Skip to content

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jul 24, 2025

This PR contains the following updates:

Package Change Age Confidence
golang.org/x/oauth2 v0.22.0 -> v0.27.0 age confidence

GitHub Vulnerability Alerts

CVE-2025-22868

An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added the security label Jul 24, 2025
@renovate renovate bot force-pushed the renovate/go-golang.org-x-oauth2-vulnerability branch from 1dd7778 to 179576c Compare August 10, 2025 15:29
@renovate renovate bot force-pushed the renovate/go-golang.org-x-oauth2-vulnerability branch from 179576c to c20f6c3 Compare August 18, 2025 13:01
@renovate renovate bot changed the title chore(deps): update module golang.org/x/oauth2 to v0.27.0 [security] Update module golang.org/x/oauth2 to v0.27.0 [SECURITY] Sep 16, 2025
@renovate renovate bot changed the title Update module golang.org/x/oauth2 to v0.27.0 [SECURITY] chore(deps): update module golang.org/x/oauth2 to v0.27.0 [security] Sep 17, 2025
@renovate renovate bot force-pushed the renovate/go-golang.org-x-oauth2-vulnerability branch from c20f6c3 to b477b93 Compare October 9, 2025 12:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants