Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Jun 18, 2025

This PR contains the following updates:

Package Change Age Confidence
golang.org/x/oauth2 v0.11.0 -> v0.27.0 age confidence

golang.org/x/oauth2 Improper Validation of Syntactic Correctness of Input vulnerability

CVE-2025-22868 / GHSA-6v2p-p543-phr9 / GO-2025-3488

More information

Details

An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.

Severity

  • CVSS Score: 7.5 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Unexpected memory consumption during token parsing in golang.org/x/oauth2

CVE-2025-22868 / GHSA-6v2p-p543-phr9 / GO-2025-3488

More information

Details

An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added the automated label Jun 18, 2025
@renovate
Copy link
Contributor Author

renovate bot commented Jun 18, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.20 -> 1.23.0

@renovate renovate bot changed the title Update module golang.org/x/oauth2 to v0.27.0 [SECURITY] Update module golang.org/x/oauth2 to v0.27.0 [SECURITY] - autoclosed Jun 23, 2025
@renovate renovate bot closed this Jun 23, 2025
@renovate renovate bot deleted the renovate/go-golang.org-x-oauth2-vulnerability branch June 23, 2025 12:29
@renovate renovate bot changed the title Update module golang.org/x/oauth2 to v0.27.0 [SECURITY] - autoclosed Update module golang.org/x/oauth2 to v0.27.0 [SECURITY] Jun 23, 2025
@renovate renovate bot reopened this Jun 23, 2025
@renovate renovate bot force-pushed the renovate/go-golang.org-x-oauth2-vulnerability branch from 9357e0e to e8fb8e5 Compare June 23, 2025 20:55
@renovate renovate bot force-pushed the renovate/go-golang.org-x-oauth2-vulnerability branch from e8fb8e5 to f39e6de Compare August 10, 2025 13:13
@renovate renovate bot force-pushed the renovate/go-golang.org-x-oauth2-vulnerability branch from f39e6de to 1c2ede9 Compare October 9, 2025 13:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant