Skip to content

Conversation

@dependabot
Copy link

@dependabot dependabot bot commented on behalf of github Oct 30, 2025

Bumps the go_modules group with 7 updates in the / directory:

Package From To
github.com/ethereum/go-ethereum 1.13.11 1.13.15
github.com/gin-gonic/gin 1.8.1 1.9.1
google.golang.org/protobuf 1.31.0 1.33.0
github.com/containerd/containerd 1.7.12 1.7.27
github.com/docker/docker 25.0.2+incompatible 25.0.13+incompatible
github.com/btcsuite/btcd 0.22.1 0.24.2
github.com/consensys/gnark-crypto 0.12.1 0.18.1

Updates github.com/ethereum/go-ethereum from 1.13.11 to 1.13.15

Release notes

Sourced from github.com/ethereum/go-ethereum's releases.

Ontamalca (v1.13.15)

Geth v1.13.15 is a maintenance-release that contains some fixes mainly to avoid snapsync-related data-corruption.

We recommend all users to upgrade to v1.13.15 as soon as possible.


As with all our previous releases, you can find the:

Altaaya (v1.13.14)

Geth v1.13.14 is a small maintenance release with a handful of polishes to the blob pool:

  • Disallow blob transactions below the protocol minimum of 1 wei to enter the pool (#29081).
  • Reduce the blob pool's max capacity to 2.5GB for the rollout. (#29090).
  • Fix gas estimation for blob transactions (#29085).

This release is NOT critical for the Cancun fork, but recommended to make Geth lighter in anticipation to unknown blob load.

Other fixes:

  • Support overriding the basefee during tracing (#29051).
  • Fix call tracers missing top level logs in top-only mode (#29068).
  • Support unlimited gas for eth_createAccessList if --gascap=0 (#28846).

For a full rundown of the changes please consult the Geth 1.13.14 release milestone.


As with all our previous releases, you can find the:

Alsages (v1.13.13)

This is a minor release with fixes for several issues related to the upcoming Cancun mainnet fork. As such, it is recommended for all mainnet users.

Changes in this release:

  • Block-building performance with blob transactions has been improved a lot. (#29026, #29008, #29005)
  • A corner case in the EVM related to out-of-order fork scheduling has been fixed. (#29023)
  • eth_fillTransaction has seen some bug fixes related to blob transactions as well. (#28929, #29037)
  • A rare panic in the ethstats client related to chain reorgs is resolved. (#29020)
  • The blobpool database will now recover from disk corruption faults instead of crashing geth on startup. (#29001)

... (truncated)

Commits
  • c5ba367 params: release Geth v 1.13.15
  • 35e0525 core, eth/protocols/snap, trie: fix cause for snap-sync corruption, implement...
  • 7bcb553 eth/filters: enforce topic-limit early on filter criterias (#29535)
  • e343ddf core/rawdb: add sanity-limit to header accessor (#29534)
  • 5dcf503 eth/protocols/snap: skip retrieval for completed storages (#29378)
  • 2bd6bd0 Merge branch 'master' into release/1.13
  • 9038ba6 params: release Geth v1.13.14
  • 51b479e core/txpool: elevate the 'already reserved' error into a constant (#29095)
  • 5a0f468 eth/tracers: Fix callTracer logs on onlyTopCall == true (#29068)
  • 45a272c core/txpool: no need to log loud rotate if no local txs (#29083)
  • Additional commits viewable in compare view

Updates github.com/gin-gonic/gin from 1.8.1 to 1.9.1

Release notes

Sourced from github.com/gin-gonic/gin's releases.

v1.9.1

Changelog

BUG FIXES

  • fix Request.Context() checks #3512

SECURITY

  • fix lack of escaping of filename in Content-Disposition #3556

ENHANCEMENTS

  • refactor: use bytes.ReplaceAll directly #3455
  • convert strings and slices using the officially recommended way #3344
  • improve render code coverage #3525

DOCS

  • docs: changed documentation link for trusted proxies #3575
  • chore: improve linting, testing, and GitHub Actions setup #3583

v1.9.0

Changelog

BREAK CHANGES

  • Stop useless panicking in context and render #2150

BUG FIXES

  • fix(router): tree bug where loop index is not decremented. #3460
  • fix(context): panic on NegotiateFormat - index out of range #3397
  • Add escape logic for header #3500 and #3503

SECURITY

  • Fix the GO-2022-0969 and GO-2022-0288 vulnerabilities #3333
  • fix(security): vulnerability GO-2023-1571 #3505

ENHANCEMENTS

  • feat: add sonic json support #3184
  • chore(file): Creates a directory named path #3316
  • fix: modify interface check way #3327
  • remove deprecated of package io/ioutil #3395
  • refactor: avoid calling strings.ToLower twice #3343
  • console logger HTTP status code bug fixed #3453
  • chore(yaml): upgrade dependency to v3 version #3456
  • chore(router): match method added to routergroup for multiple HTTP methods supporting #3464

... (truncated)

Changelog

Sourced from github.com/gin-gonic/gin's changelog.

Gin v1.9.1

BUG FIXES

  • fix Request.Context() checks #3512

SECURITY

  • fix lack of escaping of filename in Content-Disposition #3556

ENHANCEMENTS

  • refactor: use bytes.ReplaceAll directly #3455
  • convert strings and slices using the officially recommended way #3344
  • improve render code coverage #3525

DOCS

  • docs: changed documentation link for trusted proxies #3575
  • chore: improve linting, testing, and GitHub Actions setup #3583

Gin v1.9.0

BREAK CHANGES

  • Stop useless panicking in context and render #2150

BUG FIXES

  • fix(router): tree bug where loop index is not decremented. #3460
  • fix(context): panic on NegotiateFormat - index out of range #3397
  • Add escape logic for header #3500 and #3503

SECURITY

  • Fix the GO-2022-0969 and GO-2022-0288 vulnerabilities #3333
  • fix(security): vulnerability GO-2023-1571 #3505

ENHANCEMENTS

  • feat: add sonic json support #3184
  • chore(file): Creates a directory named path #3316
  • fix: modify interface check way #3327
  • remove deprecated of package io/ioutil #3395
  • refactor: avoid calling strings.ToLower twice #3343
  • console logger HTTP status code bug fixed #3453
  • chore(yaml): upgrade dependency to v3 version #3456
  • chore(router): match method added to routergroup for multiple HTTP methods supporting #3464
  • chore(http): add support for go1.20 http.rwUnwrapper to gin.responseWriter #3489

... (truncated)

Commits
  • 4ea0e64 Ready release gin 1.9.1 (by: thinkerou) (#3630)
  • bb1fc2e fix Request.Context() checks (#3512)
  • 2d4bbec fix lack of escaping of filename in Content-Disposition (#3556)
  • 9f5ecd4 chore(deps): bump actions/setup-go from 3 to 4 (#3543)
  • 20cd6bc chore(deps): bump github.com/go-playground/validator/v10 (#3610)
  • 6bdc725 Fix typos in ISSUE_TEMPLATE.md (#3616)
  • 1ab2689 chore(deps): bump golang.org/x/net from 0.9.0 to 0.10.0 (#3599)
  • 6a0556e improve render code coverage (#3525)
  • eac2daa chore: update dependencies for various packages and libraries (#3585)
  • 757a638 chore: improve linting, testing, and GitHub Actions setup (#3583)
  • Additional commits viewable in compare view

Updates google.golang.org/protobuf from 1.31.0 to 1.33.0

Updates github.com/containerd/containerd from 1.7.12 to 1.7.27

Release notes

Sourced from github.com/containerd/containerd's releases.

containerd 1.7.27

Welcome to the v1.7.27 release of containerd!

The twenty-seventh patch release for containerd 1.7 contains various fixes and updates.

Highlights

  • Fix integer overflow in User ID handling (GHSA-265r-hfxg-fhmg)
  • Update image type checks to avoid unnecessary logs for attestations (#11538)

Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.

Contributors

  • Jin Dong
  • Akhil Mohan
  • Derek McGowan
  • Maksym Pavlenko
  • Paweł Gronowski
  • Phil Estes
  • Akihiro Suda
  • Craig Ingram
  • Krisztian Litkey
  • Samuel Karp

Changes

  • 05044ec0a Merge commit from fork
  • 11504c3fc validate uid/gid
  • Prepare release notes for v1.7.27 (#11540)
    • 1be04be6c Prepare release notes for v1.7.27
  • Update image type checks to avoid unnecessary logs for attestations (#11538)
    • 82b5c43fe core/remotes: Handle attestations in MakeRefKey
    • 2c670e79b core/images: Ignore attestations when traversing children
  • update build to go1.23.7, test go1.24.1 (#11515)
    • a39863c9f update build to go1.23.7, test go1.24.1
  • Remove hashicorp/go-multierror dependency and fix CI (#11499)
    • 49537b3a7 e2e: use the shim bundled with containerd artifact
    • fe490b76f Bump up github.com/intel/goresctrl to 0.5.0
    • 13fc9d313 update containerd/project-checks to 1.2.1
    • 585699c94 Remove unnecessary joinError unwrap
    • 4b9df59be Remove hashicorp/go-multierror
  • go.{mod,sum}: bump CDI deps to v0.8.1. (#11422)
    • 5ba28f8dc go.{mod,sum}: bump CDI deps to v0.8.1, re-vendor.
  • CI: arm64-8core-32gb -> ubuntu-24.04-arm (#11437)
    • 85f10bd92 CI: arm64-8core-32gb -> ubuntu-24.04-arm

... (truncated)

Commits
  • 05044ec Merge commit from fork
  • 0b7f2a5 Merge pull request #11540 from dmcgowan/prepare-1.7.27
  • 574a304 Merge pull request #11538 from dmcgowan/backport-11327
  • 1be04be Prepare release notes for v1.7.27
  • 82b5c43 core/remotes: Handle attestations in MakeRefKey
  • 2c670e7 core/images: Ignore attestations when traversing children
  • 11504c3 validate uid/gid
  • 576178b Merge pull request #11515 from akhilerm/1.7-updatego1.24.1
  • a39863c update build to go1.23.7, test go1.24.1
  • 8946aa0 Merge pull request #11499 from djdongjin/1-7-remove-hashi-multierror
  • Additional commits viewable in compare view

Updates github.com/docker/docker from 25.0.2+incompatible to 25.0.13+incompatible

Release notes

Sourced from github.com/docker/docker's releases.

v25.0.13

25.0.13

For a full list of pull requests and changes in this release, refer to the relevant GitHub milestone:

Bug fixes and enhancements

  • Prevent restoration of iptables rules for deleted networks and containers on firewalld reload. moby/moby#50445
  • Fix Swarm services becoming unreachable from published ports after a firewalld reload. moby/moby#50445
  • Improve the reliability of the Swarm overlay network control plane by fixing longstanding issues with NetworkDB. moby/moby#50511
  • Improve the reliability of Swarm overlay container networks by fixing longstanding issues with the overlay network driver. moby/moby#50551

v25.0.12

25.0.12

For a full list of pull requests and changes in this release, refer to the relevant GitHub milestone:

Bug fixes and enhancements

  • Fix an issue where all new tasks in the Swarm could get stuck in the PENDING state forever after scaling up a service with placement preferences. moby/moby#50203
  • Fix an issue which made DNS service discovery for Swarm services unreliable. moby/moby#50230

Packaging updates

v25.0.11

25.0.11

For a full list of pull requests and changes in this release, refer to the relevant GitHub milestone:

Networking

Known Issues

Full Changelog: moby/moby@v25.0.10...v25.0.11

v25.0.10

25.0.10

For a full list of pull requests and changes in this release, refer to the relevant GitHub milestone:

... (truncated)

Commits
  • 165516e Merge pull request #50551 from corhere/backport-25.0/libn/all-the-overlay-fixes
  • f099e91 libnetwork: handle coalesced endpoint events
  • bace1b8 libnetwork/d/overlay: handle coalesced peer updates
  • f9e5429 libn/d/win/overlay: dedupe NetworkDB definitions
  • fc3df55 libn/d/overlay: extract hashable address types
  • b22872a libnetwork/driverapi: make EventNotify optional
  • c7e17ae libn/networkdb: report prev value in update events
  • d60c71a libnetwork/d/overlay: fix logical race conditions
  • ad54b8f libn/d/overlay: fix encryption race conditions
  • 8075689 libn/d/overlay: inline secMapWalk into only caller
  • Additional commits viewable in compare view

Updates github.com/btcsuite/btcd from 0.22.1 to 0.24.2

Release notes

Sourced from github.com/btcsuite/btcd's releases.

v0.24.2

This release includes important bug fixes related to subtle interactions related to re-orgs and the UTXO set cache. These fixed are considered security critical.

This release also includes implementations of invalidateblock and reconsiderblock which can be useful in helping nodes that were afflicted by the aforementioned bugs to recover without needing to resync the entire chain.

WIth this release, btcd now also implements the testmempoolaccept RPC which can be useful to check a transaction candidate for validity from a policy and conflict perspective before broadcasting. Along the way, we've added some additional policy checks that exist in other Bitcoin full node implementations.

This release also contains fixes to some parsing issues discovered via fuzz testing.

Finally, as mentioned above release includes important security fixes, with full details to be disclosed in 90 days.

What's Changed

... (truncated)

Commits

Updates github.com/consensys/gnark-crypto from 0.12.1 to 0.18.1

Release notes

Sourced from github.com/consensys/gnark-crypto's releases.

v0.18.1

Full Changelog: Consensys/gnark-crypto@v0.18.0...v0.18.1

v0.18.0

What's Changed

New Contributors

Full Changelog: Consensys/gnark-crypto@v0.17.0...v0.18.0

v0.17.0

What's Changed

New Contributors

... (truncated)

Changelog

Sourced from github.com/consensys/gnark-crypto's changelog.

[v0.18.1] - 2025-10-23

Perf

  • limit memory allocation during Vector deserialization (#759)

[v0.18.0] - 2025-06-09

Build

  • deps: bump golang.org/x/crypto from 0.33.0 to 0.35.0 (#677)

Chore

  • remove unused benchmark script (#675)

Docs

  • replace outdated link to article (#690)

Experiment

  • vortex on koalabear (#645)

Feat

  • remove dependency on internal package in ecc.go (#693)
  • make <31 bit field generated using uint32 (#676)

Fix

  • remove unimplemented path from fft ext
  • Eisenstein Half-GCD convergence (#680)

Perf

  • adds avx512 poseidon2 for small fields (#665)
  • remove useless copies in e4 mul by elem (#667)
  • disable cobra bit reverse for small fields (#662)

Refactor

  • hash to curve (#674)

[v0.17.0] - 2025-03-11

Chore

  • remove useless github workflow
  • generify poseidon2 parameters for other curves/fr (#636)
  • add auto close PR workflow (#638)

Feat

  • baby-bear and koala-bear extensions of degree 4 (#643)
  • poseidon2 for koala-bear, baby-bear and goldilocks (#629)
  • add sis avx512 and fft avx512 for koalabear (#622)
  • add Grumpkin elliptic curve (2-cycle with BN254) (#625)
  • Poseidon2 Hash Instantiation for BLS12-377 (#623)

... (truncated)

Commits

Updates golang.org/x/crypto from 0.17.0 to 0.35.0

Commits
  • 7292932 ssh: limit the size of the internal packet queue while waiting for KEX
  • f66f74b acme/autocert: check host policy before probing the cache
  • b0784b7 x509roots/fallback: drop obsolete build constraint
  • 911360c all: bump golang.org/x/crypto dependencies of asm generators
  • 89ff08d all: upgrade go directive to at least 1.23.0 [generated]
  • e47973b all: update certs for go1.24
  • 9290511 go.mod: update golang.org/x dependencies
  • fa5273e x509roots/fallback: update bundle
  • a8ea4be ssh: add ServerConfig.PreAuthConnCallback, ServerPreAuthConn (banner) interface
  • 71d3a4c acme: support challenges that require the ACME client to send a non-empty JSO...
  • Additional commits viewable in compare view

Updates golang.org/x/net from 0.18.0 to 0.33.0

Commits
  • dfc720d go.mod: update golang.org/x dependencies
  • 8e66b04 html: use strings.EqualFold instead of lowering ourselves
  • b935f7b html: avoid endless loop on error token
  • 9af49ef route: remove unused sizeof* consts
  • 6705db9 quic: clean up crypto streams when dropping packet protection keys
  • 4ef7588 quic: handle ACK frame in packet which drops number space
  • 552d8ac Revert "route: change from syscall to x/sys/unix"
  • 13a7c01 Revert "route: remove unused sizeof* consts on freebsd"
  • 285e1cf go.mod: update golang.org/x dependencies
  • d0a1049 route: remove unused sizeof* consts on freebsd
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps the go_modules group with 7 updates in the / directory:

| Package | From | To |
| --- | --- | --- |
| [github.com/ethereum/go-ethereum](https://github.com/ethereum/go-ethereum) | `1.13.11` | `1.13.15` |
| [github.com/gin-gonic/gin](https://github.com/gin-gonic/gin) | `1.8.1` | `1.9.1` |
| google.golang.org/protobuf | `1.31.0` | `1.33.0` |
| [github.com/containerd/containerd](https://github.com/containerd/containerd) | `1.7.12` | `1.7.27` |
| [github.com/docker/docker](https://github.com/docker/docker) | `25.0.2+incompatible` | `25.0.13+incompatible` |
| [github.com/btcsuite/btcd](https://github.com/btcsuite/btcd) | `0.22.1` | `0.24.2` |
| [github.com/consensys/gnark-crypto](https://github.com/consensys/gnark-crypto) | `0.12.1` | `0.18.1` |



Updates `github.com/ethereum/go-ethereum` from 1.13.11 to 1.13.15
- [Release notes](https://github.com/ethereum/go-ethereum/releases)
- [Commits](ethereum/go-ethereum@v1.13.11...v1.13.15)

Updates `github.com/gin-gonic/gin` from 1.8.1 to 1.9.1
- [Release notes](https://github.com/gin-gonic/gin/releases)
- [Changelog](https://github.com/gin-gonic/gin/blob/master/CHANGELOG.md)
- [Commits](gin-gonic/gin@v1.8.1...v1.9.1)

Updates `google.golang.org/protobuf` from 1.31.0 to 1.33.0

Updates `github.com/containerd/containerd` from 1.7.12 to 1.7.27
- [Release notes](https://github.com/containerd/containerd/releases)
- [Changelog](https://github.com/containerd/containerd/blob/main/RELEASES.md)
- [Commits](containerd/containerd@v1.7.12...v1.7.27)

Updates `github.com/docker/docker` from 25.0.2+incompatible to 25.0.13+incompatible
- [Release notes](https://github.com/docker/docker/releases)
- [Commits](moby/moby@v25.0.2...v25.0.13)

Updates `github.com/btcsuite/btcd` from 0.22.1 to 0.24.2
- [Release notes](https://github.com/btcsuite/btcd/releases)
- [Changelog](https://github.com/btcsuite/btcd/blob/master/CHANGES)
- [Commits](btcsuite/btcd@v0.22.1...v0.24.2)

Updates `github.com/consensys/gnark-crypto` from 0.12.1 to 0.18.1
- [Release notes](https://github.com/consensys/gnark-crypto/releases)
- [Changelog](https://github.com/Consensys/gnark-crypto/blob/v0.18.1/CHANGELOG.md)
- [Commits](Consensys/gnark-crypto@v0.12.1...v0.18.1)

Updates `golang.org/x/crypto` from 0.17.0 to 0.35.0
- [Commits](golang/crypto@v0.17.0...v0.35.0)

Updates `golang.org/x/net` from 0.18.0 to 0.33.0
- [Commits](golang/net@v0.18.0...v0.33.0)

---
updated-dependencies:
- dependency-name: github.com/ethereum/go-ethereum
  dependency-version: 1.13.15
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: github.com/gin-gonic/gin
  dependency-version: 1.9.1
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: google.golang.org/protobuf
  dependency-version: 1.33.0
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: github.com/containerd/containerd
  dependency-version: 1.7.27
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: github.com/docker/docker
  dependency-version: 25.0.13+incompatible
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: github.com/btcsuite/btcd
  dependency-version: 0.24.2
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: github.com/consensys/gnark-crypto
  dependency-version: 0.18.1
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: golang.org/x/crypto
  dependency-version: 0.35.0
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: golang.org/x/net
  dependency-version: 0.33.0
  dependency-type: direct:production
  dependency-group: go_modules
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Oct 30, 2025
@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Oct 30, 2025

Labels

The following labels could not be found: gomod. Please create it before Dependabot can add it to a pull request.

Please fix the above issues or remove invalid values from dependabot.yml.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant