Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): update module golang.org/x/crypto to v0.35.0 [security] (main) #10801

Merged

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Mar 5, 2025

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
golang.org/x/crypto v0.32.0 -> v0.35.0 age adoption passing confidence

Potential denial of service in golang.org/x/crypto

CVE-2025-22869 / GO-2025-3487

More information

Details

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested review from stevesg and grafanabot as code owners March 5, 2025 07:03
@renovate renovate bot requested a review from a team as a code owner March 5, 2025 07:03
Copy link
Contributor Author

renovate bot commented Mar 5, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 4 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.23.6 -> 1.24.1
golang.org/x/sync v0.10.0 -> v0.11.0
golang.org/x/term v0.28.0 -> v0.29.0
golang.org/x/sys v0.29.0 -> v0.30.0
golang.org/x/text v0.21.0 -> v0.22.0

@aknuds1 aknuds1 enabled auto-merge (squash) March 5, 2025 07:22
@aknuds1 aknuds1 merged commit 76a49c1 into main Mar 5, 2025
29 checks passed
@aknuds1 aknuds1 deleted the deps-update/main-go-golang.org-x-crypto-vulnerability branch March 5, 2025 07:26
@@ -1,10 +1,10 @@
module github.com/grafana/mimir

go 1.22.11
go 1.23.0
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@aknuds1 do you know why renovate is doing that? I thought, we've locked the version in its config (code).

Copy link
Contributor

@aknuds1 aknuds1 Mar 5, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@narqo The version lock prevents Renovate from upgrading the Go version we use to build. Upgrading the minimum version of Go to v1.23 should be fine, since v1.24 is out. The minimum and toolchain versions in go.mod don't affect which version we build with (that's defined in the build image).

For the record, the minimum version upgrade here (and probably the toolchain version upgrade as well) is done by go mod tidy, since golang.org/x/crypto v0.35.0 should depend on Go v1.23.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants