang.org/x/text before 0.3.7 can panic with an out-of-bounds read during BCP 47 language tag parsing. Index calculation is mishandled. If parsing untrusted user input, this can be used as a vector for a denial-of-service attack.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate
Copy link
Copy Markdown
Author

renovate bot commented Aug 8, 2024

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 4 additional dependencies were updated

Details:

Package Change
golang.org/x/crypto v0.0.0-20200820211705-5c72a883971a -> v0.0.0-20210921155107-089bfa567519
golang.org/x/net v0.0.0-20200904194848-62affa334b73 -> v0.0.0-20210226172049-e18ecbb05110
golang.org/x/sys v0.0.0-20220319134239-a9b59b0215f8 -> v0.0.0-20220722155257-8c9f86f7a55f
golang.org/x/tools v0.0.0-20200904185747-39188db58858 -> v0.1.12

@renovate
Copy link
Copy Markdown
Author

renovate bot commented Mar 1, 2026

ℹ️ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 4 additional dependencies were updated

Details:

Package Change
golang.org/x/crypto v0.0.0-20200820211705-5c72a883971a -> v0.0.0-20210921155107-089bfa567519
golang.org/x/net v0.0.0-20200904194848-62affa334b73 -> v0.0.0-20210226172049-e18ecbb05110
golang.org/x/sys v0.0.0-20220319134239-a9b59b0215f8 -> v0.0.0-20220722155257-8c9f86f7a55f
golang.org/x/tools v0.0.0-20200904185747-39188db58858 -> v0.1.12

@ti-chi-bot ti-chi-bot bot added the size/M label Mar 1, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants