Skip to content

fix(deps): Update module golang.org/x/net to v0.7.0 [SECURITY]#692

Merged
kodiakhq[bot] merged 1 commit intomainfrom
renovate/go-golang.org/x/net-vulnerability
Feb 18, 2023
Merged

fix(deps): Update module golang.org/x/net to v0.7.0 [SECURITY]#692
kodiakhq[bot] merged 1 commit intomainfrom
renovate/go-golang.org/x/net-vulnerability

Conversation

@cq-bot
Copy link
Copy Markdown
Contributor

@cq-bot cq-bot commented Feb 18, 2023

This PR contains the following updates:

Package Type Update Change
golang.org/x/net require minor v0.6.0 -> v0.7.0

GitHub Vulnerability Alerts

CVE-2022-41723

A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.


Release Notes

golang/net

v0.7.0

Compare Source


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@github-actions github-actions Bot added the fix label Feb 18, 2023
@codecov-commenter
Copy link
Copy Markdown

Codecov Report

Base: 47.03% // Head: 47.03% // No change to project coverage 👍

Coverage data is based on head (8f777fc) compared to base (21a29c3).
Patch has no changes to coverable lines.

📣 This organization is not using Codecov’s GitHub App Integration. We recommend you install it so Codecov can continue to function properly for your repositories. Learn more

Additional details and impacted files
@@           Coverage Diff           @@
##             main     #692   +/-   ##
=======================================
  Coverage   47.03%   47.03%           
=======================================
  Files          70       70           
  Lines        6853     6853           
=======================================
  Hits         3223     3223           
  Misses       3179     3179           
  Partials      451      451           

Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here.

☔ View full report at Codecov.
📢 Do you have feedback about the report comment? Let us know in this issue.

@kodiakhq kodiakhq Bot merged commit 47566c9 into main Feb 18, 2023
@kodiakhq kodiakhq Bot deleted the renovate/go-golang.org/x/net-vulnerability branch February 18, 2023 05:21
@github-actions
Copy link
Copy Markdown

⏱️ Benchmark results

  • DefaultConcurrencyDFS-2 resources/s: 10,715
  • DefaultConcurrencyRoundRobin-2 resources/s: 12,251
  • Glob-2 ns/op: 194.7
  • TablesWithChildrenDFS-2 resources/s: 31,292
  • TablesWithChildrenRoundRobin-2 resources/s: 29,929
  • TablesWithRateLimitingDFS-2 resources/s: 28.61
  • TablesWithRateLimitingRoundRobin-2 resources/s: 824.8
  • BufferedScanner-2 ns/op: 9.372
  • LogReader-2 ns/op: 31.05

kodiakhq Bot pushed a commit that referenced this pull request Feb 19, 2023
🤖 I have created a release *beep* *boop*
---


## [1.38.1](v1.38.0...v1.38.1) (2023-02-18)


### Bug Fixes

* **deps:** Update module golang.org/x/net to v0.7.0 [SECURITY] ([#692](#692)) ([47566c9](47566c9))

---
This PR was generated with [Release Please](https://github.com/googleapis/release-please). See [documentation](https://github.com/googleapis/release-please#release-please).
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants