Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): bump golang.org/x/oauth2 from 0.25.0 to 0.27.0 - resolve CVE-2025-22868 #2480

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

rgoltz
Copy link
Contributor

@rgoltz rgoltz commented Mar 11, 2025

Description

Let's keep the AquaSec Trivy-Operator dependency golang.org/x/oauth2 up-to-date. The current latest Docker-Image tag 0.25.0 using an older version of oauth2 which could be affected by golang/go#71490 (https://nvd.nist.gov/vuln/detail/CVE-2025-22868). So, let's upgrade oauth2 from 0.25.0 to 0.27.0 for AquaSec Trivy-Operator.

Having this said, I ran:

go get golang.org/x/oauth2@v0.27.0
go mod tidy

Note for Reviewers

Basically, this dependency update just aim to silence some (SBOM-based) scanners, while checking aquasec/trivy-operator:0.25.0 Docker-Image.

I didn't create a linked issue here in the repo yet - If this would be better/required to have an issue, I'm happy to create one and link this here with Close/Fixed reference.

@rgoltz rgoltz requested a review from simar7 as a code owner March 11, 2025 14:56
@CLAassistant
Copy link

CLAassistant commented Mar 11, 2025

CLA assistant check
All committers have signed the CLA.

@rgoltz
Copy link
Contributor Author

rgoltz commented Mar 24, 2025

@simar7 @afdesk - Could you please take a look into this PR to update the golang.org/x/oauth2 dependency? - Thanks a lot. 🥇

@afdesk
Copy link
Contributor

afdesk commented Mar 24, 2025

@rgoltz thanks for your contribution and ping )

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants