Skip to content

fix(deps): update dependencies (major) #116

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Apr 30, 2025

This PR contains the following updates:

Package Change Age Adoption Passing Confidence Type Update
github.com/docker/docker v27.5.1+incompatible -> v28.1.1+incompatible age adoption passing confidence require major
github.com/google/go-github/v68 v68.0.0 -> v71.0.0 age adoption passing confidence require major
golangci/golangci-lint v1.64.8 -> v2.1.5 age adoption passing confidence stage major

Release Notes

docker/docker (github.com/docker/docker)

v28.1.1+incompatible

Compare Source

v28.1.0+incompatible

Compare Source

v28.0.4+incompatible

Compare Source

v28.0.3+incompatible

Compare Source

v28.0.2+incompatible

Compare Source

v28.0.1+incompatible

Compare Source

v28.0.0+incompatible

Compare Source

google/go-github (github.com/google/go-github/v68)

v71.0.0

Compare Source

This release contains the following breaking API changes:

  • feat!: Add ListReactionOptions to all ListxxReactions functions to enable filter by content (#​3532)
    BREAKING CHANGE: ListCommentReactionOptions => ListReactionOptions and all List*Reactions methods now use it.

...and the following additional changes:

  • Bump go-github from v69 to v70 in /scrape (#​3521)
  • Path escape fix in UserService.GetPackage() (#​3522)
  • Update openapi (#​3526)
  • feat: Add support for Issue Types API (#​3525)
  • build(deps): bump github.com/golang-jwt/jwt/v4 from 4.5.1 to 4.5.2 in /example (#​3528)
  • build(deps): bump the actions group with 2 updates (#​3530)
  • build(deps): bump github.com/getkin/kin-openapi from 0.130.0 to 0.131.0 in /tools (#​3531)
  • Add ListReleaseReactions and DeleteReleaseReaction (#​3533)
  • feat: Add actions_macos field to APIMeta struct (#​3535)
  • fix: Isolate HTTP transports in parallel tests to prevent connection issues (#​3529)
  • chore: Remove redundant in Go 1.22 loop variables (#​3537)
  • fix: Add back repository field in Package struct (#​3539)
  • Bump version of go-github to v71.0.0 (#​3540)

v70.0.0

Compare Source

This release contains the following breaking API changes:

  • feat!: Add support for network-configurations endpoints for organization (#​3511)
    BREAKING CHANGE: EnterpriseNetwork* structs have been replaced with Network* structs.
  • refactor!: Update package types to align with webhook event (#​3515)
    BREAKING CHANGE: PackageVersion.Body and PackageVersion.Metadata are both now json.RawMessage.

...and the following additional changes:

  • build(deps): bump github.com/alecthomas/kong from 1.8.0 to 1.8.1 in /tools (#​3485)
  • build(deps): bump github.com/google/go-github/v69 from 69.0.0 to 69.2.0 in /scrape (#​3483)
  • build(deps): bump github.com/google/go-cmp from 0.6.0 to 0.7.0 in /tools (#​3490)
  • Bump github.com/google/go-cmp from 0.6.0 to 0.7.0 (#​3494)
  • build(deps): bump actions/cache from 4.2.0 to 4.2.1 in the actions group (#​3492)
  • fix: Resolve '400 Custom domains' error on GitHub Enterprise Server (#​3489)
  • Correct the runIDFromURLRE regex to properly match the callbackURL (#​3495)
  • feat: Add support for GitHub-hosted runner API endpoints (#​3487)
  • feat: Add support for network-configurations endpoints (#​3497)
  • build(deps): bump codecov/codecov-action from 5.3.1 to 5.4.0 (#​3500)
  • build(deps): bump actions/cache from 4.2.1 to 4.2.2 in the actions group (#​3499)
  • Add created_at field to Reaction (#​3501)
  • Add reason parameter to MergeGroupEvent (#​3508)
  • fix(ci): ensure 'auto' toolchain applies to generate (#​3436)
  • Bump dependency versions from dependabot warnings (#​3512)
  • Bump go-jose to v4.0.5 (#​3513)
  • build(deps): bump golang.org/x/net from 0.33.0 to 0.36.0 in /example (#​3514)
  • docs: Update readme and examples for updated go-github-ratelimit and introduce go-github-pagination (#​3504)
  • Add validity filter to secret scanning alert list options (#​3516)
  • build(deps): bump github.com/alecthomas/kong from 1.8.1 to 1.9.0 in /tools (#​3518)
  • build(deps): bump github.com/getkin/kin-openapi from 0.129.0 to 0.130.0 in /tools (#​3517)
  • feat: Add automatic_copilot_code_review_enabled parameter to ruleset API (#​3506)
  • Bump version of go-github to v70.0.0 (#​3520)

v69.2.0

Compare Source

This minor release contains the following changes:

  • Add helper to get runID from Custom Deployment Protection Rule Event (#​3476)
  • feat: Add JSON marshal tests for dependabot alerts (#​3480)
  • feat: Add sorting list options for secret scanning (#​3481)
  • Bump version of go-github to v69.2.0 (#​3482)

v69.1.0

Compare Source

This minor release contains the following changes:

  • Bump go-github from v68 to v69 in /scrape (#​3464)
  • Use a max retry after duration for secondary rate limit if specified (#​3438)
  • docs: Clarify ListPullRequestsWithCommit usage (#​3465)
  • fix: go 1.22 test breakage (#​3459)
  • feat: Add link to bored-engineer/github-conditional-http-transport to conditional requests documentation (#​3469)
  • build(deps): bump golang.org/x/sync from 0.10.0 to 0.11.0 in /tools (#​3472)
  • build(deps): bump golang.org/x/net from 0.34.0 to 0.35.0 in /scrape (#​3470)
  • build(deps): bump github.com/alecthomas/kong from 1.7.0 to 1.8.0 in /tools (#​3471)
  • Update workflow and tools to use Go1.24 and 1.23 (#​3474)
  • chore: Only use master test runs for status badge (#​3475)
  • feat: Add ListProvisionedScimGroupsForEnterprise inside SCIM service (#​3467)
  • fix: Add missing query params to AlertListOptions (#​3477)
  • Bump version of go-github to v69.1.0 (#​3478)

v69.0.0

Compare Source

This release contains the following breaking API changes:

  • feat!: Add support for enterprise rulesets (#​3417)
    BREAKING CHANGE: Create*Ruleset and Update*Ruleset now pass ruleset parameter by-value instead of by-reference.
  • fix!: Typo in field names in the CheckSuite struct (#​3444)
    BREAKING CHANGE: Rerequstable=>Rerequestable, RunsRerequstable=>RunsRerequestable
  • fix!: Typo in field names in the PullStats struct (#​3445)
    BREAKING CHANGE: MergablePulls=>MergeablePulls, UnmergablePulls=>UnmergeablePulls
  • refactor!: Do not capitalize error strings (#​3446)
    BREAKING CHANGE: Some error strings are slightly modified - please do not rely on error text in general.
  • fix!: Refactor the repository ruleset code (#​3430)
    BREAKING CHANGES: The following types have been renamed:
    • Ruleset -> RepositoryRuleset
    • RulesetLink -> RepositoryRulesetLink
    • RulesetLinks -> RepositoryRulesetLinks
    • RulesetRefConditionParameters -> RepositoryRulesetRefConditionParameters
    • RulesetRepositoryNamesConditionParameters -> RepositoryRulesetRepositoryNamesConditionParameters
    • RulesetRepositoryIDsConditionParameters -> RepositoryRulesetRepositoryIDsConditionParameters
    • RulesetRepositoryPropertyTargetParameters -> Repository
    • RulesetRepositoryPropertyConditionParameters -> RepositoryRulesetRepositoryPropertyConditionParameters
    • RulesetOrganizationNamesConditionParameters -> RepositoryRulesetOrganizationNamesConditionParameters
    • RulesetOrganizationIDsConditionParameters -> RepositoryRulesetOrganizationIDsConditionParameters
    • RulesetConditions -> RepositoryRulesetConditions
    • RepositoryRulesetEditedChanges -> RepositoryRulesetChanges
    • RepositoryRulesetEditedSource -> RepositoryRulesetChangeSource
    • RepositoryRulesetEditedSources -> RepositoryRulesetChangeSources
    • RepositoryRulesetEditedConditions -> RepositoryRulesetUpdatedConditions
    • RepositoryRulesetUpdatedConditionsEdited -> RepositoryRulesetUpdatedCondition
    • RepositoryRulesetEditedRules -> RepositoryRulesetChangedRules
    • RepositoryRulesetUpdatedRules -> RepositoryRulesetUpdatedRules
    • RepositoryRulesetEditedRuleChanges -> RepositoryRulesetChangedRule
  • chore!: Add sliceofpointers custom linter (#​3447)
    BREAKING CHANGE: ListOAuthApps now returns ([]*OAuthApp, error) instead of ([]OAuthApp, error).
  • feat!: Change User.InheritedFrom to a slice (#​3460)
    BREAKING CHANGE: User.InheritedFrom is changed from a *Team to a []*Team.

...and the following additional changes:

  • Bump go-github from v67 to v68 in /scrape (#​3398)
  • build(deps): bump golang.org/x/net from 0.32.0 to 0.33.0 in /scrape (#​3400)
  • build(deps): bump codecov/codecov-action from 5.1.1 to 5.1.2 (#​3401)
  • Bump golang.org/x/net to v0.33.0 (#​3402)
  • Add TokenID and TokenName to PersonalAccessToken struct (#​3404)
  • Bump github.com/PuerkitoBio/goquery from 1.9.2 to 1.10.1 in /scrape (#​3408)
  • Bump Go to 1.22.10 or 1.23.4 in go.mod files (#​3410)
  • Add opt-in rate limit support on endpoints returning 302s (#​3411)
  • Update OpenAPI (#​3419)
  • build(deps): bump golang.org/x/net from 0.33.0 to 0.34.0 in /scrape (#​3420)
  • Permit toggling rate limit check by consumers (#​3386)
  • build(deps): Pin and group actions/* (#​3424)
  • Add deprecation messages to security managers APIs (#​3426)
  • fix: Relax go directive in go.mod to 1.22.0 (#​3423)
  • Enforce toolchain requirement in generate.sh (#​3428)
  • feat: Add missing notification_setting to Team (#​3431)
  • chore: Add reviewers file (#​3435)
  • gen-accessors: Update dumping of getters (#​3437)
  • chore: Fix codecov upload (#​3440)
  • chore: Spell "unmarshal" consistently with one el (#​3441)
  • fix: Typos in func parameter, vars, error, and comments (#​3442)
  • feat: Add manage_ghes endpoints introduced in 3.15 (#​3433)
  • Fix minor typo (#​3448)
  • chore: Check and fix license headers (#​3449)
  • Add new fields for IssueType (#​3451)
  • ci: update golangci-lint to v1.63.4 (#​3452)
  • Extend Rate and Rate Limiting with X-Ratelimit-Used and X-Ratelimit-Resource headers (#​3453)
  • build(deps): bump actions/setup-go from 5.2.0 to 5.3.0 in the actions group (#​3454)
  • build(deps): bump codecov/codecov-action from 5.1.2 to 5.3.1 (#​3455)
  • docs: Add clarifications for mergeable field in pull requests (#​3396)
  • build(deps): bump github.com/alecthomas/kong from 1.6.0 to 1.7.0 in /tools (#​3458)
  • Bump version of go-github to v69.0.0 (#​3463)
golangci/golangci-lint (golangci/golangci-lint)

v2.1.5

Compare Source

Due to an error related to Snapcraft, some artifacts of the v2.1.4 release have not been published.

This release contains the same things as v2.1.3.

v2.1.4

Compare Source

Due to an error related to Snapcraft, some artifacts of the v2.1.3 release have not been published.

This release contains the same things as v2.1.3.

v2.1.3

Compare Source

  1. Linters bug fixes
    • fatcontext: from 0.7.2 to 0.8.0
  2. Misc.
    • migration: fix nakedret.max-func-lines: 0
    • migration: fix order of staticcheck settings
    • fix: add go.mod hash to the cache salt
    • fix: use diagnostic position for related information position

v2.1.2

Compare Source

  1. Linters bug fixes
    • exptostd: from 0.4.2 to 0.4.3
    • gofumpt: from 0.7.0 to 0.8.0
    • protogetter: from 0.3.13 to 0.3.15
    • usetesting: from 0.4.2 to 0.4.3

v2.1.1

Compare Source

The release process of v2.1.0 failed due to a regression inside goreleaser.

The binaries of v2.1.0 have been published, but not the other artifacts (AUR, Docker, etc.).

v2.1.0

Compare Source

  1. Enhancements
    • Add an option to display absolute paths (--path-mode=abs)
    • Add configuration path placeholder (${config-path})
    • Add warn-unused option for fmt command
    • Colored diff for fmt command (golangci-lint fmt --diff-colored)
  2. New linters
  3. Linters new features or changes
    • go-errorlint: from 1.7.1 to 1.8.0 (automatic error comparison and type assertion fixes)
    • ⚠️ goconst: ignore-strings is deprecated and replaced by ignore-string-values
    • goconst: from 1.7.1 to 1.8.1 (new options: find-duplicates, eval-const-expressions)
    • govet: add httpmux analyzer
    • nilnesserr: from 0.1.2 to 0.2.0 (detect more cases)
    • paralleltest: from 1.0.10 to 1.0.14 (checks only _test.go files)
    • revive: from 1.7.0 to 1.9.0 (support kebab case for setting names)
    • sloglint: from 0.9.0 to 0.11.0 (autofix, new option msg-style, suggest slog.DiscardHandler)
    • wrapcheck: from 2.10.0 to 2.11.0 (new option report-internal-errors)
    • wsl: from 4.6.0 to 4.7.0 (cgo files are always excluded)
  4. Linters bug fixes
    • fatcontext: from 0.7.1 to 0.7.2
    • gocritic: fix importshadow checker
    • gosec: from 2.22.2 to 2.22.3
    • ireturn: from 0.3.1 to 0.4.0
    • loggercheck: from 0.10.1 to 0.11.0
    • nakedret: from 2.0.5 to 2.0.6
    • nonamedreturns: from 1.0.5 to 1.0.6
    • protogetter: from 0.3.12 to 0.3.13
    • testifylint: from 1.6.0 to 1.6.1
    • unconvert: update to HEAD
  5. Misc.
    • Fixes memory leaks when using go1.(N) with golangci-lint built with go1.(N-X)
    • Adds golangci-lint-fmt pre-commit hook
  6. Documentation
    • Improvements
    • Updates section about vscode integration

v2.0.2

Compare Source

  1. Misc.
    • Fixes flags parsing for formatters
    • Fixes the filepath used by the exclusion source option
  2. Documentation
    • Adds a section about flags migration
    • Cleaning pages with v1 options

v2.0.1

Compare Source

  1. Linters/formatters bug fixes
    • golines: fix settings during linter load
  2. Misc.
    • Validates the version field before the configuration
    • forbidigo: fix migration

v2.0.0

Compare Source

  1. Enhancements
  2. New linters/formatters
  3. Linters new features
    • ⚠️ Merge staticcheck, stylecheck, gosimple into one linter (staticcheck) (cf. Migration guide)
    • go-critic: from 0.12.0 to 0.13.0
    • gomodguard: from 1.3.5 to 1.4.1 (block explicit indirect dependencies)
    • nilnil: from 1.0.1 to 1.1.0 (new option: only-two)
    • perfsprint: from 0.8.2 to 0.9.1 (checker name in the diagnostic message)
    • staticcheck: new quickfix set of rules
    • testifylint: from 1.5.2 to 1.6.0 (new options: equal-values, suite-method-signature, require-string-msg)
    • wsl: from 4.5.0 to 4.6.0 (new option: allow-cuddle-used-in-block)
  4. Linters bug fixes
    • bidichk: from 0.3.2 to 0.3.3
    • errchkjson: from 0.4.0 to 0.4.1
    • errname: from 1.0.0 to 1.1.0
    • funlen: fix ignore-comments option
    • gci: from 0.13.5 to 0.13.6
    • gosmopolitan: from 1.2.2 to 1.3.0
    • inamedparam: from 0.1.3 to 0.2.0
    • intrange: from 0.3.0 to 0.3.1
    • protogetter: from 0.3.9 to 0.3.12
    • unparam: from 8a5130c to 0df0534
  5. Misc.
    • 🧹 Configuration options renaming (cf. Migration guide)
    • 🧹 Remove options (cf. Migration guide)
    • 🧹 Remove flags (cf. Migration guide)
    • 🧹 Remove alternative names (cf. Migration guide)
    • 🧹 Remove or replace deprecated elements (cf. Migration guide)
    • Adds an option to display some commands as JSON:
      • golangci-lint config path --json
      • golangci-lint help linters --json
      • golangci-lint help formatters --json
      • golangci-lint linters --json
      • golangci-lint formatters --json
      • golangci-lint version --json
  6. Documentation

Configuration

📅 Schedule: Branch creation - Between 08:00 AM and 08:59 AM, on day 1 of the month ( * 8 1 * * ) in timezone Australia/Sydney, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from tim-thacker-nullify as a code owner April 30, 2025 22:12
@renovate renovate bot added the patch Patch version updates (fixes) label Apr 30, 2025
Copy link
Contributor Author

renovate bot commented Apr 30, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.22.7 -> 1.23.0

@nullify-latest
Copy link
Contributor

nullify-latest bot commented Apr 30, 2025

Nullify Container Vulnerabilities

Container vulnerabilities occur due to misconfigurations, outdated software, or unpatched security flaws in containerized applications.

Severity Threshold: 🟡 HIGH

16 Vulnerabilities found in image: golangci/golangci-lint:v2.1.5@sha256:88a8cc6bd17bc81a0cc97f401d25427b47394d664f16e5ca15d4156563d32154

Total Vulnerabilities 🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
16 2 14 0 0

FROM golangci/golangci-lint:v2.1.5@sha256:88a8cc6bd17bc81a0cc97f401d25427b47394d664f16e5ca15d4156563d32154 as golangci-lint

View Vulnerable Packages

Package: debian:wget Version: 1.21.3-1+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 0 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-38428 CRITICAL 9.10 5.20 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Package: debian:zlib1g Version: 1:1.2.13.dfsg-1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 0 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-45853 CRITICAL 9.80 5.90 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:libexpat1 Version: 2.5.0-1+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-52425 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Package: debian:libldap-2.5-0 Version: 2.5.13+dfsg-5 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-2953 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Package: debian:libpam-modules Version: 1.5.2-6+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20

Package: debian:libpam-modules-bin Version: 1.5.2-6+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20

Package: debian:libpam-runtime Version: 1.5.2-6+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20

Package: debian:libpam0g Version: 1.5.2-6+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20

Package: debian:libperl5.36 Version: 5.36.0-7+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:libpython3.11-minimal Version: 3.11.2-6+deb12u5 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Package: debian:libpython3.11-stdlib Version: 3.11.2-6+deb12u5 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Package: debian:perl Version: 5.36.0-7+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:perl-base Version: 5.36.0-7+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:perl-modules-5.36 Version: 5.36.0-7+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:python3.11 Version: 3.11.2-6+deb12u5 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Package: debian:python3.11-minimal Version: 3.11.2-6+deb12u5 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Alternative Images

golangci/golangci-lint:latest@sha256:88a8cc6bd17bc81a0cc97f401d25427b47394d664f16e5ca15d4156563d32154

Total Vulnerabilities 🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
16 2 14 0 0
View Vulnerable Packages

Package: debian:wget Version: 1.21.3-1+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 0 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-38428 CRITICAL 9.10 5.20 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Package: debian:zlib1g Version: 1:1.2.13.dfsg-1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 0 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-45853 CRITICAL 9.80 5.90 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:libexpat1 Version: 2.5.0-1+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-52425 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Package: debian:libldap-2.5-0 Version: 2.5.13+dfsg-5 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-2953 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Package: debian:libpam-modules Version: 1.5.2-6+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20

Package: debian:libpam-modules-bin Version: 1.5.2-6+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20

Package: debian:libpam-runtime Version: 1.5.2-6+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20

Package: debian:libpam0g Version: 1.5.2-6+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20

Package: debian:libperl5.36 Version: 5.36.0-7+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:libpython3.11-minimal Version: 3.11.2-6+deb12u5 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Package: debian:libpython3.11-stdlib Version: 3.11.2-6+deb12u5 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Package: debian:perl Version: 5.36.0-7+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:perl-base Version: 5.36.0-7+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:perl-modules-5.36 Version: 5.36.0-7+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:python3.11 Version: 3.11.2-6+deb12u5 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Package: debian:python3.11-minimal Version: 3.11.2-6+deb12u5 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

golangci/golangci-lint:v2.1.5-alpine@sha256:eff222d3ac17f7e2a12dbe757cb33c2dc7899cd5bfae4432594e558a1e1e0228

Total Vulnerabilities 🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 0 0

@renovate renovate bot force-pushed the renovate/major-dependencies branch from b76e46f to 8991d95 Compare May 1, 2025 01:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
patch Patch version updates (fixes)
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants