Skip to content

chore(deps): update module golang.org/x/net to v0.53.0 [security]#568

Merged
tolzhabayev merged 1 commit intomainfrom
renovate/go-golang.org-x-net-vulnerability
May 8, 2026
Merged

chore(deps): update module golang.org/x/net to v0.53.0 [security]#568
tolzhabayev merged 1 commit intomainfrom
renovate/go-golang.org-x-net-vulnerability

Conversation

@renovate-sh-app
Copy link
Copy Markdown
Contributor

@renovate-sh-app renovate-sh-app Bot commented May 8, 2026

This PR contains the following updates:

Package Change Age Confidence
golang.org/x/net v0.49.0v0.53.0 age confidence

Warning

Some dependencies could not be looked up. Check the warning logs for more information.


Infinite loop in HTTP/2 transport when given bad SETTINGS_MAX_FRAME_SIZE in net/http/internal/http2 in golang.org/x/net

CVE-2026-33814 / GO-2026-4918

More information

Details

When processing HTTP/2 SETTINGS frames, transport will enter an infinite loop of writing CONTINUATION frames if it receives a SETTINGS_MAX_FRAME_SIZE with a value of 0.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Enabled.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

Need help?

You can ask for more help in the following Slack channel: #proj-renovate-self-hosted. In that channel you can also find ADR and FAQ docs in the Resources section.

@renovate-sh-app
Copy link
Copy Markdown
Contributor Author

ℹ️ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 7 additional dependencies were updated

Details:

Package Change
golang.org/x/crypto v0.47.0 -> v0.50.0
golang.org/x/mod v0.32.0 -> v0.34.0
golang.org/x/sync v0.19.0 -> v0.20.0
golang.org/x/sys v0.40.0 -> v0.43.0
golang.org/x/telemetry v0.0.0-20260109210033-bd525da824e2 -> v0.0.0-20260311193753-579e4da9a98c
golang.org/x/text v0.33.0 -> v0.36.0
golang.org/x/tools v0.41.0 -> v0.43.0

@renovate-sh-app renovate-sh-app Bot requested review from s4kh and sunker May 8, 2026 02:03
@grafana-plugins-platform-bot grafana-plugins-platform-bot Bot moved this from 📬 Triage to 🔬 In review in Grafana Catalog Team May 8, 2026
@renovate-sh-app
Copy link
Copy Markdown
Contributor Author

Rebase requested. Renovate is processing this repository now.

| datasource | package          | from    | to      |
| ---------- | ---------------- | ------- | ------- |
| go         | golang.org/x/net | v0.49.0 | v0.53.0 |


Signed-off-by: renovate-sh-app[bot] <219655108+renovate-sh-app[bot]@users.noreply.github.com>
@renovate-sh-app renovate-sh-app Bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 17ec291 to 4953eb2 Compare May 8, 2026 08:42
@tolzhabayev tolzhabayev merged commit 6a1440f into main May 8, 2026
11 checks passed
@tolzhabayev tolzhabayev deleted the renovate/go-golang.org-x-net-vulnerability branch May 8, 2026 08:53
@github-project-automation github-project-automation Bot moved this from 🔬 In review to 🚀 Shipped in Grafana Catalog Team May 8, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

Status: 🚀 Shipped

Development

Successfully merging this pull request may close these issues.

1 participant