From 97a11788217ad9ccf4a6992a9e30c4d395d4b82f Mon Sep 17 00:00:00 2001 From: Hakan Ertas Date: Sun, 19 Feb 2023 00:55:39 +0100 Subject: [PATCH] Updating "x/text" to prevent CVE-2022-32149 golang.org/x/text 0.3.7 version is vulnerable. I did the necessary changes as the latest version (0.7.0) CVE-2022-32149 -- https://avd.aquasec.com/nvd/cve-2022-32149 --- go.mod | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/go.mod b/go.mod index e3ad60e0..72089e3a 100644 --- a/go.mod +++ b/go.mod @@ -32,7 +32,7 @@ require ( github.com/spf13/pflag v1.0.5 // indirect github.com/subosito/gotenv v1.3.0 // indirect github.com/zclconf/go-cty v1.1.0 // indirect - golang.org/x/text v0.3.7 // indirect + golang.org/x/text v0.7.0 // indirect gopkg.in/ini.v1 v1.66.4 // indirect gopkg.in/yaml.v2 v2.4.0 // indirect gopkg.in/yaml.v3 v3.0.0 // indirect