-
Notifications
You must be signed in to change notification settings - Fork 50
fix(deps): Update module golang.org/x/net to v0.38.0 [SECURITY] #287
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
i Artifact update noticeFile name: modules/project_cleanup/function_source/go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
April 16, 2025 19:44
6e87f11 to
a603b18
Compare
@renovate
renovate
bot
changed the title
(削除) fix(deps): Update module golang.org/x/net to v0.36.0 [SECURITY] (削除ここまで)
(追記) fix(deps): Update module golang.org/x/net to v0.38.0 [SECURITY] (追記ここまで)
Apr 16, 2025
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
August 10, 2025 14:43
a603b18 to
1e489e6
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
August 22, 2025 17:24
1e489e6 to
b38b97e
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
August 22, 2025 17:37
b38b97e to
1bc9eb5
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
September 11, 2025 01:43
1bc9eb5 to
88ce5fd
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
September 11, 2025 04:33
88ce5fd to
dcd09ce
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
September 11, 2025 10:51
dcd09ce to
2363bd7
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
September 11, 2025 13:33
2363bd7 to
ba45936
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
September 11, 2025 20:59
ba45936 to
4e79170
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
September 11, 2025 21:21
4e79170 to
0f1d308
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
September 11, 2025 22:03
0f1d308 to
32c3d81
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
September 11, 2025 22:22
32c3d81 to
38d2d0e
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
September 12, 2025 04:32
38d2d0e to
b38ee87
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
September 15, 2025 17:01
b38ee87 to
5a1aa13
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
September 15, 2025 20:12
5a1aa13 to
5efddf5
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
September 16, 2025 20:09
5efddf5 to
24b5950
Compare
/gcbrun
@renovate
renovate
bot
changed the title
(削除) fix(deps): Update module golang.org/x/net to v0.38.0 [SECURITY] (削除ここまで)
(追記) fix(deps): Update module golang.org/x/net to v0.38.0 [SECURITY] - autoclosed (追記ここまで)
Oct 2, 2025
@renovate
renovate
bot
deleted the
renovate/go-golang.org-x-net-vulnerability
branch
October 2, 2025 05:46
@renovate
renovate
bot
changed the title
(削除) fix(deps): Update module golang.org/x/net to v0.38.0 [SECURITY] - autoclosed (削除ここまで)
(追記) fix(deps): Update module golang.org/x/net to v0.38.0 [SECURITY] (追記ここまで)
Oct 2, 2025
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
October 2, 2025 08:34
dfab821 to
24b5950
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
October 9, 2025 09:38
24b5950 to
a69d3f2
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
October 28, 2025 16:38
a69d3f2 to
7d8d308
Compare
/gcbrun
@renovate
renovate
bot
force-pushed
the
renovate/go-golang.org-x-net-vulnerability
branch
from
October 28, 2025 18:24
7d8d308 to
be4f4bb
Compare
/gcbrun
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.
This PR contains the following updates:
v0.34.0->v0.38.0GitHub Vulnerability Alerts
CVE-2025-22870
Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.
CVE-2025-22872
The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.