-
Notifications
You must be signed in to change notification settings - Fork 593
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(deps): update module github.com/go-git/go-git/v5 to v5.13.0 [security] #5220
fix(deps): update module github.com/go-git/go-git/v5 to v5.13.0 [security] #5220
Conversation
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
ef5111c
to
a509dfb
Compare
09bec29
to
81f4cd3
Compare
c2af15f
to
90d788c
Compare
9f53252
to
220cce6
Compare
Quality Gate passedIssues Measures |
/it-go |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
This PR technically includes a breaking change that artifactPrepareVersion needs to adapt to: https://github.com/go-git/go-git/pull/1050 Making empty commits will now fail, and artifactPrepareVersion for buildTool golang and cloud versioning tries to do that. To not fail, AllowEmptyCommits must be passed here: jenkins-library/cmd/artifactPrepareVersion.go Line 470 in dff1749
|
This PR contains the following updates:
v5.12.0
->v5.13.0
GitHub Vulnerability Alerts
CVE-2025-21613
Impact
An argument injection vulnerability was discovered in
go-git
versions prior tov5.13
.Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the
file
transport protocol is being used, as that is the only protocol that shells out togit
binaries.Affected versions
Users running versions of
go-git
fromv4
and above are recommended to upgrade tov5.13
in order to mitigate this vulnerability.Workarounds
In cases where a bump to the latest version of
go-git
is not possible, we recommend users to enforce restrict validation rules for values passed in the URL field.Credit
Thanks to @vin01 for responsibly disclosing this vulnerability to us.
CVE-2025-21614
Impact
A denial of service (DoS) vulnerability was discovered in go-git versions prior to
v5.13
. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion ingo-git
clients.This is a
go-git
implementation issue and does not affect the upstreamgit
cli.Patches
Users running versions of
go-git
fromv4
and above are recommended to upgrade tov5.13
in order to mitigate this vulnerability.Workarounds
In cases where a bump to the latest version of
go-git
is not possible, we recommend limiting its use to only trust-worthy Git servers.Credit
Thanks to Ionut Lalu for responsibly disclosing this vulnerability to us.
Release Notes
go-git/go-git (github.com/go-git/go-git/v5)
v5.13.0
Compare Source
What's Changed
git clean -x
flag. by @msuozzo in https://github.com/go-git/go-git/pull/995git clean -x
flag." by @pjbgf in https://github.com/go-git/go-git/pull/1129Untracked
while it is committed by @rodrigocam in https://github.com/go-git/go-git/pull/1023New Contributors
Full Changelog: go-git/go-git@v5.12.0...v5.13.0
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.