Skip to content

fix(deps): vuln minor: github.com/alexflint/go-arg, github.com/gin-gonic/gin #27

Open
gh-worker-campaigns-3e9aa4[bot] wants to merge 1 commit intomainfrom
engraver-auto-version-upgrade/minorpatch/go/1-1775069632
Open

fix(deps): vuln minor: github.com/alexflint/go-arg, github.com/gin-gonic/gin #27
gh-worker-campaigns-3e9aa4[bot] wants to merge 1 commit intomainfrom
engraver-auto-version-upgrade/minorpatch/go/1-1775069632

Conversation

@gh-worker-campaigns-3e9aa4
Copy link
Copy Markdown

Summary: Security update — 2 packages upgraded (MINOR changes included)

Manifests changed:

  • . (go)

✅ Action Required: Please review the changes below. If they look good, approve and merge this PR.


Updates

Package From To Type Vulnerabilities Fixed
github.com/gin-gonic/gin v1.7.7 v1.12.0 minor 5 MODERATE
github.com/alexflint/go-arg v1.4.3 v1.6.1 minor -

Packages marked with "-" are updated due to dependency constraints.


Security Details

ℹ️ Other Vulnerabilities (5)
Package CVE Severity Summary Unsafe Version Fixed In
github.com/gin-gonic/gin GHSA-3vp4-m3rf-835h MODERATE Improper input validation in github.com/gin-gonic/gin v1.7.7 1.9.0
github.com/gin-gonic/gin CVE-2023-26125 MODERATE - v1.7.7 -
github.com/gin-gonic/gin GHSA-2c4m-59x9-fr2g MODERATE Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment function v1.7.7 1.9.1
github.com/gin-gonic/gin CVE-2023-29401 MODERATE - v1.7.7 -
github.com/gin-gonic/gin GO-2023-1737 MODERATE Improper handling of filenames in Content-Disposition HTTP header in github.com/gin-gonic/gin v1.7.7 1.9.1
⚠️ Dependencies that have Reached EOL (2)
Dependency Unsafe Version EOL Date New Version Path
github.com/alexflint/go-arg v1.4.3 - v1.6.1 go.mod
github.com/gin-gonic/gin v1.7.7 - v1.12.0 go.mod

Review Checklist

Standard review:

  • Review changes for compatibility with your code
  • Check for breaking changes in release notes
  • Run tests locally or wait for CI
  • Approve and merge this PR

Update Mode: Vulnerability Remediation

🤖 Generated by DataDog Automated Dependency Management System

@dd-prapprover
Copy link
Copy Markdown

dd-prapprover bot commented Apr 2, 2026

PRApprover will approve and merge this PR, FAQ, #dx-source-code-management

🛠️ PRApproval Status

  • ✅ PR is eligible for auto-approval by rule dependency-management-version-updater - 2026-04-02T12:40:31Z
  • ⬜ CI tests passed
  • ⬜ Approved
  • ⬜ Merge Started
  • ⬜ Merged

➡️ Current phase: waiting for CI tests to complete...

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants