Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): update module github.com/hashicorp/go-slug to v0.16.3 [security] #63

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link

@renovate renovate bot commented Jan 21, 2025

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/hashicorp/go-slug v0.15.2 -> v0.16.3 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2025-0377

Summary

HashiCorp’s go-slug library is vulnerable to a zip-slip style attack when a non-existing user-provided path is extracted from the tar entry. This vulnerability, identified as CVE-2025-0377, is fixed in go-slug 0.16.3.

Background

HashiCorp’s go-slug shared library offers functions for packing and unpacking Terraform Enterprise compatible slugs. Slugs are gzip compressed tar files containing Terraform configuration files.

Details

When go-slug performs an extraction, the filename/extraction path is taken from the tar entry via the header.Name. It was discovered that the unpacking step improperly validated paths, potentially leading to path traversal, allowing an attacker to write an arbitrary file during extraction.

Remediation

Consumers of the go-slug shared library should evaluate the risk associated with this issue in the context of their go-slug usage and upgrade go-slug to 0.16.3 or later.


Release Notes

hashicorp/go-slug (github.com/hashicorp/go-slug)

v0.16.3

Compare Source

What's Changed

Full Changelog: hashicorp/go-slug@v0.16.2...v0.16.3

v0.16.2

Compare Source

What's Changed

New Contributors

Full Changelog: hashicorp/go-slug@v0.16.1...v0.16.2

v0.16.1

Compare Source

  • #​68: Fix panic in sourcebundle package when RegistryMeta and Packages aren't the same size.

Full Changelog: hashicorp/go-slug@v0.16.0...v0.16.1

v0.16.0

Compare Source

  • #​64: Remove the .Append(...) function from the sourcebundle diagnostics API. Consumers should instead use the built-in golang append() function. This ensures type-safety as you can't attempt to insert an invalid object into the diagnostics using the built-in function.

Note: this is technically a breaking change for consumers of the sourcebundle package since it removes a method, but we had previously marked it as experimental in the v0.12.0 release and warned that its API is subject to change. The package continues to be experimental and may change further before stabilizing.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants