chore(deps): bump golang.org/x/crypto from 0.33.0 to 0.45.0 in /studio#79
Closed
dependabot[bot] wants to merge 1 commit intomainfrom
Closed
chore(deps): bump golang.org/x/crypto from 0.33.0 to 0.45.0 in /studio#79dependabot[bot] wants to merge 1 commit intomainfrom
dependabot[bot] wants to merge 1 commit intomainfrom
Conversation
Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.33.0 to 0.45.0. - [Commits](golang/crypto@v0.33.0...v0.45.0) --- updated-dependencies: - dependency-name: golang.org/x/crypto dependency-version: 0.45.0 dependency-type: indirect ... Signed-off-by: dependabot[bot] <support@github.com>
587945b to
c808881
Compare
5 tasks
pbertsch
added a commit
that referenced
this pull request
May 2, 2026
Resolves all 8 open Dependabot security alerts in one shot.
Go (studio/go.mod):
golang.org/x/crypto: 0.33.0 → 0.45.0
- GHSA-#17 (high): DoS via slow/incomplete key exchange
- GHSA-#19 (med): unbounded memory consumption
- GHSA-#20 (med): panic on malformed message
golang.org/x/net: 0.35.0 → 0.47.0 (0.45.0 of crypto requires net 0.47.0)
- GHSA-#16 (med): HTTP Proxy bypass via IPv6 zone IDs
- GHSA-#18 (med): XSS
npm (studio/frontend):
vite: ^5.4.0 → ^8.0.10
- GHSA-#15 (med): path traversal in optimized deps .map handling
- Pulls esbuild ^0.25 transitively, which also clears GHSA-#14
npm (vscode):
@vscode/vsce: ^2.24.0 → ^3.9.0
- vsce 3.x dropped its uuid dependency entirely, clearing GHSA-#12
(uuid <14 missing buffer bounds check) without forcing a uuid
override on every consumer.
All builds + tests pass: go build, go test, vscode tsc compile, vite
build (Studio frontend). Closes Dependabot PRs #78, #79, #80, #81 (this
covers their scope cleanly in one PR).
Contributor
|
Superseded by #88 which bundles all 8 vulnerable-dep bumps into one chore PR (with a higher |
Contributor
Author
|
OK, I won't notify you again about this release, but will get in touch when a new version is available. If you'd rather skip all updates until the next major or minor version, let me know by commenting If you change your mind, just re-open this PR and I'll resolve any conflicts on it. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Rebasing might not happen immediately, so don't worry if this takes some time.
Note: if you make any changes to this PR yourself, they will take precedence over the rebase.
Bumps golang.org/x/crypto from 0.33.0 to 0.45.0.
Commits
4e0068cgo.mod: update golang.org/x dependenciese79546essh: curb GSSAPI DoS risk by limiting number of specified OIDsf91f7a7ssh/agent: prevent panic on malformed constraint2df4153acme/autocert: let automatic renewal work with short lifetime certsbcf6a84acme: pass context to requestb4f2b62ssh: fix error message on unsupported cipher79ec3a5ssh: allow to bind to a hostname in remote forwarding122a78fgo.mod: update golang.org/x dependenciesc0531f9all: eliminate vet diagnostics0997000all: fix some comments