-
Notifications
You must be signed in to change notification settings - Fork 21
chore(deps): bump github.com/go-resty/resty/v2 from 2.16.5 to 2.17.2 #77
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,11 +1,11 @@ | ||
| module github.com/lokalise/go-lokalise-api/v5 | ||
|
|
||
| require ( | ||
| github.com/go-resty/resty/v2 v2.16.5 | ||
| github.com/go-resty/resty/v2 v2.17.2 | ||
| github.com/google/go-querystring v1.1.0 | ||
| ) | ||
|
|
||
| require golang.org/x/net v0.39.0 // indirect | ||
| require golang.org/x/net v0.43.0 // indirect | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🧩 Analysis chain🏁 Script executed: #!/bin/bash
# Check if golang.org/x/net v0.43.0 exists and get version info
echo "Checking golang.org/x/net v0.43.0 on Go module proxy..."
curl -s "https://proxy.golang.org/golang.org/x/net/@v/v0.43.0.info" 2>&1 | head -50
echo -e "\n\n--- Checking recent versions ---"
curl -s "https://proxy.golang.org/golang.org/x/net/@latest" 2>&1 | head -20Repository: lokalise/go-lokalise-api Length of output: 539 🌐 Web query:
💡 Result:
Commonly-associated x/net CVEs that do not affect v0.43.0 (already fixed in earlier versions):
Upgrade golang.org/x/net to v0.45.0 or later to fix a DoS vulnerability. golang.org/x/net v0.43.0 contains CVE-2025-47911 (GO-2026-4440), which causes quadratic parsing complexity in 🤖 Prompt for AI Agents |
||
|
|
||
| go 1.23.0 | ||
|
|
||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,11 +1,11 @@ | ||
| github.com/go-resty/resty/v2 v2.16.5 h1:hBKqmWrr7uRc3euHVqmh1HTHcKn99Smr7o5spptdhTM= | ||
| github.com/go-resty/resty/v2 v2.16.5/go.mod h1:hkJtXbA2iKHzJheXYvQ8snQES5ZLGKMwQ07xAwp/fiA= | ||
| github.com/go-resty/resty/v2 v2.17.2 h1:FQW5oHYcIlkCNrMD2lloGScxcHJ0gkjshV3qcQAyHQk= | ||
| github.com/go-resty/resty/v2 v2.17.2/go.mod h1:kCKZ3wWmwJaNc7S29BRtUhJwy7iqmn+2mLtQrOyQlVA= | ||
| github.com/google/go-cmp v0.5.2 h1:X2ev0eStA3AbceY54o37/0PQ/UWqKEiiO2dKL5OPaFM= | ||
| github.com/google/go-cmp v0.5.2/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= | ||
| github.com/google/go-querystring v1.1.0 h1:AnCroh3fv4ZBgVIf1Iwtovgjaw/GiKJo8M8yD/fhyJ8= | ||
| github.com/google/go-querystring v1.1.0/go.mod h1:Kcdr2DB4koayq7X8pmAG4sNG59So17icRSOU623lUBU= | ||
| golang.org/x/net v0.39.0 h1:ZCu7HMWDxpXpaiKdhzIfaltL9Lp31x/3fCP11bc6/fY= | ||
| golang.org/x/net v0.39.0/go.mod h1:X7NRbYVEA+ewNkCNyJ513WmMdQ3BineSwVtN2zD/d+E= | ||
| golang.org/x/time v0.6.0 h1:eTDhh4ZXt5Qf0augr54TN6suAUudPcawVZeIAPU7D4U= | ||
| golang.org/x/time v0.6.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM= | ||
| golang.org/x/net v0.43.0 h1:lat02VYK2j4aLzMzecihNvTlJNQUq316m2Mr9rnM6YE= | ||
| golang.org/x/net v0.43.0/go.mod h1:vhO1fvI4dGsIjh73sWfUVjj3N7CA9WkKJNQm2svM6Jg= | ||
| golang.org/x/time v0.12.0 h1:ScB/8o8olJvc+CQPWrK3fPZNfh7qgwCrY0zJmoEQLSE= | ||
| golang.org/x/time v0.12.0/go.mod h1:CDIdPxbZBQxdj6cxyCIdrNogrJKMJ7pr37NYpMcMDSg= | ||
| golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🧩 Analysis chain
🌐 Web query:
github.com/go-resty/resty/v2 v2.17.2 security advisories vulnerabilities💡 Result:
For
github.com/go-resty/resty/v2v2.17.2, I only found one published direct security advisory for Resty:>= 2.10.0and< 2.11.0(Snyk also notes>= 2.10.0-rc.1and< 2.11.0). Patched in:2.11.0.Therefore, v2.17.2 is not in the affected range. [1][2][3]
Sources: [1] GHSA-xwh9-gc39-5298, [2] https://pkg.go.dev/vuln/GO-2023-2328, [3] https://security.snyk.io/package/golang/github.com%2Fgo-resty%2Fresty%2Fv2
🌐 Web query:
golang.org/x/net v0.43.0 security advisories vulnerabilities💡 Result:
For
golang.org/x/netv0.43.0, the Go vulnerability database reports these known vulnerabilities that still affect that version (i.e., fixed only in later releases):golang.org/x/net/htmlhtml.Parse*can enter an infinite parsing loop on certain inputs → DoS. Affected:< v0.45.0(so v0.43.0 is affected). Fix: upgrade to v0.45.0+. [1]golang.org/x/net/htmlhtml.Parse*can have quadratic parsing complexity on certain inputs → DoS. Affected:< v0.45.0(so v0.43.0 is affected). Fix: upgrade to v0.45.0+. [2]Notes (not affecting v0.43.0 because they were fixed earlier):
< v0.38.0. [3]< v0.33.0. [4]Sources: [1] [2] [3] [4]
🌐 Web query:
go-resty/resty v2.17.2 release notes changelog💡 Result:
go-resty/resty v2.17.2 — release notes / changelog
Release date: Feb 14, 2026. [1]
What changed
http.Request(i.e.,r.RawRequest.Header = r.Header.Clone()), preventing unintended header sharing/mutation. [2]Full changelog (compare)
v2.17.1...v2.17.2[1]Sources: GitHub release
v2.17.2[1], PR#1110diff (“header deepcopy fix”) [2].Update golang.org/x/net to v0.45.0 or later to address critical DoS vulnerabilities.
While resty v2.17.2 is safe (released Feb 14, 2026 with header handling fixes and no active security advisories), the indirect dependency update to golang.org/x/net v0.43.0 introduces two known DoS vulnerabilities:
html.Parse*functionshtml.Parse*functionsBoth vulnerabilities are fixed in golang.org/x/net v0.45.0 and later. Update the transitive dependency to v0.45.0+ to address these issues.
🤖 Prompt for AI Agents