Skip to content

chore(deps): [k8s-hybrid-neg-controller] Update module golang.org/x/net to v0.53.0 [SECURITY]#530

Open
renovate-bot wants to merge 1 commit intoGoogleCloudPlatform:mainfrom
renovate-bot:renovate/go-golang.org-x-net-vulnerability
Open

chore(deps): [k8s-hybrid-neg-controller] Update module golang.org/x/net to v0.53.0 [SECURITY]#530
renovate-bot wants to merge 1 commit intoGoogleCloudPlatform:mainfrom
renovate-bot:renovate/go-golang.org-x-net-vulnerability

Conversation

@renovate-bot
Copy link
Copy Markdown
Contributor

@renovate-bot renovate-bot commented May 8, 2026

This PR contains the following updates:

Package Change Age Confidence
golang.org/x/net v0.48.0v0.53.0 age confidence

Infinite loop in HTTP/2 transport when given bad SETTINGS_MAX_FRAME_SIZE in net/http/internal/http2 in golang.org/x/net

CVE-2026-33814 / GO-2026-4918

More information

Details

When processing HTTP/2 SETTINGS frames, transport will enter an infinite loop of writing CONTINUATION frames if it receives a SETTINGS_MAX_FRAME_SIZE with a value of 0.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@forking-renovate forking-renovate Bot added dependencies Pull requests that update a dependency file p0 labels May 8, 2026
@renovate-bot renovate-bot requested a review from a team as a code owner May 8, 2026 01:14
@forking-renovate
Copy link
Copy Markdown

ℹ️ Artifact update notice

File name: projects/k8s-hybrid-neg-controller/go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 5 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.24.0 -> 1.25.0
golang.org/x/sync v0.19.0 -> v0.20.0
golang.org/x/crypto v0.46.0 -> v0.50.0
golang.org/x/sys v0.39.0 -> v0.43.0
golang.org/x/term v0.38.0 -> v0.42.0
golang.org/x/text v0.32.0 -> v0.36.0

@renovate-bot renovate-bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch 4 times, most recently from 4a28821 to f460980 Compare May 8, 2026 17:09
@renovate-bot renovate-bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from f460980 to cfc9af2 Compare May 8, 2026 19:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file p0 SECURITY

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant