Skip to content

VULN UPGRADE: major upgrades — 5 packages (unstable: 3 · minor: 2) [src/frontend]#33

Open
campaigner-prod[bot] wants to merge 1 commit intomainfrom
engraver-auto-version-upgrade/major/go/frontend/2-1770993595
Open

VULN UPGRADE: major upgrades — 5 packages (unstable: 3 · minor: 2) [src/frontend]#33
campaigner-prod[bot] wants to merge 1 commit intomainfrom
engraver-auto-version-upgrade/major/go/frontend/2-1770993595

Conversation

@campaigner-prod
Copy link

Summary: High-severity security update — 5 packages upgraded (MAJOR changes included)

Manifests changed:

  • src/frontend (go)

Updates

Package From To Type Vulnerabilities Fixed
golang.org/x/net v0.23.0 v0.49.0 major 2 HIGH, 6 MODERATE, 1 UNKNOWN
google.golang.org/grpc v1.58.2 v1.78.0 minor 2 HIGH
cloud.google.com/go/compute/metadata v0.2.3 v0.9.0 major -
cloud.google.com/go/profiler v0.3.1 v0.4.3 major -
github.com/google/uuid v1.5.0 v1.6.0 minor -

Packages marked with "-" are updated due to dependency constraints.


Warning

Major Version Upgrade

This update includes major version changes that may contain breaking changes. Please:

  • Review the changelog/release notes for breaking changes
  • Test thoroughly in a staging environment
  • Update any code that depends on changed APIs
  • Ensure all tests pass before merging

Security Details

🚨 Critical & High Severity (4 fixed)
Package CVE Severity Summary Unsafe Version Fixed In
golang.org/x/net GO-2024-3333 HIGH Non-linear parsing of case-insensitive content in golang.org/x/net/html v0.23.0 0.33.0
golang.org/x/net GHSA-w32m-9786-jp63 HIGH Non-linear parsing of case-insensitive content in golang.org/x/net/html v0.23.0 -
google.golang.org/grpc GO-2023-2153 HIGH Denial of service from HTTP/2 Rapid Reset in google.golang.org/grpc v1.58.2 1.56.3
google.golang.org/grpc GHSA-m425-mq94-257g HIGH gRPC-Go HTTP/2 Rapid Reset vulnerability v1.58.2 1.56.3
ℹ️ Other Vulnerabilities (7)
Package CVE Severity Summary Unsafe Version Fixed In
golang.org/x/net GO-2025-3595 MODERATE Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net v0.23.0 0.38.0
golang.org/x/net GHSA-vvgc-356p-c3xw MODERATE golang.org/x/net vulnerable to Cross-site Scripting v0.23.0 0.38.0
golang.org/x/net GO-2026-4440 MODERATE Quadratic parsing complexity in golang.org/x/net/html v0.23.0 0.45.0
golang.org/x/net GHSA-w4gw-w5jq-g9jh MODERATE golang.org/x/net/html has a Quadratic Parsing Complexity issue v0.23.0 -
golang.org/x/net GO-2025-3503 MODERATE HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net v0.23.0 0.36.0
golang.org/x/net GHSA-qxp5-gwg8-xv66 MODERATE HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net v0.23.0 0.36.0
golang.org/x/net GO-2026-4441 unknown Infinite parsing loop in golang.org/x/net v0.23.0 0.45.0
⚠️ Dependencies that have Reached EOL (2)
Dependency Unsafe Version EOL Date New Version Path
cloud.google.com/go/compute/metadata v0.2.3 Dec 15, 2025 v0.9.0 src/frontend/go.mod
cloud.google.com/go/profiler v0.3.1 Dec 2, 2025 v0.4.3 src/frontend/go.mod

Review Checklist

Extra review is recommended for this update:

  • Review changes for compatibility with your code
  • Check release notes for breaking changes
  • Run integration tests to verify service behavior
  • Test in staging environment before production
  • Monitor key metrics after deployment

Update Mode: Vulnerability Remediation (High)

🤖 Generated by DataDog Automated Dependency Management System

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants