Skip to content

chore(deps): bump golang.org/x/net from v0.40.0 to v0.45.0 [SECURITY]#65

Merged
lukidzi merged 1 commit intomainfrom
renovate/go-golang.org-x-net-vulnerability
Feb 13, 2026
Merged

chore(deps): bump golang.org/x/net from v0.40.0 to v0.45.0 [SECURITY]#65
lukidzi merged 1 commit intomainfrom
renovate/go-golang.org-x-net-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate bot commented Feb 9, 2026

This PR contains the following updates:

Package Change Age Confidence
golang.org/x/net v0.40.0v0.45.0 age confidence

Warning

Deprecated preset: Kong/public-shared-renovate:backend

Your config references a deprecated preset. To prevent disruption, this file now builds on the org default (Kong/public-shared-renovate) and layers a few backend-specific tweaks so behavior stays close to the historical backend configuration.

What's different from the default

  • Early Monday schedule windows (schedule:earlyMondays)
  • Automerge disabled for all updates (:automergeDisabled)
  • Renovate rate limiting disabled (:disableRateLimiting)
  • Standardized commit messages (semantic type chore and clear bump from → to subjects)

Recommended migration

Prefer switching to the default preset and applying only the bits you still need locally. Example configuration to replicate this preset's behavior on top of the default:

{
  "extends": [
    "Kong/public-shared-renovate",
    "schedule:earlyMondays",
    ":automergeDisabled",
    ":disableRateLimiting",
    ":semanticCommitTypeAll(chore)"
  ],
  "packageRules": [
    {
      "matchPackageNames": ["*"],
      "commitMessageAction": "bump",
      "commitMessageLowerCase": "never",
      "commitMessageTopic": "golang.org/x/net",
      "commitMessageExtra": "from v0.40.0 to v0.45.0"
    }
  ]
}

Timeline

This compatibility alias will be removed in January 2026. Please migrate to the default preset with local overrides before then.


Infinite parsing loop in golang.org/x/net

CVE-2025-58190 / GO-2026-4441

More information

Details

The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Quadratic parsing complexity in golang.org/x/net/html

CVE-2025-47911 / GHSA-w4gw-w5jq-g9jh / GO-2026-4440

More information

Details

The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added the dependencies label Feb 9, 2026
@renovate
Copy link
Copy Markdown
Contributor Author

renovate bot commented Feb 9, 2026

ℹ️ Artifact update notice

File name: hclbuilder/go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 6 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.23.4 -> 1.24.0
golang.org/x/crypto v0.39.0 -> v0.42.0
golang.org/x/mod v0.25.0 -> v0.27.0
golang.org/x/sync v0.15.0 -> v0.17.0
golang.org/x/sys v0.33.0 -> v0.36.0
golang.org/x/text v0.26.0 -> v0.29.0
golang.org/x/tools v0.33.0 -> v0.36.0
File name: tfbuilder/go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 6 additional dependencies were updated

Details:

Package Change
golang.org/x/crypto v0.39.0 -> v0.42.0
golang.org/x/mod v0.25.0 -> v0.27.0
golang.org/x/sync v0.15.0 -> v0.17.0
golang.org/x/sys v0.33.0 -> v0.36.0
golang.org/x/text v0.26.0 -> v0.29.0
golang.org/x/tools v0.33.0 -> v0.36.0

Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
@renovate renovate bot force-pushed the renovate/go-golang.org-x-net-vulnerability branch from 8c4784f to 815bbbf Compare February 12, 2026 13:00
@lukidzi lukidzi merged commit f7ab788 into main Feb 13, 2026
5 checks passed
@lukidzi lukidzi deleted the renovate/go-golang.org-x-net-vulnerability branch February 13, 2026 15:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant