Skip to content

chore(deps): update module golang.org/x/net to v0.38.0 [security] (v1.2) #3802

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed

Conversation

cilium-renovate[bot]
Copy link
Contributor

@cilium-renovate cilium-renovate bot commented Jun 4, 2025

This PR contains the following updates:

Package Type Update Change
golang.org/x/net indirect minor v0.33.0 -> v0.38.0

HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net

CVE-2025-22870 / GHSA-qxp5-gwg8-xv66 / GO-2025-3503

More information

Details

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

Severity

  • CVSS Score: 4.4 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net

CVE-2025-22870 / GHSA-qxp5-gwg8-xv66 / GO-2025-3503

More information

Details

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net

CVE-2025-22872 / GHSA-vvgc-356p-c3xw / GO-2025-3595

More information

Details

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


golang.org/x/net vulnerable to Cross-site Scripting

CVE-2025-22872 / GHSA-vvgc-356p-c3xw / GO-2025-3595

More information

Details

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).

Severity

  • CVSS Score: Unknown
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@cilium-renovate cilium-renovate bot added release-blocker This PR or issue is blocking the next release. release-note/dependency This PR updates one or multiple dependencies labels Jun 4, 2025
@cilium-renovate cilium-renovate bot requested a review from a team as a code owner June 4, 2025 06:24
@cilium-renovate cilium-renovate bot added the release-blocker This PR or issue is blocking the next release. label Jun 4, 2025
@cilium-renovate
Copy link
Contributor Author

cilium-renovate bot commented Jun 4, 2025

⚠️ Artifact update problem

Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.

♻ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you click the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: undefined
Command failed: make crds
go: downloading golang.org/x/oauth2 v0.20.0
panic: interface conversion: types.Type is *types.Alias, not *types.Named

goroutine 1 [running]:
sigs.k8s.io/controller-tools/pkg/crd.localNamedToSchema(0xc0011651a0, 0xc000887c80)
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:243 +0x545
sigs.k8s.io/controller-tools/pkg/crd.mapToSchema(0xc00129acf0, 0xc000714570)
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:320 +0x44f
sigs.k8s.io/controller-tools/pkg/crd.typeToSchema(0xc00129acf0, {0xe195e0, 0xc000714570})
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:177 +0x72
sigs.k8s.io/controller-tools/pkg/crd.structToSchema(0xc001165670, 0xc00086d560)
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:418 +0x8c5
sigs.k8s.io/controller-tools/pkg/crd.typeToSchema(0xc001165670, {0xe194f0, 0xc00086d560})
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:181 +0x93
sigs.k8s.io/controller-tools/pkg/crd.infoToSchema(0xc001165670)
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:124 +0xc5
sigs.k8s.io/controller-tools/pkg/crd.(*Parser).NeedSchemaFor(0xc00008c840, {0xc000887260, {0xc000880450, 0xd}})
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/parser.go:193 +0x290
sigs.k8s.io/controller-tools/pkg/crd.(*schemaContext).requestSchema(0xc001118150?, {0xc000301980?, 0xcdc20c?}, {0xc000880450?, 0xd?})
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:107 +0xdb
sigs.k8s.io/controller-tools/pkg/crd.namedToSchema(0xc001118150, 0xc00078e7e0)
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:266 +0x206
sigs.k8s.io/controller-tools/pkg/crd.typeToSchema(0xc001118150, {0xe19550, 0xc00078e7e0})
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:173 +0xf6
sigs.k8s.io/controller-tools/pkg/crd.typeToSchema(0xc001118150, {0xe195b0, 0xc00078e7f8})
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:179 +0xb9
sigs.k8s.io/controller-tools/pkg/crd.structToSchema(0xc001165ed0, 0xc00078e9a8)
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:418 +0x8c5
sigs.k8s.io/controller-tools/pkg/crd.typeToSchema(0xc001165ed0, {0xe194f0, 0xc00078e9a8})
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:181 +0x93
sigs.k8s.io/controller-tools/pkg/crd.infoToSchema(0xc001165ed0)
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:124 +0xc5
sigs.k8s.io/controller-tools/pkg/crd.(*Parser).NeedSchemaFor(0xc00008c840, {0xc000238c00, {0xc00079a198, 0x11}})
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/parser.go:193 +0x290
sigs.k8s.io/controller-tools/pkg/crd.(*schemaContext).requestSchema(0xc000301a40?, {0x0?, 0xcdc20c?}, {0xc00079a198?, 0x0?})
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:107 +0xdb
sigs.k8s.io/controller-tools/pkg/crd.localNamedToSchema(0xc0010947b0, 0xc00004ad60)
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:249 +0x18c
sigs.k8s.io/controller-tools/pkg/crd.typeToSchema(0xc0010947b0, {0xe19520, 0xc00004ad60})
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:171 +0xd9
sigs.k8s.io/controller-tools/pkg/crd.structToSchema(0xc0011666f8, 0xc00078e3c0)
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:418 +0x8c5
sigs.k8s.io/controller-tools/pkg/crd.typeToSchema(0xc0011666f8, {0xe194f0, 0xc00078e3c0})
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:181 +0x93
sigs.k8s.io/controller-tools/pkg/crd.infoToSchema(0xc0011666f8)
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/schema.go:124 +0xc5
sigs.k8s.io/controller-tools/pkg/crd.(*Parser).NeedSchemaFor(0xc00008c840, {0xc000238c00, {0xc00079a0d8, 0x17}})
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/parser.go:193 +0x290
sigs.k8s.io/controller-tools/pkg/crd.(*Parser).NeedFlattenedSchemaFor(0xc00008c840, {0xc000238c00, {0xc00079a0d8, 0x17}})
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/parser.go:205 +0xcd
sigs.k8s.io/controller-tools/pkg/crd.(*Parser).NeedCRDFor(0xc00008c840, {{0xc0005d400e, 0x9}, {0xc00079a0d8, 0x17}}, 0x0)
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/spec.go:85 +0x55a
sigs.k8s.io/controller-tools/pkg/crd.Generator.Generate({0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, 0x0}, 0xc00023e4b0)
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/crd/gen.go:124 +0x2d1
sigs.k8s.io/controller-tools/pkg/genall.(*Runtime).Run(0xc00015c240)
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/pkg/genall/genall.go:213 +0x234
main.main.func1(0xc000218300?, {0xc000253200?, 0x4?, 0xcda356?})
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/cmd/controller-gen/main.go:176 +0x6a
github.com/spf13/cobra.(*Command).execute(0xc000226c08, {0xc000132090, 0x3, 0x3})
	/src/pkg/k8s/vendor/github.com/spf13/cobra/command.go:983 +0xaaa
github.com/spf13/cobra.(*Command).ExecuteC(0xc000226c08)
	/src/pkg/k8s/vendor/github.com/spf13/cobra/command.go:1115 +0x3ff
github.com/spf13/cobra.(*Command).Execute(...)
	/src/pkg/k8s/vendor/github.com/spf13/cobra/command.go:1039
main.main()
	/src/pkg/k8s/vendor/sigs.k8s.io/controller-tools/cmd/controller-gen/main.go:200 +0x2f6
exit status 2
make: *** [Makefile:23: __do_generate] Error 1
make[1]: *** [Makefile:14: generate] Error 2
make: *** [Makefile:394: crds] Error 2

@cilium-renovate cilium-renovate bot requested review from tixxdz and removed request for a team June 4, 2025 06:24
@cilium-renovate cilium-renovate bot added the release-note/dependency This PR updates one or multiple dependencies label Jun 4, 2025
@cilium-renovate cilium-renovate bot force-pushed the renovate/v1.2-go-golang.org-x-net-vulnerability branch from 45de919 to 55aaac4 Compare June 5, 2025 19:12
Signed-off-by: cilium-renovate[bot] <134692979+cilium-renovate[bot]@users.noreply.github.com>
@cilium-renovate cilium-renovate bot force-pushed the renovate/v1.2-go-golang.org-x-net-vulnerability branch from 55aaac4 to d32ba15 Compare June 10, 2025 09:12
@mtardy
Copy link
Member

mtardy commented Jun 10, 2025

See #3801 (comment)

@mtardy mtardy closed this Jun 10, 2025
@cilium-renovate
Copy link
Contributor Author

Renovate Ignore Notification

Because you closed this PR without merging, Renovate will ignore this update (v0.38.0). You will get a PR once a newer version is released. To ignore this dependency forever, add it to the ignoreDeps array of your Renovate config.

If you accidentally closed this PR, or if you changed your mind: rename this PR to get a fresh replacement PR.

@cilium-renovate cilium-renovate bot deleted the renovate/v1.2-go-golang.org-x-net-vulnerability branch June 10, 2025 14:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
release-blocker This PR or issue is blocking the next release. release-note/dependency This PR updates one or multiple dependencies
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant