Skip to content

chore(deps): update module golang.org/x/net to v0.55.0 [security] (release-2.2)#1005

Open
crossplane-renovate[bot] wants to merge 1 commit into
release-2.2from
renovate/release-2.2-go-golang.org-x-net-vulnerability
Open

chore(deps): update module golang.org/x/net to v0.55.0 [security] (release-2.2)#1005
crossplane-renovate[bot] wants to merge 1 commit into
release-2.2from
renovate/release-2.2-go-golang.org-x-net-vulnerability

Conversation

@crossplane-renovate
Copy link
Copy Markdown
Contributor

This PR contains the following updates:

Package Change Age Confidence
golang.org/x/net v0.53.0v0.55.0 age confidence

Invoking incorrect handling of namespaced elements in foreign content in golang.org/x/net/html

CVE-2026-42506 / GO-2026-5025

More information

Details

Parsing arbitrary HTML which is then rendered using Render can result in an unexpected HTML tree. This can be leveraged to execute XSS attacks in applications that attempt to sanitize input HTML before rendering.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Invoking failure to reject ASCII-only Punycode-encoded labels in golang.org/x/net/idna

CVE-2026-39821 / GO-2026-5026

More information

Details

The ToASCII and ToUnicode functions incorrectly accept Punycode-encoded labels that decode to an ASCII-only label. For example, ToUnicode("xn--example-.com") incorrectly returns the name "example.com" rather than an error.

This behavior can lead to privilege escalation in programs using the idna package. For example, a program which performs privilege checks on the ASCII hostname may reject "example.com" but permit "xn--example-.com". If that program subsequently converts the ASCII hostname to Unicode, it will inadvertently permits access to the Unicode name "example.com".

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Invoking incorrect handling of HTML elements in foreign content in golang.org/x/net/html

CVE-2026-42502 / GO-2026-5027

More information

Details

Parsing arbitrary HTML which is then rendered using Render can result in an unexpected HTML tree. This can be leveraged to execute XSS attacks in applications that attempt to sanitize input HTML before rendering.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Invoking denial of service when parsing arbitrary HTML in golang.org/x/net/html

CVE-2026-25680 / GO-2026-5028

More information

Details

Parsing arbitrary HTML can consume excessive CPU time, possibly leading to denial of service.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Invoking incorrect handling of character references in DOCTYPE nodes in golang.org/x/net/html

CVE-2026-25681 / GO-2026-5029

More information

Details

Parsing arbitrary HTML which is then rendered using Render can result in an unexpected HTML tree. This can be leveraged to execute XSS attacks in applications that attempt to sanitize input HTML before rendering.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Invoking duplicate attributes can cause XSS in golang.org/x/net/html

CVE-2026-27136 / GO-2026-5030

More information

Details

Parsing arbitrary HTML which is then rendered using Render can result in an unexpected HTML tree. This can be leveraged to execute XSS attacks in applications that attempt to sanitize input HTML before rendering.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate.

@crossplane-renovate crossplane-renovate Bot requested a review from a team as a code owner May 23, 2026 08:47
@crossplane-renovate
Copy link
Copy Markdown
Contributor Author

⚠️ Artifact update problem

Renovate failed to update artifacts related to this branch. You probably do not want to merge this PR as-is.

♻ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you click the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: go.mod
Command failed: nix run .#tidy
warning: Git tree '/tmp/renovate/repos/github/crossplane/crossplane-runtime' is dirty
this derivation will be built:
  /nix/store/jnb045kyxsc1pzz55rxsil4w516al708-crossplane-runtime-tidy.drv
error: home directory '/homeless-shelter' exists; please remove it to assure purity of builds without sandboxing

File name: go.mod
Command failed: nix run .#generate
warning: Git tree '/tmp/renovate/repos/github/crossplane/crossplane-runtime' is dirty
these 5 derivations will be built:
  /nix/store/acsd2c3764hxnybhilfnynaxz72s1xbg-buf-1.59.0.drv
  /nix/store/gf51h6ffx5bmbkkbgss0xxzvxhhn614i-controller-tools-0.19.0.drv
  /nix/store/qrm4fcig00pi8pwwbxy0r6am4dgnzhza-protoc-gen-go-grpc-1.5.1.drv
  /nix/store/rrc5b7cm2gcaqkkb14q3gmmpx40ili67-protoc-gen-go-1.36.10.drv
  /nix/store/2267vm4k3frck6bip3blkbw9far97zy7-crossplane-runtime-generate.drv
this path will be fetched (3.23 MiB download, 17.89 MiB unpacked):
  /nix/store/l2mzxnhw99wzb65kg3l0vv815bmzp3a8-protobuf-32.1
error: home directory '/homeless-shelter' exists; please remove it to assure purity of builds without sandboxing

@crossplane-renovate crossplane-renovate Bot requested review from bobh66 and removed request for a team May 23, 2026 08:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants