Bump the go_modules group across 3 directories with 4 updates
Type: Pull Request
State: Closed
Association: Unknown
Comments: 4
(20 days ago)
(20 days ago)
(20 days ago)
documentation dependencies Go
Bumps the go_modules group with 2 updates in the /go/ql/test/experimental/CWE-321-V2 directory: github.com/go-jose/go-jose/v3 and github.com/golang-jwt/jwt/v5.
Bumps the go_modules group with 1 update in the /go/ql/test/experimental/CWE-525 directory: github.com/gofiber/fiber/v2.
Bumps the go_modules group with 1 update in the /go/ql/test/library-tests/semmle/go/frameworks/Fiber directory: github.com/gofiber/fiber/v2.
Updates github.com/go-jose/go-jose/v3 from 3.0.0 to 3.0.4
Release notes
Sourced from github.com/go-jose/go-jose/v3's releases.
v3.0.4
What's Changed
Backport fix for GHSA-c6gw-w398-hv78 CVE-2025-27144 go-jose/go-jose#174
Full Changelog: https://github.com/go-jose/go-jose/compare/v3.0.3...v3.0.4
Version 3.0.3
Fixed
- Limit decompression output size to prevent a DoS. Backport from v4.0.1.
Version 3.0.2
Fixed
- DecryptMulti: handle decompression error (#19)
Changed
- jwe/CompactSerialize: improve performance (#67)
- Increase the default number of PBKDF2 iterations to 600k (#48)
- Return the proper algorithm for ECDSA keys (#45)
- Update golang.org/x/crypto to v0.19 (#94)
Added
- Add Thumbprint support for opaque signers (#38)
Version 3.0.1
Fixed
Security issue: an attacker specifying a large "p2c" value can cause JSONWebEncryption.Decrypt and JSONWebEncryption.DecryptMulti to consume large amounts of CPU, causing a DoS. Thanks to Matt Schwager (
@mschwager) for the disclosure and to Tom Tervoort for originally publishing the category of attack. https://i.blackhat.com/BH-US-23/Presentations/US-23-Tervoort-Three-New-Attacks-Against-JSON-Web-Tokens.pdfThe release is tagged off the release-v3.0.1 branch to avoid mixing in some as-yet unreleased changes on the v3 branch.
Commits
5253038Backport fix 167 to v3 (#174)047dc99CI: Update github actions and go version (#173)0f017e9Revert #26 (ignore unsupported JWKs in Sets) (#131)3e2bbefUnmarshal jwk keys with unsupported key type or algorithm into empty … (#26)add6a28v3: backport decompression limit fix (#107)11bb4e7doc: in v3 branch's README, point to v4 as latest (#101)863f73bv3.0.2: Update changelog (#95)bdbc794Update golang.org/x/crypto to v0.19 (backport) (#94)25bce79Updated go-jose v3.0.0 to v3.0.1 in jose-util (#70)aa386dfjwe/CompactSerialize: improve performance. (#67)- Additional commits viewable in compare view
Updates github.com/golang-jwt/jwt/v5 from 5.0.0 to 5.2.2
Release notes
Sourced from github.com/golang-jwt/jwt/v5's releases.
v5.2.2
What's Changed
- Fixed https://github.com/golang-jwt/jwt/security/advisories/GHSA-mh63-6h87-95cp by
@mfridman- Fixed some typos by
@Ashikpaulin golang-jwt/jwt#382- build: add go1.22 to ci workflows by
@mfridmanin golang-jwt/jwt#383- Bump golangci/golangci-lint-action from 4 to 5 by
@dependabotin golang-jwt/jwt#387- Bump golangci/golangci-lint-action from 5 to 6 by
@dependabotin golang-jwt/jwt#389- chore: bump ci tests to include go1.23 by
@mfridmanin golang-jwt/jwt#405- Fix jwt -show by
@AlexanderYastrebovin golang-jwt/jwt#406- docs: typo by
@kviiin golang-jwt/jwt#407- Update SECURITY.md by
@oxistoin golang-jwt/jwt#416- Update
jwt.Parseexample to usejwt.WithValidMethodsby@matttin golang-jwt/jwt#425New Contributors
@Ashikpaulmade their first contribution in golang-jwt/jwt#382@kviimade their first contribution in golang-jwt/jwt#407@matttmade their first contribution in golang-jwt/jwt#425Full Changelog: https://github.com/golang-jwt/jwt/compare/v5.2.1...v5.2.2
v5.2.1
What's Changed
- chore: remove unnecessary conversions from tests by
@estensenin golang-jwt/jwt#370- Trivial: Typo fix for ECDSA error message by
@tjs-cinemoin golang-jwt/jwt#373- Fix incorrect error return by
@ss49919201in golang-jwt/jwt#371New Contributors
@tjs-cinemomade their first contribution in golang-jwt/jwt#373@ss49919201made their first contribution in golang-jwt/jwt#371Full Changelog: https://github.com/golang-jwt/jwt/compare/v5.2.0...v5.2.1
v5.2.0
What's Changed
- Exported
NewValidatorby@oxistoin golang-jwt/jwt#349- Improve ErrInvalidKeyType error messages by
@Laurin-Notemannin golang-jwt/jwt#361- Update MIGRATION_GUIDE.md by
@jbarhamin golang-jwt/jwt#363New Contributors
@Laurin-Notemannmade their first contribution in golang-jwt/jwt#361@jbarhammade their first contribution in golang-jwt/jwt#363Full Changelog: https://github.com/golang-jwt/jwt/compare/v5.1.0...v5.2.0
v5.1.0
What's Changed
- Using jwt's native
ErrInvalidTypeinstead ofjson.UnsupportedTypeErrorby@oxistoin golang-jwt/jwt#316- Fix typos in comments and test names by
@alexandearin golang-jwt/jwt#317- Format: add whitespaces, remove empty lines by
@alexandearin golang-jwt/jwt#319- Refactor example: use io.ReadAll instead of io.Copy by
@alexandearin golang-jwt/jwt#320
... (truncated)
Commits
0951d18Merge commit from forkc035977Update Parse example to use WithValidMethods (#425)bc8bdcaUpdate SECURITY.md (#416)5ec246cdocs: typo (#407)0123f1aFix jwt -show (#406)f961c72chore: bump ci tests to include go1.23 (#405)62e504cBump golangci/golangci-lint-action from 5 to 6 (#389)1a56dcfBump golangci/golangci-lint-action from 4 to 5 (#387)c8043eabuild: add go1.22 to ci workflows (#383)7c3f6dcUpdate README.md (#382)- Additional commits viewable in compare view
Updates golang.org/x/crypto from 0.12.0 to 0.19.0
Commits
405cb3bgo.mod: update golang.org/x dependencies913d3aex509roots/fallback: update bundledbb6ec1ssh/test: skip tests on darwin that fail on the darwin-amd64-longtest LUCI bu...403f699ssh/test: avoid leaking a net.UnixConn in server.TryDialWithAddr055043dgo.mod: update golang.org/x dependencies08396bbinternal/poly1305: drop Go 1.12 compatibility9d2ee97ssh: implement strict KEX protocol changes4e5a261ssh: close net.Conn on all NewServerConn errors152cdb1x509roots/fallback: update bundlefdfe1f8ssh: defer channel window adjustment- Additional commits viewable in compare view
Updates github.com/gofiber/fiber/v2 from 2.51.0 to 2.52.12
Release notes
Sourced from github.com/gofiber/fiber/v2's releases.
v2.52.12
🐛 Fixes
- CVE fix GHSA-mrq8-rjmw-wpq3
Full Changelog: https://github.com/gofiber/fiber/compare/v2.52.11...v2.52.12
v2.52.11
What's Changed
🧹 Updates
- Improve mount functionality by
@gabyin gofiber/fiber#3900🐛 Bug Fixes
- Backport defensive copying fixes from #3828 and #3829 to v2 by
@sixcolorsin gofiber/fiber#3888- Fixes and improvements for limiter middleware by
@gabyin gofiber/fiber#3899Full Changelog: https://github.com/gofiber/fiber/compare/v2.52.10...v2.52.11
v2.52.10
🐛 Bug Fixes
- Handle invalid path in filesystem by
@rokostikin gofiber/fiber#3688- Fix recover middleware panic output formatting by
@ReneWerner87in gofiber/fiber#3818- Fix enforcement of Immutable config for some edge cases by
@gabyin gofiber/fiber#3835📚 Documentation
- Document RoutePatternMatch by
@ReneWerner87in gofiber/fiber#3723New Contributors
@rokostikmade their first contribution in gofiber/fiber#3688Full Changelog: https://github.com/gofiber/fiber/compare/v2.52.9...v2.52.10
v2.52.9
🐛 Bug Fixes
- Add upper index limit for parsers by
@gabyin gofiber/fiber#3503- Embedded struct parsing by
@ReneWerner87in gofiber/fiber#3478- Fix Content-Type comparison in
Is()by@gabyin gofiber/fiber#3537- Fix MIME type equality checks by
@gabyin gofiber/fiber#3603Full Changelog: https://github.com/gofiber/fiber/compare/v2.52.8...v2.52.9
v2.52.8
👮 Security
- Fix for BodyParser - GHSA-hg3g-gphw-5hhm
... (truncated)
Commits
6cba195Bump fiber package version to 2.52.125ebbee7docs: update image paths to v2 in README files5028167Merge commit from fork42380aafix: adapt tests for v2 - use defer/recover pattern and correct Handler signa...7cffe29refactor: use helper function for param route generation in tests5494de8🐛 bug: add panic for routes with >30 parameters (GHSA-mrq8-rjmw-wpq3)65b0f3dBump version to 2.52.111b53334Modernize error handling in UUID functions (#3941)eb874b6Merge commit from fork4ff945a🩹 bug: Fix ErrorHandler invocation for mounted sub-apps (#3907)- Additional commits viewable in compare view
Updates github.com/gofiber/fiber/v2 from 2.48.0 to 2.52.12
Release notes
Sourced from github.com/gofiber/fiber/v2's releases.
v2.52.12
🐛 Fixes
- CVE fix GHSA-mrq8-rjmw-wpq3
Full Changelog: https://github.com/gofiber/fiber/compare/v2.52.11...v2.52.12
v2.52.11
What's Changed
🧹 Updates
- Improve mount functionality by
@gabyin gofiber/fiber#3900🐛 Bug Fixes
- Backport defensive copying fixes from #3828 and #3829 to v2 by
@sixcolorsin gofiber/fiber#3888- Fixes and improvements for limiter middleware by
@gabyin gofiber/fiber#3899Full Changelog: https://github.com/gofiber/fiber/compare/v2.52.10...v2.52.11
v2.52.10
🐛 Bug Fixes
- Handle invalid path in filesystem by
@rokostikin gofiber/fiber#3688- Fix recover middleware panic output formatting by
@ReneWerner87in gofiber/fiber#3818- Fix enforcement of Immutable config for some edge cases by
@gabyin gofiber/fiber#3835📚 Documentation
- Document RoutePatternMatch by
@ReneWerner87in gofiber/fiber#3723New Contributors
@rokostikmade their first contribution in gofiber/fiber#3688Full Changelog: https://github.com/gofiber/fiber/compare/v2.52.9...v2.52.10
v2.52.9
🐛 Bug Fixes
- Add upper index limit for parsers by
@gabyin gofiber/fiber#3503- Embedded struct parsing by
@ReneWerner87in gofiber/fiber#3478- Fix Content-Type comparison in
Is()by@gabyin gofiber/fiber#3537- Fix MIME type equality checks by
@gabyin gofiber/fiber#3603Full Changelog: https://github.com/gofiber/fiber/compare/v2.52.8...v2.52.9
v2.52.8
👮 Security
- Fix for BodyParser - GHSA-hg3g-gphw-5hhm
... (truncated)
Commits
6cba195Bump fiber package version to 2.52.125ebbee7docs: update image paths to v2 in README files5028167Merge commit from fork42380aafix: adapt tests for v2 - use defer/recover pattern and correct Handler signa...7cffe29refactor: use helper function for param route generation in tests5494de8🐛 bug: add panic for routes with >30 parameters (GHSA-mrq8-rjmw-wpq3)65b0f3dBump version to 2.52.111b53334Modernize error handling in UUID functions (#3941)eb874b6Merge commit from fork4ff945a🩹 bug: Fix ErrorHandler invocation for mounted sub-apps (#3907)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore <dependency name> major versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)@dependabot ignore <dependency name> minor versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)@dependabot ignore <dependency name>will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)@dependabot unignore <dependency name>will remove all of the ignore conditions of the specified dependency@dependabot unignore <dependency name> <ignore condition>will remove the ignore condition of the specified dependency and ignore conditions
You can disable automated security fix PRs for this repo from the Security Alerts page.
Package Dependencies
github.com/gofiber/fiber/v2
go
2.51.0 → 2.52.12
Minor
github.com/golang-jwt/jwt/v5
go
5.0.0 → 5.2.2
Minor
github.com/go-jose/go-jose/v3
go
3.0.0 → 3.0.4
Patch
Security Advisories
Fiber panics when fiber.Ctx.BodyParser parses invalid range index
jwt-go allows excessive memory allocation during header parsing
DoS in go-jose Parsing
Fiber has a Denial of Service Vulnerability via Route Parameter Overflow
Technical Details
| ID: | 14114314 |
| UUID: | 3986400249 |
| Node ID: | PR_kwDOCIafrM7GEn24 |
| Host: | GitHub |
| Repository: | github/codeql |