-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update module github.com/golang/glog to v1.2.4 [security] (release-v0.16) #1246
base: release-v0.16
Are you sure you want to change the base?
Conversation
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Signed-off-by: redhat-renovate-bot <[email protected]>
fb6da08
to
d808a41
Compare
|
@redhat-renovate-bot: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
This PR contains the following updates:
v1.0.0
->v1.2.4
Vulnerability when creating log files in github.com/golang/glog
CVE-2024-45339 / GHSA-6wxm-mpqj-6jpf / GO-2025-3372
More information
Details
When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Insecure Temporary File usage in github.com/golang/glog
CVE-2024-45339 / GHSA-6wxm-mpqj-6jpf / GO-2025-3372
More information
Details
When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists.
Severity
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
golang/glog (github.com/golang/glog)
v1.2.4
Compare Source
What's Changed
Full Changelog: golang/glog@v1.2.3...v1.2.4
v1.2.3
Compare Source
What's Changed
Full Changelog: golang/glog@v1.2.2...v1.2.3
v1.2.2
Compare Source
What's Changed
Full Changelog: golang/glog@v1.2.1...v1.2.2
v1.2.1
Compare Source
What's Changed
Full Changelog: golang/glog@v1.2.0...v1.2.1
v1.2.0
Compare Source
What's Changed
Full Changelog: golang/glog@v1.1.2...v1.2.0
v1.1.2
Compare Source
Bugfix release.
What's Changed
Full Changelog: golang/glog@v1.1.1...v1.1.2
v1.1.1
Compare Source
Bugfixes since the larger v1.1.0, which have been addressed.
v1.1.0
Compare Source
Tagging v1.1.0 after syncing glog with internal changes
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.