Skip to content
This repository was archived by the owner on Mar 31, 2025. It is now read-only.

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Jan 28, 2025

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/golang/glog v1.2.2 -> v1.2.4 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2024-45339

When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists.


Insecure Temporary File usage in github.com/golang/glog

CVE-2024-45339 / GHSA-6wxm-mpqj-6jpf / GO-2025-3372

More information

Details

When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists.

Severity

  • CVSS Score: 7.1 / 10 (High)
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Vulnerability when creating log files in github.com/golang/glog

CVE-2024-45339 / GHSA-6wxm-mpqj-6jpf / GO-2025-3372

More information

Details

When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Release Notes

golang/glog (github.com/golang/glog)

v1.2.4

Compare Source

What's Changed

  • Fail if log file already exists by @​chressie in https://github.com/golang/glog/pull/74:
    • glog: Don't try to create/rotate a given syncBuffer twice in the same second
    • glog: introduce createInDir function as in internal version
    • glog: have createInDir fail if the file already exists

Full Changelog: golang/glog@v1.2.3...v1.2.4

v1.2.3

Compare Source

What's Changed

Full Changelog: golang/glog@v1.2.2...v1.2.3


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@coveralls
Copy link

coveralls commented Jan 28, 2025

Pull Request Test Coverage Report for Build 13752468927

Details

  • 0 of 0 changed or added relevant lines in 0 files are covered.
  • No unchanged relevant lines lost coverage.
  • Overall coverage remained the same at 0.0%

Totals Coverage Status
Change from base Build 12765462488: 0.0%
Covered Lines: 0
Relevant Lines: 1432

💛 - Coveralls

@renovate renovate bot changed the title Renovate: Update module github.com/golang/glog to v1.2.4 [SECURITY] Renovate: Update module github.com/golang/glog to v1.2.4 [SECURITY] - autoclosed Mar 8, 2025
@renovate renovate bot closed this Mar 8, 2025
@renovate renovate bot deleted the renovate/go-github.com-golang-glog-vulnerability branch March 8, 2025 09:00
@renovate renovate bot changed the title Renovate: Update module github.com/golang/glog to v1.2.4 [SECURITY] - autoclosed Renovate: Update module github.com/golang/glog to v1.2.4 [SECURITY] Mar 8, 2025
@renovate renovate bot reopened this Mar 8, 2025
@renovate renovate bot force-pushed the renovate/go-github.com-golang-glog-vulnerability branch from a9fe4ba to 8fad747 Compare March 8, 2025 12:30
@renovate renovate bot changed the title Renovate: Update module github.com/golang/glog to v1.2.4 [SECURITY] Renovate: Update module github.com/golang/glog to v1.2.4 [SECURITY] - autoclosed Mar 9, 2025
@renovate renovate bot closed this Mar 9, 2025
@renovate renovate bot changed the title Renovate: Update module github.com/golang/glog to v1.2.4 [SECURITY] - autoclosed Renovate: Update module github.com/golang/glog to v1.2.4 [SECURITY] Mar 9, 2025
@renovate renovate bot reopened this Mar 9, 2025
@renovate renovate bot force-pushed the renovate/go-github.com-golang-glog-vulnerability branch from d6da93d to 8fad747 Compare March 9, 2025 21:02
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants