mirror of
https://github.com/fatedier/frp.git
synced 2026-05-15 08:05:49 -06:00
[PR #3962] [CLOSED] fix(sec): upgrade github.com/quic-go/quic-go to 0.40.1 #4872
Labels
No labels
In Progress
WIP
WaitingForInfo
bug
doc
duplicate
easy
enhancement
future
help wanted
invalid
lifecycle/stale
need-issue-template
need-usage-help
no plan
proposal
pull-request
question
todo
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/frp#4872
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/fatedier/frp/pull/3962
Author: @chncaption
Created: 1/31/2024
Status: ❌ Closed
Base:
dev← Head:oscs_fix_cmst0k0au51oj0c3u33g📝 Commits (1)
b4a6269update github.com/quic-go/quic-go v0.37.4 to 0.40.1📊 Changes
2 files changed (+12 additions, -3 deletions)
View changed files
📝
go.mod(+4 -3)📝
go.sum(+8 -0)📄 Description
What happened?
There are 1 security vulnerabilities found in github.com/quic-go/quic-go v0.37.4
What did I do?
Upgrade github.com/quic-go/quic-go from v0.37.4 to 0.40.1 for vulnerability fix
What did you expect to happen?
Ideally, no insecure libs should be used.
How can we automate the detection of these types of issues?
By using the GitHub Actions configurations provided by murphysec, we can conduct automatic code security checks in our CI pipeline.
The specification of the pull request
PR Specification from OSCS
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.