-
Notifications
You must be signed in to change notification settings - Fork 48
Bump golang.org/x/crypto from 0.35.0 to 0.45.0 in /products-page-generator #128
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bump golang.org/x/crypto from 0.35.0 to 0.45.0 in /products-page-generator #128
Conversation
Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.35.0 to 0.45.0. - [Commits](golang/crypto@v0.35.0...v0.45.0) --- updated-dependencies: - dependency-name: golang.org/x/crypto dependency-version: 0.45.0 dependency-type: indirect ... Signed-off-by: dependabot[bot] <[email protected]>
✅ Deploy Preview for oci-conformance ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
sudo-bmitch
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The project is not currently vulnerable, but previous updates (probably dependabot) have broken the go.mod with a go 1.22.6 version that needs to be bumped because of the updated dependencies. So I'll approve to get that sorted.
Here's the current main branch after a go mod tidy:
$ govulncheck -show verbose .
Fetching vulnerabilities from the database...
Checking the code against the vulnerabilities...
The package pattern matched the following root package:
github.com/opencontainers/oci-conformance/products-page-generator
Govulncheck scanned the following 12 modules and the go1.25.4 standard library:
github.com/opencontainers/oci-conformance/products-page-generator
github.com/Masterminds/[email protected]
github.com/Masterminds/[email protected]
github.com/Masterminds/[email protected]+incompatible
github.com/google/[email protected]
github.com/huandu/[email protected]
github.com/imdario/[email protected]
github.com/joshdk/[email protected]
github.com/mitchellh/[email protected]
github.com/mitchellh/[email protected]
golang.org/x/[email protected]
gopkg.in/[email protected]
=== Symbol Results ===
No vulnerabilities found.
=== Package Results ===
No other vulnerabilities found.
=== Module Results ===
Vulnerability #1: GO-2025-4135
CVE-2025-47914 in golang.org/x/crypto/ssh/agent
More info: https://pkg.go.dev/vuln/GO-2025-4135
Module: golang.org/x/crypto
Found in: golang.org/x/[email protected]
Fixed in: N/A
Vulnerability #2: GO-2025-4134
CVE-2025-58181 in golang.org/x/crypto/ssh
More info: https://pkg.go.dev/vuln/GO-2025-4134
Module: golang.org/x/crypto
Found in: golang.org/x/[email protected]
Fixed in: N/A
Vulnerability #3: GO-2025-4116
Potential denial of service in golang.org/x/crypto/ssh/agent
More info: https://pkg.go.dev/vuln/GO-2025-4116
Module: golang.org/x/crypto
Found in: golang.org/x/[email protected]
Fixed in: golang.org/x/[email protected]
Your code is affected by 0 vulnerabilities.
This scan also found 0 vulnerabilities in packages you import and 3
vulnerabilities in modules you require, but your code doesn't appear to call
these vulnerabilities.
And after applying this PR:
$ govulncheck -show verbose .
Fetching vulnerabilities from the database...
Checking the code against the vulnerabilities...
The package pattern matched the following root package:
github.com/opencontainers/oci-conformance/products-page-generator
Govulncheck scanned the following 12 modules and the go1.25.4 standard library:
github.com/opencontainers/oci-conformance/products-page-generator
github.com/Masterminds/[email protected]
github.com/Masterminds/[email protected]
github.com/Masterminds/[email protected]+incompatible
github.com/google/[email protected]
github.com/huandu/[email protected]
github.com/imdario/[email protected]
github.com/joshdk/[email protected]
github.com/mitchellh/[email protected]
github.com/mitchellh/[email protected]
golang.org/x/[email protected]
gopkg.in/[email protected]
=== Symbol Results ===
No vulnerabilities found.
=== Package Results ===
No other vulnerabilities found.
=== Module Results ===
Vulnerability #1: GO-2025-4135
CVE-2025-47914 in golang.org/x/crypto/ssh/agent
More info: https://pkg.go.dev/vuln/GO-2025-4135
Module: golang.org/x/crypto
Found in: golang.org/x/[email protected]
Fixed in: N/A
Vulnerability #2: GO-2025-4134
CVE-2025-58181 in golang.org/x/crypto/ssh
More info: https://pkg.go.dev/vuln/GO-2025-4134
Module: golang.org/x/crypto
Found in: golang.org/x/[email protected]
Fixed in: N/A
Your code is affected by 0 vulnerabilities.
This scan also found 0 vulnerabilities in packages you import and 2
vulnerabilities in modules you require, but your code doesn't appear to call
these vulnerabilities.
Bumps golang.org/x/crypto from 0.35.0 to 0.45.0.
Commits
4e0068cgo.mod: update golang.org/x dependenciese79546essh: curb GSSAPI DoS risk by limiting number of specified OIDsf91f7a7ssh/agent: prevent panic on malformed constraint2df4153acme/autocert: let automatic renewal work with short lifetime certsbcf6a84acme: pass context to requestb4f2b62ssh: fix error message on unsupported cipher79ec3a5ssh: allow to bind to a hostname in remote forwarding122a78fgo.mod: update golang.org/x dependenciesc0531f9all: eliminate vet diagnostics0997000all: fix some commentsDependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)You can disable automated security fix PRs for this repo from the Security Alerts page.