chore(deps): update module golang.org/x/net to v0.45.0 [security] (release-1.20)#918
Open
crossplane-renovate[bot] wants to merge 1 commit intorelease-1.20from
Conversation
Contributor
Author
|
5aa1032 to
086230b
Compare
phisco
added a commit
to phisco/crossplane-runtime
that referenced
this pull request
Apr 17, 2026
…ports This unblocks the security dep bumps queued for release-1.20: * crossplane#918 - golang.org/x/net v0.45.0 (CVE-2025-47911, CVE-2025-58190; first patched version is v0.45.0 which declares `go 1.24.0` in its go.mod) * crossplane#971 - google.golang.org/grpc v1.79.3 (CVE-2026-33186; also declares `go 1.24.0`) Both deps require `go >= 1.24.0` so `go mod download` fails on this branch under the pinned `GOTOOLCHAIN=local` with Go 1.23.7. Bumping the `go` directive to `1.24.0` and the toolchain to the latest 1.24.x patch (1.24.13) is the minimum change needed to unblock the backports. Staying on the 1.24 line (not 1.25) deliberately avoids the golangci-lint v1 -> v2 migration and `x/tools v0.24.0` incompatibility that blocked the earlier 1.25 attempt (see crossplane#965). `go mod tidy`, `go build ./...`, and `go vet ./...` are all clean; no code changes are needed. Signed-off-by: Philippe Scorsolini <5697904+phisco@users.noreply.github.com>
5 tasks
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v0.38.0→v0.45.0Quadratic parsing complexity in golang.org/x/net/html
CVE-2025-47911 / GHSA-w4gw-w5jq-g9jh / GO-2026-4440
More information
Details
The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Infinite parsing loop in golang.org/x/net
CVE-2025-58190 / GO-2026-4441
More information
Details
The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.