Skip to content

fix(deps): update module golang.org/x/net to v0.45.0 [security] (master)#331

Closed
phisco-renovate[bot] wants to merge 2 commits into
masterfrom
renovate/master-go-golang.org-x-net-vulnerability
Closed

fix(deps): update module golang.org/x/net to v0.45.0 [security] (master)#331
phisco-renovate[bot] wants to merge 2 commits into
masterfrom
renovate/master-go-golang.org-x-net-vulnerability

Conversation

@phisco-renovate
Copy link
Copy Markdown

@phisco-renovate phisco-renovate Bot commented Dec 19, 2024

This PR contains the following updates:

Package Change Age Confidence
golang.org/x/net v0.23.0v0.45.0 age confidence

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net

CVE-2025-22870 / GHSA-qxp5-gwg8-xv66

More information

Details

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

Severity

  • CVSS Score: 4.4 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


golang.org/x/net vulnerable to Cross-site Scripting

CVE-2025-22872 / GHSA-vvgc-356p-c3xw

More information

Details

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Non-linear parsing of case-insensitive content in golang.org/x/net/html

CVE-2024-45338 / GHSA-w32m-9786-jp63 / GO-2024-3333

More information

Details

An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net

CVE-2025-22870 / GHSA-qxp5-gwg8-xv66 / GO-2025-3503

More information

Details

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

Severity

  • CVSS Score: 4.4 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net

CVE-2025-22870 / GHSA-qxp5-gwg8-xv66 / GO-2025-3503

More information

Details

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


golang.org/x/net vulnerable to Cross-site Scripting

CVE-2025-22872 / GHSA-vvgc-356p-c3xw / GO-2025-3595

More information

Details

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net

CVE-2025-22872 / GHSA-vvgc-356p-c3xw / GO-2025-3595

More information

Details

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Quadratic parsing complexity in golang.org/x/net/html

CVE-2025-47911 / GHSA-w4gw-w5jq-g9jh / GO-2026-4440

More information

Details

The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Infinite parsing loop in golang.org/x/net

CVE-2025-58190 / GO-2026-4441

More information

Details

The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate.

Signed-off-by: Philippe Scorsolini <p.scorsolini@gmail.com>
@phisco-renovate
Copy link
Copy Markdown
Author

phisco-renovate Bot commented Dec 19, 2024

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 7 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.21.6 -> 1.23.8
golang.org/x/sync v0.6.0 -> v0.12.0
golang.org/x/crypto v0.21.0 -> v0.36.0
golang.org/x/mod v0.14.0 -> v0.17.0
golang.org/x/sys v0.18.0 -> v0.31.0
golang.org/x/term v0.18.0 -> v0.30.0
golang.org/x/text v0.14.0 -> v0.23.0
golang.org/x/tools v0.17.0 -> v0.21.1-0.20240508182429-e35e4ccd0d2d

@phisco-renovate phisco-renovate Bot changed the title fix(deps): update module golang.org/x/net to v0.33.0 [security] (master) fix(deps): update module golang.org/x/net to v0.36.0 [security] (master) Mar 13, 2025
@phisco-renovate phisco-renovate Bot force-pushed the renovate/master-go-golang.org-x-net-vulnerability branch from 825cf9c to 4f1b78d Compare March 13, 2025 08:28
@phisco-renovate phisco-renovate Bot changed the title fix(deps): update module golang.org/x/net to v0.36.0 [security] (master) fix(deps): update module golang.org/x/net to v0.38.0 [security] (master) Apr 17, 2025
@phisco-renovate phisco-renovate Bot force-pushed the renovate/master-go-golang.org-x-net-vulnerability branch from 4f1b78d to 7ba0134 Compare April 17, 2025 08:30
@phisco-renovate phisco-renovate Bot force-pushed the renovate/master-go-golang.org-x-net-vulnerability branch from 7ba0134 to abd0d49 Compare February 6, 2026 08:48
@phisco-renovate phisco-renovate Bot changed the title fix(deps): update module golang.org/x/net to v0.38.0 [security] (master) fix(deps): update module golang.org/x/net to v0.45.0 [security] (master) Feb 6, 2026
@phisco-renovate
Copy link
Copy Markdown
Author

⚠️ Artifact update problem

Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.

♻ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you click the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: go.mod
Command failed: install-tool golang $(grep -oP ^toolchain go\K.+ go.mod)

@phisco-renovate phisco-renovate Bot force-pushed the renovate/master-go-golang.org-x-net-vulnerability branch from abd0d49 to e6c2504 Compare February 11, 2026 08:59
@phisco phisco force-pushed the master branch 2 times, most recently from 254ce78 to b104113 Compare May 6, 2026 11:58
@phisco phisco deleted the branch master May 6, 2026 12:01
@phisco phisco closed this May 6, 2026
@phisco phisco deleted the renovate/master-go-golang.org-x-net-vulnerability branch May 6, 2026 12:19
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant