Skip to content

build(deps): bump the golangx group with 5 updates#456

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/golangx-a68fb48b97
Open

build(deps): bump the golangx group with 5 updates#456
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/golangx-a68fb48b97

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Feb 12, 2026

Bumps the golangx group with 5 updates:

Package From To
golang.org/x/net 0.49.0 0.50.0
golang.org/x/oauth2 0.34.0 0.35.0
golang.org/x/sys 0.40.0 0.41.0
golang.org/x/term 0.39.0 0.40.0
golang.org/x/text 0.33.0 0.34.0

Updates golang.org/x/net from 0.49.0 to 0.50.0

Commits
  • ebddb99 go.mod: update golang.org/x dependencies
  • 4a490d4 internal/http3: add Expect: 100-continue support to ClientConn
  • 73fe701 internal/http3: add Expect: 100-continue support to Server
  • af0c9df html: add NodeType.String() method
  • e02fb33 internal/http3: make responseWriter.Flush write headers if not done yet
  • da558ff internal/http3: ensure bodyReader cannot be read after being closed
  • d7c76fa internal/http3: make responseWriter behave closer to other http.ResponseWriter
  • 64b3af9 http2: prevent transport deadlock due to WINDOW_UPDATE that exceeds limit
  • 1973e8d internal/http3: add Server support for handling HEAD requests
  • 57ea86d icmp, internal/socket, ipv4, ipv6: use binary.NativeEndian
  • Additional commits viewable in compare view

Updates golang.org/x/oauth2 from 0.34.0 to 0.35.0

Commits

Updates golang.org/x/sys from 0.40.0 to 0.41.0

Commits
  • fc646e4 cpu: use IsProcessorFeaturePresent to calculate ARM64 on windows
  • f11c7bb windows: add IsProcessorFeaturePresent and processor feature consts
  • d25a7aa unix: add IoctlSetString on all platforms
  • 6fb913b unix: return early on error in Recvmsg
  • See full diff in compare view

Updates golang.org/x/term from 0.39.0 to 0.40.0

Commits

Updates golang.org/x/text from 0.33.0 to 0.34.0

Commits
  • 817fba9 go.mod: update golang.org/x dependencies
  • 3264de9 all: clean up old Go hacks
  • 74af298 all: fix tags in remaining Unicode tables
  • 117e03b all: delete old Unicode tables
  • 9463ea4 all: update to Unicode 17
  • 7278b25 internal/export/idna: update for post-Unicode 10 idna changes
  • f964ad8 internal/export/idna: delete old code
  • 678d34e unicode/norm: preserve QC Maybe bit in packed forminfo
  • See full diff in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update go code labels Feb 12, 2026
@dependabot dependabot bot requested a review from a team as a code owner February 12, 2026 08:44
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update go code labels Feb 12, 2026
@coderabbitai
Copy link

coderabbitai bot commented Feb 12, 2026

Walkthrough

The PR updates five indirect Go module requirements in go.mod: golang.org/x/net, golang.org/x/oauth2, golang.org/x/sys, golang.org/x/term, and golang.org/x/text to newer minor/patch versions; no other require blocks were altered.

Changes

Cohort / File(s) Summary
Go Dependency Updates
go.mod
Bumped five indirect dependencies: golang.org/x/net v0.49.0 → v0.50.0, golang.org/x/oauth2 v0.34.0 → v0.35.0, golang.org/x/sys v0.40.0 → v0.41.0, golang.org/x/term v0.39.0 → v0.40.0, golang.org/x/text v0.33.0 → v0.34.0. No other changes to require blocks.

Estimated code review effort

🎯 1 (Trivial) | ⏱️ ~2 minutes

🚥 Pre-merge checks | ✅ 3 | ❌ 1
❌ Failed checks (1 warning)
Check name Status Explanation Resolution
Description check ⚠️ Warning The description is largely incomplete against the template. It lacks a Summary section, Change Type designation, and the required Check List Before Merging with checkboxes. Add a Summary section, select a Change Type (likely 'Docs/Test' for dependency updates), and include the completed Check List Before Merging checklist.
✅ Passed checks (3 passed)
Check name Status Explanation
Title check ✅ Passed The title clearly and concisely describes the main change: bumping five golang.org/x modules in a dependency group update.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.
Merge Conflict Detection ✅ Passed ✅ No merge conflicts detected when merging into main

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment
  • Commit unit tests in branch dependabot/go_modules/golangx-a68fb48b97

No actionable comments were generated in the recent review. 🎉


Comment @coderabbitai help to get the list of available commands and usage tips.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Fix all issues with AI agents
In `@go.mod`:
- Around line 82-86: Replace the invalid golang.org/x/term v0.40.0 entry with
the existing v0.39.0 and address golang.org/x/text v0.34.0's breaking changes:
either pin golang.org/x/text to the previous compatible version (e.g., v0.33.0)
or keep v0.34.0 but run full text/IDNA/domain normalization tests and update any
callers that rely on old IDNA/Unicode behavior; after editing the module lines
for golang.org/x/term and golang.org/x/text run go get to fetch the chosen
versions, run go mod tidy, and execute the test suite to verify no regressions.

Comment on lines +82 to +86
golang.org/x/net v0.50.0 // indirect
golang.org/x/oauth2 v0.35.0 // indirect
golang.org/x/sys v0.41.0 // indirect
golang.org/x/term v0.40.0 // indirect
golang.org/x/text v0.34.0 // indirect
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🔴 Critical

🧩 Analysis chain

🏁 Script executed:

# Check if go.mod exists and read lines 82-86
wc -l go.mod
sed -n '75,95p' go.mod

Repository: package-operator/boxcutter

Length of output: 1078


🌐 Web query:

golang.org/x/net v0.50.0 security vulnerabilities release notes

💡 Result:

golang.org/x/net v0.50.0 (published/tagged Feb 9, 2026)

There are no dedicated “release notes” for golang.org/x/net v0.50.0; the v0.50.0 tag points at a commit whose message is essentially “go.mod: update golang.org/x dependencies” (i.e., a dependency-rollup style release). [1]
Go package index pages show v0.50.0 as published on Feb 9, 2026. [2]

Security vulnerabilities status (relevant advisories)

As of this release, the most recent Go vulnerability reports affecting golang.org/x/net were:

  • CVE-2025-58190 / GO-2026-4441: golang.org/x/net/html html.Parse infinite loop DoS. Affected: before v0.45.0 (so v0.50.0 is not affected). [3]
  • CVE-2025-47911 / GO-2026-4440: golang.org/x/net/html quadratic complexity DoS. Affected: before v0.45.0 (so v0.50.0 is not affected). [4]
  • CVE-2025-22870 / GO-2025-3503: proxy bypass via IPv6 zone IDs. Fixed in v0.36.0 (so v0.50.0 is not affected). [5]

Where to see “what changed” for v0.50.0

Use the repository’s tag (v0.50.0) and compare it to the previous tag (v0.49.0) in the upstream repo history; the tag metadata is here. [1]

Sources: [1] [2] [3] [4] [5]


🌐 Web query:

golang.org/x/oauth2 v0.35.0 security vulnerabilities

💡 Result:

No security vulnerabilities are currently listed as affecting golang.org/x/oauth2 v0.35.0 in the Go/OSV advisory data.

The known vulnerability for this module is:

  • CVE-2025-22868 / GO-2025-3488 / GHSA-6v2p-p543-phr9: malformed token can cause unexpected memory consumption (DoS) during parsing in golang.org/x/oauth2/jws. It affects all versions < v0.27.0 and is fixed in v0.27.0—so v0.35.0 is not affected. [1] [2]

Reference for the version you asked about:

  • golang.org/x/oauth2 v0.35.0 is published Jan 12, 2026 on pkg.go.dev. [3]

Sources: OSV advisory (GO-2025-3488) [1], GitHub Advisory (GHSA-6v2p-p543-phr9) [2], pkg.go.dev module page [3].


🌐 Web query:

golang.org/x/sys v0.41.0 security vulnerabilities

💡 Result:

As of February 12, 2026, the Go Vulnerability Database lists one vulnerability affecting golang.org/x/sys:

  • GO-2022-0493 / CVE-2022-29526golang.org/x/sys/unix.Faccessat could incorrectly report a file as accessible when called with non-zero flags. It affects golang.org/x/sys/unix versions before v0.0.0-20220412211240-33da011f77ad. golang.org/x/sys v0.41.0 is newer than that and is not affected. [1]

golang.org/x/sys v0.41.0 is published on Feb 8, 2026. [2]

Conclusion: there are no known Go Vulnerability Database issues that apply to golang.org/x/sys v0.41.0 (the one known issue is fixed long before this release). [1][2]

Sources

  1. Go Vulnerability Database entry for GO-2022-0493 (CVE-2022-29526) [1]
  2. golang.org/x/sys module page showing v0.41.0 (published Feb 8, 2026) [2]

🌐 Web query:

golang.org/x/term v0.40.0 security vulnerabilities

💡 Result:

As of February 12, 2026, there is no golang.org/x/term release v0.40.0 on pkg.go.dev (the latest tagged version shown there is v0.39.0, published Jan 9, 2026). [1]

Also, the Go Vulnerability Database (the source used by govulncheck and browsable on pkg.go.dev/vuln) does not list any vulnerability reports for golang.org/x/term (i.e., no GO-IDs/CVEs/GHSAs mapped to that module). [2][3]

How to verify in your own project (recommended):

go install golang.org/x/vuln/cmd/govulncheck@latest
govulncheck ./...

govulncheck queries the Go Vulnerability Database at vuln.go.dev by default. [3]

Sources:
[1] pkg.go.dev module page for golang.org/x/term (shows latest version) (pkg.go.dev)
[2] Go Vulnerability Database search UI (pkg.go.dev/vuln) (pkg.go.dev)
[3] govulncheck documentation (default DB behavior) (pkg.go.dev)

Citations:


🌐 Web query:

golang.org/x/text v0.34.0 security vulnerabilities breaking changes

💡 Result:

golang.org/x/text v0.34.0 (tagged Feb 9, 2026): breaking/behavior changes

Between v0.33.0 → v0.34.0, the repo includes a batch of changes (8 commits / 103 files) that are potentially behavior-breaking even though the tag itself is just a go.mod/go.sum refresh. Key items called out in the compare log include: update to Unicode 17, IDNA algorithm updates, and deleting old Unicode tables / old Go-version compatibility code. [1]

Concretely, expect possible breakage in these areas:

  • Unicode data-dependent behavior changes (e.g., normalization, properties, case/width behavior, collation-related outputs) due to the Unicode 17 table regen. [1]
  • IDNA behavior changes (domain name processing) due to “update for post‑Unicode 10 idna changes” and related cleanups. This can change what inputs are considered valid / how they map. [1]
  • Build/compatibility break if you rely on older Go versions: the repo is explicitly removing code/tables for older Go versions and notes “go.mod … requires Go 1.24”. [1]

The v0.34.0 tag commit itself is “go.mod: update golang.org/x dependencies” (e.g., bumps golang.org/x/tools and golang.org/x/mod). [2]

Security vulnerabilities relevant to v0.34.0

From the Go vulnerability database (authoritative for Go module vulns), the main historical vulns in golang.org/x/text/language are:

  • GO-2022-1059 (CVE-2022-32149): DoS via crafted Accept-Language header parsed by ParseAcceptLanguage. Affected: before v0.3.8 (fixed in v0.3.8). v0.34.0 is not affected. [3]
  • GO-2021-0113 (CVE-2021-38561): malformed language tag can trigger panic (OOB read) in parsing. Affected: before v0.3.7 (fixed in v0.3.7). v0.34.0 is not affected. [4]

If you want, tell me what version you’re upgrading from (and which subpackages you use: language, unicode/norm, secure/precis, width, etc.) and I’ll narrow this to the changes most likely to impact your code/tests.

Sources: [1] [2] [3] [4]


golang.org/x/term v0.40.0 does not exist; the latest available version is v0.39.0.

This must be corrected in go.mod. Additionally, golang.org/x/text v0.34.0 contains breaking changes—Unicode 17 table updates and IDNA algorithm changes—that affect domain name validation and text normalization behavior. These require testing to ensure no unexpected changes in your text/language processing. The other modules (golang.org/x/net v0.50.0, golang.org/x/oauth2 v0.35.0, golang.org/x/sys v0.41.0) have no known vulnerabilities affecting these versions.

🤖 Prompt for AI Agents
In `@go.mod` around lines 82 - 86, Replace the invalid golang.org/x/term v0.40.0
entry with the existing v0.39.0 and address golang.org/x/text v0.34.0's breaking
changes: either pin golang.org/x/text to the previous compatible version (e.g.,
v0.33.0) or keep v0.34.0 but run full text/IDNA/domain normalization tests and
update any callers that rely on old IDNA/Unicode behavior; after editing the
module lines for golang.org/x/term and golang.org/x/text run go get to fetch the
chosen versions, run go mod tidy, and execute the test suite to verify no
regressions.

Bumps the golangx group with 5 updates:

| Package | From | To |
| --- | --- | --- |
| [golang.org/x/net](https://github.com/golang/net) | `0.49.0` | `0.50.0` |
| [golang.org/x/oauth2](https://github.com/golang/oauth2) | `0.34.0` | `0.35.0` |
| [golang.org/x/sys](https://github.com/golang/sys) | `0.40.0` | `0.41.0` |
| [golang.org/x/term](https://github.com/golang/term) | `0.39.0` | `0.40.0` |
| [golang.org/x/text](https://github.com/golang/text) | `0.33.0` | `0.34.0` |


Updates `golang.org/x/net` from 0.49.0 to 0.50.0
- [Commits](golang/net@v0.49.0...v0.50.0)

Updates `golang.org/x/oauth2` from 0.34.0 to 0.35.0
- [Commits](golang/oauth2@v0.34.0...v0.35.0)

Updates `golang.org/x/sys` from 0.40.0 to 0.41.0
- [Commits](golang/sys@v0.40.0...v0.41.0)

Updates `golang.org/x/term` from 0.39.0 to 0.40.0
- [Commits](golang/term@v0.39.0...v0.40.0)

Updates `golang.org/x/text` from 0.33.0 to 0.34.0
- [Release notes](https://github.com/golang/text/releases)
- [Commits](golang/text@v0.33.0...v0.34.0)

---
updated-dependencies:
- dependency-name: golang.org/x/net
  dependency-version: 0.50.0
  dependency-type: indirect
  update-type: version-update:semver-minor
  dependency-group: golangx
- dependency-name: golang.org/x/oauth2
  dependency-version: 0.35.0
  dependency-type: indirect
  update-type: version-update:semver-minor
  dependency-group: golangx
- dependency-name: golang.org/x/sys
  dependency-version: 0.41.0
  dependency-type: indirect
  update-type: version-update:semver-minor
  dependency-group: golangx
- dependency-name: golang.org/x/term
  dependency-version: 0.40.0
  dependency-type: indirect
  update-type: version-update:semver-minor
  dependency-group: golangx
- dependency-name: golang.org/x/text
  dependency-version: 0.34.0
  dependency-type: indirect
  update-type: version-update:semver-minor
  dependency-group: golangx
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/golangx-a68fb48b97 branch from 4acb43d to d6e0d7a Compare February 13, 2026 16:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant