Bump golang.org/x/net to v0.53.0 to fix GO-2026-4918 (release-1.34)#1440
Conversation
Fixes govulncheck CI failure caused by infinite loop vulnerability in HTTP/2 transport (golang.org/x/net/http2).
|
This issue is currently awaiting triage. If cloud-provider-aws contributors determine this is a relevant issue, they will accept it by applying the The DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
Hi @howard-junec. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Tip We noticed you've done this a few times! Consider joining the org to skip this step and gain Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
/ok-to-test |
|
/release-note-none |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: kmala The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What type of PR is this?
/kind cleanup
What this PR does / why we need it:
Bumps golang.org/x/net to v0.53.0 to fix govulncheck CI failure caused by GO-2026-4918 (infinite loop in HTTP/2 transport).
Which issue(s) this PR fixes:
Fixes govulncheck CI failure on release-1.34 branch.
Special notes for your reviewer:
Also bumps transitive dependencies (golang.org/x/crypto, mod, sync, sys, term, text, tools) as required by go mod tidy.
Does this PR introduce a user-facing change?: