Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): update module google.golang.org/protobuf to v1.33.0 [security] - autoclosed #788

Conversation

renovate-bot
Copy link
Contributor

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
google.golang.org/protobuf v1.31.0 -> v1.33.0 age adoption passing confidence

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.

GitHub Vulnerability Alerts

CVE-2024-24786

The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.


Release Notes

protocolbuffers/protobuf-go (google.golang.org/protobuf)

v1.33.0

Compare Source

v1.32.0

Compare Source

Full Changelog: protocolbuffers/protobuf-go@v1.31.0...v1.32.0

This release contains commit protocolbuffers/protobuf-go@bfcd647, which fixes a denial of service vulnerability by preventing a stack overflow through a default maximum recursion limit. See https://github.com/golang/protobuf/issues/1583 and https://github.com/golang/protobuf/issues/1584 for details.


Configuration

📅 Schedule: Branch creation - "" in timezone Asia/Calcutta, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate-bot renovate-bot requested a review from a team as a code owner March 13, 2024 23:13
@renovate-bot renovate-bot requested review from asthamohta and VardhanThigle and removed request for a team March 13, 2024 23:13
Copy link

codecov bot commented Mar 13, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 45.96%. Comparing base (82ecfec) to head (703f845).

❗ Current head 703f845 differs from pull request most recent head 120635b. Consider uploading reports for the commit 120635b to get more accurate results

Additional details and impacted files
@@            Coverage Diff             @@
##           master     #788      +/-   ##
==========================================
+ Coverage   44.77%   45.96%   +1.19%     
==========================================
  Files         163      166       +3     
  Lines       20937    20013     -924     
  Branches      478      471       -7     
==========================================
- Hits         9374     9199     -175     
+ Misses      11033    10300     -733     
+ Partials      530      514      -16     
Components Coverage Δ
backend-apis 44.47% <ø> (+1.73%) ⬆️
backend-library 50.60% <ø> (-0.74%) ⬇️
cli 0.00% <ø> (-5.15%) ⬇️
frontend 32.08% <ø> (-0.43%) ⬇️

see 48 files with indirect coverage changes

@renovate-bot renovate-bot force-pushed the renovate/go-google.golang.org/protobuf-vulnerability branch from 703f845 to 1306b42 Compare April 14, 2024 11:29
@renovate-bot renovate-bot force-pushed the renovate/go-google.golang.org/protobuf-vulnerability branch from 1306b42 to 120635b Compare May 9, 2024 08:53
@renovate-bot renovate-bot changed the title fix(deps): update module google.golang.org/protobuf to v1.33.0 [security] fix(deps): update module google.golang.org/protobuf to v1.33.0 [security] - autoclosed May 23, 2024
@renovate-bot renovate-bot deleted the renovate/go-google.golang.org/protobuf-vulnerability branch May 23, 2024 13:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant