-
Notifications
You must be signed in to change notification settings - Fork 0
fix(deps): update module github.com/go-git/go-git/v5 to v5.13.0 [security] #65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
fix(deps): update module github.com/go-git/go-git/v5 to v5.13.0 [security] #65
Conversation
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
a93f0f2
to
6cd3c8d
Compare
6cd3c8d
to
c95ae75
Compare
c95ae75
to
cb2e360
Compare
cb2e360
to
0f68d36
Compare
Review the following changes in direct dependencies. Learn more about Socket for GitHub.
|
0f68d36
to
e0b9e3a
Compare
e0b9e3a
to
5ab3619
Compare
e7e7998
to
5ab3619
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Important
Looks good to me! 👍
Reviewed everything up to 5ab3619 in 1 minute and 19 seconds. Click for details.
- Reviewed
301
lines of code in2
files - Skipped
0
files when reviewing. - Skipped posting
4
draft comments. View those below. - Modify your settings and rules to customize what types of comments Ellipsis leaves. And don't forget to react with 👍 or 👎 to teach Ellipsis.
1. go.mod:3
- Draft comment:
The Go version has been updated from 1.16 to 1.21 and a toolchain directive (go1.24.4) has been added. Make sure that your code and build environment are compatible with these changes. - Reason this comment was not posted:
Comment did not seem useful. Confidence is useful =0%
<= threshold50%
This comment is purely informative and asks the PR author to ensure compatibility, which violates the rules. It does not provide a specific code suggestion or ask for a specific test to be written.
2. go.mod:10
- Draft comment:
The dependencies for github.com/go-git/go-billy/v5 and github.com/go-git/go-git/v5 have been bumped from v5.3.1/v5.4.2 to v5.6.0/v5.13.0 respectively. This update is critical to address known security vulnerabilities. Verify that any downstream usage of these libraries is fully compatible. - Reason this comment was not posted:
Comment did not seem useful. Confidence is useful =0%
<= threshold50%
The comment is discussing dependency changes and asking the author to verify compatibility, which violates the rules against commenting on dependency changes and asking for verification of compatibility.
3. go.mod:13
- Draft comment:
The github.com/stretchr/testify dependency has been upgraded from v1.8.1 to v1.10.0. Ensure that tests relying on this library are reviewed for any potential changes in behavior or API updates. - Reason this comment was not posted:
Comment did not seem useful. Confidence is useful =0%
<= threshold50%
This comment is about a dependency change, specifically an upgrade of a library version. The comment asks the PR author to ensure that tests relying on this library are reviewed for potential changes. According to the rules, comments on dependency changes or asking the author to ensure something is tested are not allowed.
4. go.sum:1
- Draft comment:
The go.sum file has been updated to reflect the new dependency versions and their checksums. This is expected, but please verify that these checksums match the official releases to ensure integrity. - Reason this comment was not posted:
Confidence changes required:0%
<= threshold50%
None
Workflow ID: wflow_Wse67tbJShA31uxW
You can customize by changing your verbosity settings, reacting with 👍 or 👎, replying to comments, or adding code review rules.
5ab3619
to
319724f
Compare
319724f
to
2a063ec
Compare
2a063ec
to
0cba71f
Compare
Coming soon: The Renovate bot (GitHub App) will be renamed to Mend. PRs from Renovate will soon appear from 'Mend'. Learn more here.
This PR contains the following updates:
v5.4.2
->v5.13.0
GitHub Vulnerability Alerts
CVE-2023-49569
Impact
A path traversal vulnerability was discovered in go-git versions prior to
v5.11
. This vulnerability allows an attacker to create and amend files across the filesystem. In the worse case scenario, remote code execution could be achieved.Applications are only affected if they are using the ChrootOS, which is the default when using "Plain" versions of Open and Clone funcs (e.g. PlainClone). Applications using BoundOS or in-memory filesystems are not affected by this issue.
This is a
go-git
implementation issue and does not affect the upstreamgit
cli.Patches
Users running versions of
go-git
fromv4
and above are recommended to upgrade tov5.11
in order to mitigate this vulnerability.Workarounds
In cases where a bump to the latest version of
go-git
is not possible in a timely manner, we recommend limiting its use to only trust-worthy Git servers.Credit
Thanks to Ionut Lalu for responsibly disclosing this vulnerability to us.
CVE-2023-49568
Impact
A denial of service (DoS) vulnerability was discovered in go-git versions prior to
v5.11
. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion ingo-git
clients.Applications using only the in-memory filesystem supported by
go-git
are not affected by this vulnerability.This is a
go-git
implementation issue and does not affect the upstreamgit
cli.Patches
Users running versions of
go-git
fromv4
and above are recommended to upgrade tov5.11
in order to mitigate this vulnerability.Workarounds
In cases where a bump to the latest version of
go-git
is not possible, we recommend limiting its use to only trust-worthy Git servers.Credit
Thanks to Ionut Lalu for responsibly disclosing this vulnerability to us.
References
CVE-2025-21613
Impact
An argument injection vulnerability was discovered in
go-git
versions prior tov5.13
.Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the
file
transport protocol is being used, as that is the only protocol that shells out togit
binaries.Affected versions
Users running versions of
go-git
fromv4
and above are recommended to upgrade tov5.13
in order to mitigate this vulnerability.Workarounds
In cases where a bump to the latest version of
go-git
is not possible, we recommend users to enforce restrict validation rules for values passed in the URL field.Credit
Thanks to @vin01 for responsibly disclosing this vulnerability to us.
CVE-2025-21614
Impact
A denial of service (DoS) vulnerability was discovered in go-git versions prior to
v5.13
. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion ingo-git
clients.This is a
go-git
implementation issue and does not affect the upstreamgit
cli.Patches
Users running versions of
go-git
fromv4
and above are recommended to upgrade tov5.13
in order to mitigate this vulnerability.Workarounds
In cases where a bump to the latest version of
go-git
is not possible, we recommend limiting its use to only trust-worthy Git servers.Credit
Thanks to Ionut Lalu for responsibly disclosing this vulnerability to us.
Release Notes
go-git/go-git (github.com/go-git/go-git/v5)
v5.13.0
Compare Source
What's Changed
git clean -x
flag. by @msuozzo in #995git clean -x
flag." by @pjbgf in #1129Untracked
while it is committed by @rodrigocam in #1023New Contributors
Full Changelog: go-git/go-git@v5.12.0...v5.13.0
v5.12.0
Compare Source
What's Changed
FastForwardMerge
support by @pjbgf in #1044New Contributors
Full Changelog: go-git/go-git@v5.11.0...v5.12.0
v5.11.0
Compare Source
What's Changed
New Contributors
Full Changelog: go-git/go-git@v5.10.1...v5.11.0
v5.10.1
Compare Source
What's Changed
New Contributors
Full Changelog: go-git/go-git@v5.10.0...v5.10.1
v5.10.0
Compare Source
What's Changed
New Contributors
Full Changelog: go-git/go-git@v5.9.0...v5.10.0
v5.9.0
Compare Source
What's Changed
New Contributors
Full Changelog: go-git/go-git@v5.8.1...v5.9.0
v5.8.1
Compare Source
What's Changed
Full Changelog: go-git/go-git@v5.8.0...v5.8.1
v5.8.0
Compare Source
What's Changed
doAddDirectory
by @ThinkChaos in #702New Contributors
Full Changelog: go-git/go-git@v5.7.0...v5.7.1
v5.7.0
Compare Source
What's Changed
New Contributors
Full Changelog: go-git/go-git@v5.6.1...v5.7.0
v5.6.1
Compare Source
What's Changed
firstErrLine
when it is empty by @ThinkChaos in #682Full Changelog: go-git/go-git@v5.6.0...v5.6.1
v5.6.0
Compare Source
What's Changed
Full Changelog: go-git/go-git@v5.5.2...v5.6.0
v5.5.2
Compare Source
What's Changed
Full Changelog: go-git/go-git@v5.5.1...v5.5.2
v5.5.1
Compare Source
What's Changed
CGO_ENABLED=0
by @pjbgf in #625Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.