<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Latest commits for branch codeberg-10</title>
    <link>https://codeberg.org/Codeberg-Infrastructure/forgejo/branch/codeberg-10</link>
    <description>The code deployed to Codeberg. If you want to deploy Forgejo yourself or work on the code, check out:</description>
    <pubDate>Wed, 04 Mar 2026 02:28:45 +0100</pubDate>
    <item>
      <title>CB/fix: set `exec/os.Cmd.WaitDelay` to non-zero value</title>
      <link>https://codeberg.org/Codeberg-Infrastructure/forgejo/commit/c0d1172d25877f15be888f3602bdf82bc89a270c</link>
      <description>CB/fix: set `exec/os.Cmd.WaitDelay` to non-zero value&#xA;&#xA;Related to push mirror getting stuck because of ghost Git proceses.&#xA;</description>
      <content:encoded><![CDATA[CB/fix: set `exec/os.Cmd.WaitDelay` to non-zero value

Related to push mirror getting stuck because of ghost Git proceses.
]]></content:encoded>
      <author>Gusted</author>
      <guid>c0d1172d25877f15be888f3602bdf82bc89a270c</guid>
      <pubDate>Wed, 09 Apr 2025 21:06:00 +0200</pubDate>
    </item>
    <item>
      <title>cb/bp: avoid sorting team names for `ComposeMetas`</title>
      <link>https://codeberg.org/Codeberg-Infrastructure/forgejo/commit/f5e0ee53a4d461ed9ba1a9665d60fa5cc5581abb</link>
      <description>cb/bp: avoid sorting team names for `ComposeMetas`&#xA;&#xA;- `ComposeMetas` is called to compose meta information for the markdown processer (which is called a lot), one of those information is the team names that have access to the repository. This is used to decide if a mention is a team mention or not.&#xA;- The SQL query sorts the names, this is unnecessary and not required for within the processer; it does a simple `strings.Contains(teams, &#34;,&#34;+teamName+&#34;,&#34;)`, which doesn&#39;t rely on sorted values.&#xA;- Doing the SQL query with sorting against Codeberg&#39;s MariaDB took ~0.180s and without sorting took ~0.03s. Although the returned values are often a few rows (the query I tested returned 8 values) it seems that doing any sorting will create an temporary index and is mainly optimized where it has to sort a huge amount of rows.&#xA;&#xA;Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/7223&#xA;Reviewed-by: 0ko &lt;0ko@noreply.codeberg.org&gt;&#xA;Reviewed-by: Otto &lt;otto@codeberg.org&gt;&#xA;Co-authored-by: Gusted &lt;postmaster@gusted.xyz&gt;&#xA;Co-committed-by: Gusted &lt;postmaster@gusted.xyz&gt;&#xA;(cherry picked from commit 511148dbc3b18df56cef1dfd2f0f84b88930684c)&#xA;</description>
      <content:encoded><![CDATA[cb/bp: avoid sorting team names for `ComposeMetas`

- `ComposeMetas` is called to compose meta information for the markdown processer (which is called a lot), one of those information is the team names that have access to the repository. This is used to decide if a mention is a team mention or not.
- The SQL query sorts the names, this is unnecessary and not required for within the processer; it does a simple `strings.Contains(teams, ","+teamName+",")`, which doesn't rely on sorted values.
- Doing the SQL query with sorting against Codeberg's MariaDB took ~0.180s and without sorting took ~0.03s. Although the returned values are often a few rows (the query I tested returned 8 values) it seems that doing any sorting will create an temporary index and is mainly optimized where it has to sort a huge amount of rows.

Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/7223
Reviewed-by: 0ko <0ko@noreply.codeberg.org>
Reviewed-by: Otto <otto@codeberg.org>
Co-authored-by: Gusted <postmaster@gusted.xyz>
Co-committed-by: Gusted <postmaster@gusted.xyz>
(cherry picked from commit 511148dbc3b18df56cef1dfd2f0f84b88930684c)
]]></content:encoded>
      <author>Gusted</author>
      <guid>f5e0ee53a4d461ed9ba1a9665d60fa5cc5581abb</guid>
      <pubDate>Wed, 02 Apr 2025 17:45:17 +0200</pubDate>
    </item>
    <item>
      <title>Update to latest Forgejo v10</title>
      <link>https://codeberg.org/Codeberg-Infrastructure/forgejo/commit/4d22de6ff9ce9172c8c89bf6f15e7a5c2b19a564</link>
      <description>Update to latest Forgejo v10&#xA;</description>
      <content:encoded><![CDATA[Update to latest Forgejo v10
]]></content:encoded>
      <author>Gusted</author>
      <guid>4d22de6ff9ce9172c8c89bf6f15e7a5c2b19a564</guid>
      <pubDate>Wed, 02 Apr 2025 17:36:19 +0200</pubDate>
    </item>
    <item>
      <title>cb/chore: lift issue and comment restriction for @joostdecock</title>
      <link>https://codeberg.org/Codeberg-Infrastructure/forgejo/commit/0eeda24c59319a1f7fe75f9debe05fca80c15e94</link>
      <description>cb/chore: lift issue and comment restriction for @joostdecock&#xA;&#xA;Context: https://codeberg.org/Codeberg-e.V./Discussion/issues/129&#xA;This commit can be dropped in a few weeks.&#xA;</description>
      <content:encoded><![CDATA[cb/chore: lift issue and comment restriction for @joostdecock

Context: https://codeberg.org/Codeberg-e.V./Discussion/issues/129
This commit can be dropped in a few weeks.
]]></content:encoded>
      <author>Gusted</author>
      <guid>0eeda24c59319a1f7fe75f9debe05fca80c15e94</guid>
      <pubDate>Wed, 02 Apr 2025 17:36:08 +0200</pubDate>
    </item>
    <item>
      <title>Update module golang.org/x/net to v0.38.0 (v10.0/forgejo) (#7369)</title>
      <link>https://codeberg.org/Codeberg-Infrastructure/forgejo/commit/2f6718c9e864b5928b3e2fb4647fb0c2ac123f7f</link>
      <description>Update module golang.org/x/net to v0.38.0 (v10.0/forgejo) (#7369)&#xA;&#xA;Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/7369&#xA;Reviewed-by: Gusted &lt;gusted@noreply.codeberg.org&gt;&#xA;Co-authored-by: Renovate Bot &lt;forgejo-renovate-action@forgejo.org&gt;&#xA;Co-committed-by: Renovate Bot &lt;forgejo-renovate-action@forgejo.org&gt;&#xA;</description>
      <content:encoded><![CDATA[Update module golang.org/x/net to v0.38.0 (v10.0/forgejo) (#7369)

Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/7369
Reviewed-by: Gusted <gusted@noreply.codeberg.org>
Co-authored-by: Renovate Bot <forgejo-renovate-action@forgejo.org>
Co-committed-by: Renovate Bot <forgejo-renovate-action@forgejo.org>
]]></content:encoded>
      <author>Renovate Bot</author>
      <guid>2f6718c9e864b5928b3e2fb4647fb0c2ac123f7f</guid>
      <pubDate>Fri, 28 Mar 2025 13:09:56 +0000</pubDate>
    </item>
    <item>
      <title>cb/fix: Drop forgejo Makefile dependency</title>
      <link>https://codeberg.org/Codeberg-Infrastructure/forgejo/commit/a74a7de7c7947ac0c99448fe3f17e0a04308fb2b</link>
      <description>cb/fix: Drop forgejo Makefile dependency&#xA;</description>
      <content:encoded><![CDATA[cb/fix: Drop forgejo Makefile dependency
]]></content:encoded>
      <author>Codeberg Build Maintainers</author>
      <guid>a74a7de7c7947ac0c99448fe3f17e0a04308fb2b</guid>
      <pubDate>Tue, 25 Mar 2025 23:56:45 +0000</pubDate>
    </item>
    <item>
      <title>Update to latest Forgejo v10</title>
      <link>https://codeberg.org/Codeberg-Infrastructure/forgejo/commit/ebf1f5b1ce74216eb872222869095c6012e6d032</link>
      <description>Update to latest Forgejo v10&#xA;</description>
      <content:encoded><![CDATA[Update to latest Forgejo v10
]]></content:encoded>
      <author>Codeberg Build Maintainers</author>
      <guid>ebf1f5b1ce74216eb872222869095c6012e6d032</guid>
      <pubDate>Sun, 23 Mar 2025 23:42:40 +0000</pubDate>
    </item>
    <item>
      <title>[v10.0/forgejo] fix: use correct input for strip slashes middleware (#7306)</title>
      <link>https://codeberg.org/Codeberg-Infrastructure/forgejo/commit/dde3f51c72feffac4805fc3133b6a681d8c97c6f</link>
      <description>[v10.0/forgejo] fix: use correct input for strip slashes middleware (#7306)&#xA;&#xA;**Backport:** https://codeberg.org/forgejo/forgejo/pulls/7295&#xA;&#xA;- The router must use the escaped path in order to ensure correct functionality (at least, that is what they say). However `req.URL.Path` shouldn&#39;t be set to the escaped path, which is fixed in this patch.&#xA;- Simplify the logic and no longer try to use `rctx.RoutePath`, this is only useful if the middleware was placed after some routing parsing was done.&#xA;- Resolves forgejo/forgejo#7294&#xA;- Resolves forgejo/forgejo#7292&#xA;- Add unit test&#xA;&#xA;&lt;!--start release-notes-assistant--&gt;&#xA;&#xA;## Release notes&#xA;&lt;!--URL:https://codeberg.org/forgejo/forgejo--&gt;&#xA;- Bug fixes&#xA;  - [PR](https://codeberg.org/forgejo/forgejo/pulls/7295): &lt;!--number 7295 --&gt;&lt;!--line 0 --&gt;&lt;!--description dXNlIGNvcnJlY3QgaW5wdXQgZm9yIHN0cmlwIHNsYXNoZXMgbWlkZGxld2FyZQ==--&gt;use correct input for strip slashes middleware&lt;!--description--&gt;&#xA;&lt;!--end release-notes-assistant--&gt;&#xA;&#xA;Co-authored-by: Gusted &lt;postmaster@gusted.xyz&gt;&#xA;Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/7306&#xA;Co-authored-by: forgejo-backport-action &lt;forgejo-backport-action@noreply.codeberg.org&gt;&#xA;Co-committed-by: forgejo-backport-action &lt;forgejo-backport-action@noreply.codeberg.org&gt;&#xA;</description>
      <content:encoded><![CDATA[[v10.0/forgejo] fix: use correct input for strip slashes middleware (#7306)

**Backport:** https://codeberg.org/forgejo/forgejo/pulls/7295

- The router must use the escaped path in order to ensure correct functionality (at least, that is what they say). However `req.URL.Path` shouldn't be set to the escaped path, which is fixed in this patch.
- Simplify the logic and no longer try to use `rctx.RoutePath`, this is only useful if the middleware was placed after some routing parsing was done.
- Resolves forgejo/forgejo#7294
- Resolves forgejo/forgejo#7292
- Add unit test

<!--start release-notes-assistant-->

## Release notes
<!--URL:https://codeberg.org/forgejo/forgejo-->
- Bug fixes
  - [PR](https://codeberg.org/forgejo/forgejo/pulls/7295): <!--number 7295 --><!--line 0 --><!--description dXNlIGNvcnJlY3QgaW5wdXQgZm9yIHN0cmlwIHNsYXNoZXMgbWlkZGxld2FyZQ==-->use correct input for strip slashes middleware<!--description-->
<!--end release-notes-assistant-->

Co-authored-by: Gusted <postmaster@gusted.xyz>
Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/7306
Co-authored-by: forgejo-backport-action <forgejo-backport-action@noreply.codeberg.org>
Co-committed-by: forgejo-backport-action <forgejo-backport-action@noreply.codeberg.org>
]]></content:encoded>
      <author>forgejo-backport-action</author>
      <guid>dde3f51c72feffac4805fc3133b6a681d8c97c6f</guid>
      <pubDate>Sat, 22 Mar 2025 17:30:28 +0000</pubDate>
    </item>
    <item>
      <title>Update module golang.org/x/net to v0.36.0 [SECURITY] (v10.0/forgejo) (#7303)</title>
      <link>https://codeberg.org/Codeberg-Infrastructure/forgejo/commit/0f5182d0c630dc77777c00cabe485f700881dcf9</link>
      <description>Update module golang.org/x/net to v0.36.0 [SECURITY] (v10.0/forgejo) (#7303)&#xA;&#xA;This PR contains the following updates:&#xA;&#xA;| Package | Type | Update | Change |&#xA;|---|---|---|---|&#xA;| [golang.org/x/net](https://pkg.go.dev/golang.org/x/net) | require | minor | [`v0.33.0` -&gt; `v0.36.0`](https://cs.opensource.google/go/x/net/+/refs/tags/v0.33.0...refs/tags/v0.36.0) |&#xA;&#xA;---&#xA;&#xA;&gt; ⚠️ **Warning**&#xA;&gt;&#xA;&gt; Some dependencies could not be looked up. Check the Dependency Dashboard for more information.&#xA;&#xA;---&#xA;&#xA;### HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net&#xA;[CVE-2025-22870](https://nvd.nist.gov/vuln/detail/CVE-2025-22870) / [GHSA-qxp5-gwg8-xv66](https://github.com/advisories/GHSA-qxp5-gwg8-xv66) / [GO-2025-3503](https://pkg.go.dev/vuln/GO-2025-3503)&#xA;&#xA;&lt;details&gt;&#xA;&lt;summary&gt;More information&lt;/summary&gt;&#xA;&#xA;#### Details&#xA;Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to &#34;*.example.com&#34;, a request to &#34;[::1%25.example.com]:80` will incorrectly match and not be proxied.&#xA;&#xA;#### Severity&#xA;Unknown&#xA;&#xA;#### References&#xA;- [https://go.dev/cl/654697](https://go.dev/cl/654697)&#xA;- [https://go.dev/issue/71984](https://go.dev/issue/71984)&#xA;&#xA;This data is provided by [OSV](https://osv.dev/vulnerability/GO-2025-3503) and the [Go Vulnerability Database](https://github.com/golang/vulndb) ([CC-BY 4.0](https://github.com/golang/vulndb#license)).&#xA;&lt;/details&gt;&#xA;&#xA;---&#xA;&#xA;### HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net&#xA;[CVE-2025-22870](https://nvd.nist.gov/vuln/detail/CVE-2025-22870) / [GHSA-qxp5-gwg8-xv66](https://github.com/advisories/GHSA-qxp5-gwg8-xv66) / [GO-2025-3503](https://pkg.go.dev/vuln/GO-2025-3503)&#xA;&#xA;&lt;details&gt;&#xA;&lt;summary&gt;More information&lt;/summary&gt;&#xA;&#xA;#### Details&#xA;Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to &#34;*.example.com&#34;, a request to &#34;[::1%25.example.com]:80` will incorrectly match and not be proxied.&#xA;&#xA;#### Severity&#xA;- CVSS Score: 4.4 / 10 (Medium)&#xA;- Vector String: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L`&#xA;&#xA;#### References&#xA;- [https://nvd.nist.gov/vuln/detail/CVE-2025-22870](https://nvd.nist.gov/vuln/detail/CVE-2025-22870)&#xA;- [https://go-review.googlesource.com/q/project:net](https://go-review.googlesource.com/q/project:net)&#xA;- [https://go.dev/cl/654697](https://go.dev/cl/654697)&#xA;- [https://go.dev/issue/71984](https://go.dev/issue/71984)&#xA;- [https://pkg.go.dev/vuln/GO-2025-3503](https://pkg.go.dev/vuln/GO-2025-3503)&#xA;- [http://www.openwall.com/lists/oss-security/2025/03/07/2](http://www.openwall.com/lists/oss-security/2025/03/07/2)&#xA;&#xA;This data is provided by [OSV](https://osv.dev/vulnerability/GHSA-qxp5-gwg8-xv66) and the [GitHub Advisory Database](https://github.com/github/advisory-database) ([CC-BY 4.0](https://github.com/github/advisory-database/blob/main/LICENSE.md)).&#xA;&lt;/details&gt;&#xA;&#xA;---&#xA;&#xA;### Configuration&#xA;&#xA;📅 **Schedule**: Branch creation - &#34;&#34; (UTC), Automerge - &#34;* 0-3 * * *&#34; (UTC).&#xA;&#xA;🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied.&#xA;&#xA;♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.&#xA;&#xA;🔕 **Ignore**: Close this PR and you won&#39;t be reminded about this update again.&#xA;&#xA;---&#xA;&#xA; - [ ] &lt;!-- rebase-check --&gt;If you want to rebase/retry this PR, check this box&#xA;&#xA;---&#xA;&#xA;This PR has been generated by [Renovate Bot](https://github.com/renovatebot/renovate).&#xA;&lt;!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzOS4yMDUuMSIsInVwZGF0ZWRJblZlciI6IjM5LjIwNS4xIiwidGFyZ2V0QnJhbmNoIjoidjEwLjAvZm9yZ2VqbyIsImxhYmVscyI6WyJkZXBlbmRlbmN5LXVwZ3JhZGUiLCJ0ZXN0L25vdC1uZWVkZWQiXX0=--&gt;&#xA;&#xA;Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/7303&#xA;Reviewed-by: Earl Warren &lt;earl-warren@noreply.codeberg.org&gt;&#xA;Co-authored-by: Renovate Bot &lt;forgejo-renovate-action@forgejo.org&gt;&#xA;Co-committed-by: Renovate Bot &lt;forgejo-renovate-action@forgejo.org&gt;&#xA;</description>
      <content:encoded><![CDATA[Update module golang.org/x/net to v0.36.0 [SECURITY] (v10.0/forgejo) (#7303)

This PR contains the following updates:

| Package | Type | Update | Change |
|---|---|---|---|
| [golang.org/x/net](https://pkg.go.dev/golang.org/x/net) | require | minor | [`v0.33.0` -> `v0.36.0`](https://cs.opensource.google/go/x/net/+/refs/tags/v0.33.0...refs/tags/v0.36.0) |

---

> ⚠️ **Warning**
>
> Some dependencies could not be looked up. Check the Dependency Dashboard for more information.

---

### HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net
[CVE-2025-22870](https://nvd.nist.gov/vuln/detail/CVE-2025-22870) / [GHSA-qxp5-gwg8-xv66](https://github.com/advisories/GHSA-qxp5-gwg8-xv66) / [GO-2025-3503](https://pkg.go.dev/vuln/GO-2025-3503)

<details>
<summary>More information</summary>

#### Details
Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

#### Severity
Unknown

#### References
- [https://go.dev/cl/654697](https://go.dev/cl/654697)
- [https://go.dev/issue/71984](https://go.dev/issue/71984)

This data is provided by [OSV](https://osv.dev/vulnerability/GO-2025-3503) and the [Go Vulnerability Database](https://github.com/golang/vulndb) ([CC-BY 4.0](https://github.com/golang/vulndb#license)).
</details>

---

### HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net
[CVE-2025-22870](https://nvd.nist.gov/vuln/detail/CVE-2025-22870) / [GHSA-qxp5-gwg8-xv66](https://github.com/advisories/GHSA-qxp5-gwg8-xv66) / [GO-2025-3503](https://pkg.go.dev/vuln/GO-2025-3503)

<details>
<summary>More information</summary>

#### Details
Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

#### Severity
- CVSS Score: 4.4 / 10 (Medium)
- Vector String: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L`

#### References
- [https://nvd.nist.gov/vuln/detail/CVE-2025-22870](https://nvd.nist.gov/vuln/detail/CVE-2025-22870)
- [https://go-review.googlesource.com/q/project:net](https://go-review.googlesource.com/q/project:net)
- [https://go.dev/cl/654697](https://go.dev/cl/654697)
- [https://go.dev/issue/71984](https://go.dev/issue/71984)
- [https://pkg.go.dev/vuln/GO-2025-3503](https://pkg.go.dev/vuln/GO-2025-3503)
- [http://www.openwall.com/lists/oss-security/2025/03/07/2](http://www.openwall.com/lists/oss-security/2025/03/07/2)

This data is provided by [OSV](https://osv.dev/vulnerability/GHSA-qxp5-gwg8-xv66) and the [GitHub Advisory Database](https://github.com/github/advisory-database) ([CC-BY 4.0](https://github.com/github/advisory-database/blob/main/LICENSE.md)).
</details>

---

### Configuration

📅 **Schedule**: Branch creation - "" (UTC), Automerge - "* 0-3 * * *" (UTC).

🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update again.

---

 - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box

---

This PR has been generated by [Renovate Bot](https://github.com/renovatebot/renovate).
<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzOS4yMDUuMSIsInVwZGF0ZWRJblZlciI6IjM5LjIwNS4xIiwidGFyZ2V0QnJhbmNoIjoidjEwLjAvZm9yZ2VqbyIsImxhYmVscyI6WyJkZXBlbmRlbmN5LXVwZ3JhZGUiLCJ0ZXN0L25vdC1uZWVkZWQiXX0=-->

Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/7303
Reviewed-by: Earl Warren <earl-warren@noreply.codeberg.org>
Co-authored-by: Renovate Bot <forgejo-renovate-action@forgejo.org>
Co-committed-by: Renovate Bot <forgejo-renovate-action@forgejo.org>
]]></content:encoded>
      <author>Renovate Bot</author>
      <guid>0f5182d0c630dc77777c00cabe485f700881dcf9</guid>
      <pubDate>Sat, 22 Mar 2025 16:47:19 +0000</pubDate>
    </item>
    <item>
      <title>Update module golang.org/x/oauth2 to v0.27.0 [SECURITY] (v10.0/forgejo) (#7304)</title>
      <link>https://codeberg.org/Codeberg-Infrastructure/forgejo/commit/a35a3b6731fc4403e2b2b95fdfc436501d20c416</link>
      <description>Update module golang.org/x/oauth2 to v0.27.0 [SECURITY] (v10.0/forgejo) (#7304)&#xA;&#xA;This PR contains the following updates:&#xA;&#xA;| Package | Type | Update | Change |&#xA;|---|---|---|---|&#xA;| [golang.org/x/oauth2](https://pkg.go.dev/golang.org/x/oauth2) | require | minor | [`v0.23.0` -&gt; `v0.27.0`](https://cs.opensource.google/go/x/oauth2/+/refs/tags/v0.23.0...refs/tags/v0.27.0) |&#xA;&#xA;---&#xA;&#xA;&gt; ⚠️ **Warning**&#xA;&gt;&#xA;&gt; Some dependencies could not be looked up. Check the Dependency Dashboard for more information.&#xA;&#xA;---&#xA;&#xA;### Unexpected memory consumption during token parsing in golang.org/x/oauth2&#xA;[CVE-2025-22868](https://nvd.nist.gov/vuln/detail/CVE-2025-22868) / [GO-2025-3488](https://pkg.go.dev/vuln/GO-2025-3488)&#xA;&#xA;&lt;details&gt;&#xA;&lt;summary&gt;More information&lt;/summary&gt;&#xA;&#xA;#### Details&#xA;An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.&#xA;&#xA;#### Severity&#xA;Unknown&#xA;&#xA;#### References&#xA;- [https://go.dev/cl/652155](https://go.dev/cl/652155)&#xA;- [https://go.dev/issue/71490](https://go.dev/issue/71490)&#xA;&#xA;This data is provided by [OSV](https://osv.dev/vulnerability/GO-2025-3488) and the [Go Vulnerability Database](https://github.com/golang/vulndb) ([CC-BY 4.0](https://github.com/golang/vulndb#license)).&#xA;&lt;/details&gt;&#xA;&#xA;---&#xA;&#xA;### Configuration&#xA;&#xA;📅 **Schedule**: Branch creation - &#34;&#34; (UTC), Automerge - &#34;* 0-3 * * *&#34; (UTC).&#xA;&#xA;🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied.&#xA;&#xA;♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.&#xA;&#xA;🔕 **Ignore**: Close this PR and you won&#39;t be reminded about this update again.&#xA;&#xA;---&#xA;&#xA; - [ ] &lt;!-- rebase-check --&gt;If you want to rebase/retry this PR, check this box&#xA;&#xA;---&#xA;&#xA;This PR has been generated by [Renovate Bot](https://github.com/renovatebot/renovate).&#xA;&lt;!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzOS4yMDUuMSIsInVwZGF0ZWRJblZlciI6IjM5LjIwNS4xIiwidGFyZ2V0QnJhbmNoIjoidjEwLjAvZm9yZ2VqbyIsImxhYmVscyI6WyJkZXBlbmRlbmN5LXVwZ3JhZGUiLCJ0ZXN0L25vdC1uZWVkZWQiXX0=--&gt;&#xA;&#xA;Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/7304&#xA;Reviewed-by: Earl Warren &lt;earl-warren@noreply.codeberg.org&gt;&#xA;Co-authored-by: Renovate Bot &lt;forgejo-renovate-action@forgejo.org&gt;&#xA;Co-committed-by: Renovate Bot &lt;forgejo-renovate-action@forgejo.org&gt;&#xA;</description>
      <content:encoded><![CDATA[Update module golang.org/x/oauth2 to v0.27.0 [SECURITY] (v10.0/forgejo) (#7304)

This PR contains the following updates:

| Package | Type | Update | Change |
|---|---|---|---|
| [golang.org/x/oauth2](https://pkg.go.dev/golang.org/x/oauth2) | require | minor | [`v0.23.0` -> `v0.27.0`](https://cs.opensource.google/go/x/oauth2/+/refs/tags/v0.23.0...refs/tags/v0.27.0) |

---

> ⚠️ **Warning**
>
> Some dependencies could not be looked up. Check the Dependency Dashboard for more information.

---

### Unexpected memory consumption during token parsing in golang.org/x/oauth2
[CVE-2025-22868](https://nvd.nist.gov/vuln/detail/CVE-2025-22868) / [GO-2025-3488](https://pkg.go.dev/vuln/GO-2025-3488)

<details>
<summary>More information</summary>

#### Details
An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.

#### Severity
Unknown

#### References
- [https://go.dev/cl/652155](https://go.dev/cl/652155)
- [https://go.dev/issue/71490](https://go.dev/issue/71490)

This data is provided by [OSV](https://osv.dev/vulnerability/GO-2025-3488) and the [Go Vulnerability Database](https://github.com/golang/vulndb) ([CC-BY 4.0](https://github.com/golang/vulndb#license)).
</details>

---

### Configuration

📅 **Schedule**: Branch creation - "" (UTC), Automerge - "* 0-3 * * *" (UTC).

🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update again.

---

 - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box

---

This PR has been generated by [Renovate Bot](https://github.com/renovatebot/renovate).
<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzOS4yMDUuMSIsInVwZGF0ZWRJblZlciI6IjM5LjIwNS4xIiwidGFyZ2V0QnJhbmNoIjoidjEwLjAvZm9yZ2VqbyIsImxhYmVscyI6WyJkZXBlbmRlbmN5LXVwZ3JhZGUiLCJ0ZXN0L25vdC1uZWVkZWQiXX0=-->

Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/7304
Reviewed-by: Earl Warren <earl-warren@noreply.codeberg.org>
Co-authored-by: Renovate Bot <forgejo-renovate-action@forgejo.org>
Co-committed-by: Renovate Bot <forgejo-renovate-action@forgejo.org>
]]></content:encoded>
      <author>Renovate Bot</author>
      <guid>a35a3b6731fc4403e2b2b95fdfc436501d20c416</guid>
      <pubDate>Sat, 22 Mar 2025 15:53:21 +0000</pubDate>
    </item>
  </channel>
</rss>