Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: bump the go_modules group with 6 updates #3153

Open
wants to merge 1 commit into
base: develop
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Nov 27, 2024

Bumps the go_modules group with 6 updates:

Package From To
google.golang.org/protobuf 1.32.0 1.33.0
github.com/golang-jwt/jwt/v4 4.5.0 4.5.1
github.com/mostynb/go-grpc-compression 1.2.2 1.2.3
github.com/opencontainers/runc 1.1.12 1.1.14
golang.org/x/net 0.20.0 0.24.0
github.com/rs/cors 1.10.1 1.11.0

Updates google.golang.org/protobuf from 1.32.0 to 1.33.0

Updates github.com/golang-jwt/jwt/v4 from 4.5.0 to 4.5.1

Release notes

Sourced from github.com/golang-jwt/jwt/v4's releases.

v4.5.1

Security

Unclear documentation of the error behavior in ParseWithClaims in <= 4.5.0 could lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by ParseWithClaims return both error codes. If users only check for the jwt.ErrTokenExpired using error.Is, they will ignore the embedded jwt.ErrTokenSignatureInvalid and thus potentially accept invalid tokens.

This issue was documented in GHSA-29wx-vh33-7x7r and fixed in this release.

Note: v5 was not affected by this issue. So upgrading to this release version is also recommended.

What's Changed

  • Back-ported error-handling logic in ParseWithClaims from v5 branch. This fixes GHSA-29wx-vh33-7x7r.

Full Changelog: golang-jwt/jwt@v4.5.0...v4.5.1

Commits

Updates github.com/mostynb/go-grpc-compression from 1.2.2 to 1.2.3

Release notes

Sourced from github.com/mostynb/go-grpc-compression's releases.

v1.2.3

This release contains an important security fix: Do not use zstd.Decoder.DecodeAll on untrusted data (#27)

This issue was uncovered during a security audit performed by 7ASecurity, facilitated by OSTIF, for the OpenTelemetry project.

https://opentelemetry.io/blog/2024/cve-2024-36129/ GHSA-c74f-6mfw-mm4v

Commits

Updates github.com/opencontainers/runc from 1.1.12 to 1.1.14

Release notes

Sourced from github.com/opencontainers/runc's releases.

runc v1.1.14 -- "年を取っていいことは、驚かなくなることね。"

This is the fourteenth patch release in the 1.1.z release branch of runc. It includes a fix for a low severity security issue (CVE-2024-45310) as well as some minor build-related fixes (including Go 1.23 support).

  • Fix CVE-2024-45310, a low-severity attack that allowed maliciously configured containers to create empty files and directories on the host.
  • Add support for Go 1.23. (#4360, #4372)
  • Revert "allow overriding VERSION value in Makefile" and add EXTRA_VERSION. (#4370, #4382)
  • rootfs: consolidate mountpoint creation logic. (#4359)

Static Linking Notices

The runc binary distributed with this release are statically linked with the following GNU LGPL-2.1 licensed libraries, with runc acting as a "work that uses the Library":

The versions of these libraries were not modified from their upstream versions, but in order to comply with the LGPL-2.1 (§6(a)), we have attached the complete source code for those libraries which (when combined with the attached runc source code) may be used to exercise your rights under the LGPL-2.1.

However we strongly suggest that you make use of your distribution's packages or download them from the authoritative upstream sources, especially since these libraries are related to the security of your containers.

Thanks to all of the contributors who made this release possible:

Signed-off-by: Aleksa Sarai [email protected]

Changelog

Sourced from github.com/opencontainers/runc's changelog.

[1.1.14] - 2024-09-03

年を取っていいことは、驚かなくなることね。

Security

  • Fix CVE-2024-45310, a low-severity attack that allowed maliciously configured containers to create empty files and directories on the host.

Added

Fixed

  • Revert "allow overriding VERSION value in Makefile" and add EXTRA_VERSION. (#4370, #4382)
  • rootfs: consolidate mountpoint creation logic. (#4359)

[1.1.13] - 2024-06-13

There is no certainty in the world. This is the only certainty I have.

Important Notes

  • If building with Go 1.22.x, make sure to use 1.22.4 or a later version. (see #4233 for more details)

Fixed

  • Support go 1.22.4+. (#4313)
  • runc list: fix race with runc delete. (#4231)
  • Fix set nofile rlimit error. (#4277, #4299)
  • libct/cg/fs: fix setting rt_period vs rt_runtime. (#4284)
  • Fix a debug msg for user ns in nsexec. (#4315)
  • script/*: fix gpg usage wrt keyboxd. (#4316)
  • CI fixes and misc backports. (#4241)
  • Fix codespell warnings. (#4300)

Changed

  • Silence security false positives from golang/net. (#4244)
  • libcontainer: allow containers to make apps think fips is enabled/disabled for testing. (#4257)
  • allow overriding VERSION value in Makefile. (#4270)
  • Vagrantfile.fedora: bump Fedora to 39. (#4261)
  • ci/cirrus: rm centos stream 8. (#4305, #4308)
Commits
  • 2c9f560 VERSION: release 1.1.14
  • a86c3d8 Merge commit from fork
  • f0b652e [1.1] rootfs: try to scope MkdirAll to stay inside the rootfs
  • 8781993 [1.1] rootfs: consolidate mountpoint creation logic
  • 6419fba Merge pull request #4382 from rata/Makefile-override-fixes
  • 0514204 Makefile: Add EXTRA_VERSION
  • 18cdc34 Revert "allow overriding VERSION value in Makefile"
  • f3f71a9 Merge pull request #4372 from kolyshkin/1.1-go123
  • 7f75aec [1.1] Add Go 1.23, drop 1.21
  • 931f463 Merge pull request #4361 from austinvazquez/backport-protobuf-updates-to-1.1
  • Additional commits viewable in compare view

Updates golang.org/x/net from 0.20.0 to 0.24.0

Commits
  • 7bbe320 go.mod: update golang.org/x dependencies
  • c48da13 http2: fix TestServerContinuationFlood flakes
  • 762b58d http2: fix tipos in comment
  • ba87210 http2: close connections when receiving too many headers
  • ebc8168 all: fix some typos
  • 3678185 http2: make TestCanonicalHeaderCacheGrowth faster
  • 448c44f http2: remove clientTester
  • c7877ac http2: convert the remaining clientTester tests to testClientConn
  • d8870b0 http2: use synthetic time in TestIdleConnTimeout
  • d73acff http2: only set up deadline when Server.IdleTimeout is positive
  • Additional commits viewable in compare view

Updates github.com/rs/cors from 1.10.1 to 1.11.0

Commits
  • 4c32059 Normalize allowed request headers and store them in a sorted set (fixes #170)...
  • 8d33ca4 Complete documentation; deprecate AllowOriginRequestFunc in favour of AllowOr...
  • af821ae Merge branch 'jub0bs-master'
  • 0bcf73f Update benchmark
  • eacc8e8 Fix skewed middleware benchmarks (#165)
  • 9297f15 Respect the documented precedence of options (#163)
  • 73f81b4 Fix readme benchmark rendering (#161)
  • See full diff in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps the go_modules group with 6 updates:

| Package | From | To |
| --- | --- | --- |
| google.golang.org/protobuf | `1.32.0` | `1.33.0` |
| [github.com/golang-jwt/jwt/v4](https://github.com/golang-jwt/jwt) | `4.5.0` | `4.5.1` |
| [github.com/mostynb/go-grpc-compression](https://github.com/mostynb/go-grpc-compression) | `1.2.2` | `1.2.3` |
| [github.com/opencontainers/runc](https://github.com/opencontainers/runc) | `1.1.12` | `1.1.14` |
| [golang.org/x/net](https://github.com/golang/net) | `0.20.0` | `0.24.0` |
| [github.com/rs/cors](https://github.com/rs/cors) | `1.10.1` | `1.11.0` |


Updates `google.golang.org/protobuf` from 1.32.0 to 1.33.0

Updates `github.com/golang-jwt/jwt/v4` from 4.5.0 to 4.5.1
- [Release notes](https://github.com/golang-jwt/jwt/releases)
- [Changelog](https://github.com/golang-jwt/jwt/blob/main/VERSION_HISTORY.md)
- [Commits](golang-jwt/jwt@v4.5.0...v4.5.1)

Updates `github.com/mostynb/go-grpc-compression` from 1.2.2 to 1.2.3
- [Release notes](https://github.com/mostynb/go-grpc-compression/releases)
- [Commits](mostynb/go-grpc-compression@v1.2.2...v1.2.3)

Updates `github.com/opencontainers/runc` from 1.1.12 to 1.1.14
- [Release notes](https://github.com/opencontainers/runc/releases)
- [Changelog](https://github.com/opencontainers/runc/blob/main/CHANGELOG.md)
- [Commits](opencontainers/runc@v1.1.12...v1.1.14)

Updates `golang.org/x/net` from 0.20.0 to 0.24.0
- [Commits](golang/net@v0.20.0...v0.24.0)

Updates `github.com/rs/cors` from 1.10.1 to 1.11.0
- [Commits](rs/cors@v1.10.1...v1.11.0)

---
updated-dependencies:
- dependency-name: google.golang.org/protobuf
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: github.com/golang-jwt/jwt/v4
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: github.com/mostynb/go-grpc-compression
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: github.com/opencontainers/runc
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: golang.org/x/net
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: github.com/rs/cors
  dependency-type: indirect
  dependency-group: go_modules
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Nov 27, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code golang
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants