Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update module google.golang.org/protobuf to v1.29.1 [SECURITY] #114

Merged
merged 1 commit into from
Mar 15, 2023

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Mar 14, 2023

Mend Renovate

This PR contains the following updates:

Package Type Update Change
google.golang.org/protobuf require patch v1.29.0 -> v1.29.1

GitHub Vulnerability Alerts

CVE-2023-24535

Parsing invalid messages can panic.

Parsing a text-format message which contains a potential number consisting of a minus sign, one or more characters of whitespace, and no further input will cause a panic.


Release Notes

protocolbuffers/protobuf-go

v1.29.1

Compare Source

Notable changes

Bug fixes

  • CL/475995: internal/encoding/text: fix parsing of incomplete numbers

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot requested a review from a team March 14, 2023 23:24
@renovate renovate bot requested a review from a team as a code owner March 14, 2023 23:24
@JAORMX JAORMX merged commit 7aace92 into main Mar 15, 2023
@JAORMX JAORMX deleted the renovate/go-google.golang.org/protobuf-vulnerability branch March 15, 2023 05:50
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant