Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update module google.golang.org/grpc to v1.64.1 [security] #2086

Merged

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jul 12, 2024

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
google.golang.org/grpc v1.64.0 -> v1.64.1 age adoption passing confidence

GitHub Vulnerability Alerts

GHSA-xr7q-jx4m-x55m

Impact

This issue represents a potential PII concern. If applications were printing or logging a context containing gRPC metadata, the affected versions will contain all the metadata, which may include private information.

Patches

The issue first appeared in 1.64.0 and is patched in 1.64.1 and 1.65.0

Workarounds

If using an affected version and upgrading is not possible, ensuring you do not log or print contexts will avoid the problem.


Release Notes

grpc/grpc-go (google.golang.org/grpc)

v1.64.1: Release 1.64.1

Compare Source

Dependencies


Configuration

📅 Schedule: Branch creation - "" in timezone UTC, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot added dependencies Pull requests that update a dependency file security labels Jul 12, 2024
Copy link
Contributor Author

renovate bot commented Jul 12, 2024

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 1 additional dependency was updated

Details:

Package Change
golang.org/x/net v0.25.0 -> v0.26.0

@rhatdan
Copy link
Member

rhatdan commented Jul 12, 2024

/approve
/lgtm

@openshift-ci openshift-ci bot added the lgtm label Jul 12, 2024
Copy link
Contributor

openshift-ci bot commented Jul 12, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: renovate[bot], rhatdan

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@renovate renovate bot force-pushed the renovate/go-google.golang.org/grpc-vulnerability branch from f50fd32 to 52906fc Compare July 12, 2024 09:23
@openshift-ci openshift-ci bot removed the lgtm label Jul 12, 2024
@rhatdan
Copy link
Member

rhatdan commented Jul 12, 2024

/lgtm

@openshift-ci openshift-ci bot added the lgtm label Jul 12, 2024
Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
@renovate renovate bot force-pushed the renovate/go-google.golang.org/grpc-vulnerability branch from 52906fc to ce63e4f Compare July 12, 2024 09:39
@openshift-ci openshift-ci bot removed the lgtm label Jul 12, 2024
@rhatdan
Copy link
Member

rhatdan commented Jul 12, 2024

/lgtm

@openshift-ci openshift-ci bot added the lgtm label Jul 12, 2024
@openshift-merge-bot openshift-merge-bot bot merged commit f45851c into main Jul 12, 2024
14 checks passed
@renovate renovate bot deleted the renovate/go-google.golang.org/grpc-vulnerability branch July 12, 2024 10:10
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved dependencies Pull requests that update a dependency file lgtm security
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants