Skip to content

Bump github.com/go-git/go-git/v5 from 5.13.1 to 5.16.5#162

Open
dependabot[bot] wants to merge 2 commits intomainfrom
dependabot/go_modules/github.com/go-git/go-git/v5-5.16.5
Open

Bump github.com/go-git/go-git/v5 from 5.13.1 to 5.16.5#162
dependabot[bot] wants to merge 2 commits intomainfrom
dependabot/go_modules/github.com/go-git/go-git/v5-5.16.5

Conversation

@dependabot
Copy link
Copy Markdown

@dependabot dependabot Bot commented on behalf of github Feb 21, 2026

Bumps github.com/go-git/go-git/v5 from 5.13.1 to 5.16.5.

Release notes

Sourced from github.com/go-git/go-git/v5's releases.

v5.16.5

What's Changed

Full Changelog: go-git/go-git@v5.16.4...v5.16.5

v5.16.4

What's Changed

Full Changelog: go-git/go-git@v5.16.3...v5.16.4

v5.16.3

What's Changed

Full Changelog: go-git/go-git@v5.16.2...v5.16.3

v5.16.2

What's Changed

Full Changelog: go-git/go-git@v5.16.1...v5.16.2

v5.16.1

What's Changed

New Contributors

Full Changelog: go-git/go-git@v5.16.0...v5.16.1

v5.16.0

What's Changed

... (truncated)

Commits
  • 48a1ae0 Merge pull request #1836 from go-git/check-v5
  • 42bdf1f storage: filesystem, Verify idx matches pack file
  • 4146a56 plumbing: format/idxfile, Verify idxfile's checksum
  • 63d78ec plumbing: format/packfile, Add new ErrMalformedPackFile
  • 25f1624 Merge pull request #1800 from Ch00k/no-delete-untracked-v5
  • 600fb13 git: worktree, Don't delete local untracked files when resetting worktree
  • 390a569 Merge pull request #1746 from pjbgf/bump-go
  • 61c8b85 build: Bump Go test versions to 1.23-1.25 (v5)
  • e5a05ec Merge pull request #1744 from go-git/renovate/releases/v5.x-go-golang.org-x-c...
  • 1495930 plumbing: Remove use of non-constant format strings
  • Additional commits viewable in compare view

Dependabot compatibility score

You can trigger a rebase of this PR by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Note
Automatic rebases have been disabled on this pull request as it has been open for over 30 days.

@dependabot dependabot Bot added dependencies Pull requests that update a dependency file go Pull requests that update go code labels Feb 21, 2026
@dependabot dependabot Bot force-pushed the dependabot/go_modules/github.com/go-git/go-git/v5-5.16.5 branch from d21aac4 to 85822fe Compare February 28, 2026 06:41
Bumps [github.com/go-git/go-git/v5](https://github.com/go-git/go-git) from 5.13.1 to 5.16.5.
- [Release notes](https://github.com/go-git/go-git/releases)
- [Commits](go-git/go-git@v5.13.1...v5.16.5)

---
updated-dependencies:
- dependency-name: github.com/go-git/go-git/v5
  dependency-version: 5.16.5
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot force-pushed the dependabot/go_modules/github.com/go-git/go-git/v5-5.16.5 branch from 85822fe to 7a5e378 Compare March 22, 2026 09:29
Cre-eD added a commit that referenced this pull request May 6, 2026
Phase 1 of CIS Docker Benchmark + OWASP Container Top 10 hardening pass.
All 5 published images rebuilt; baseline → hardened CVE counts:

  kubectl:           1H → 0
  cloud-helpers:     4H → 4H (glibc fix not yet in AL2023 dnf, deferred)
  caddy:             48 (5H/5M/3L+stdlib+core) → 10 (upstream transitives)
  github-actions:    38 (13 alpine + 25 binary + 2 secrets) → 2 (deferred)
  github-actions-staging: same as prod (synced)

Dockerfile changes (CIS 4.1/4.2/4.3/4.6/4.7/4.9, OWASP Container 02):
  - All FROM bases pinned by @sha256: digest
  - Pulumi installer replaced with checksum-verified tarball download
    (no more `curl | sh`); checksums fetched per-version from GitHub
    Releases pulumi-${VERSION}-checksums.txt
  - Google Cloud SDK pinned to 567.0.0 with inline SHA-256 ARG
  - github-actions(+staging) split into builder/runtime stages; runtime
    drops py3-pip, binutils, upx, bundledpythonunix; image 1.51GB→1.24GB
  - urllib3 dummyserver test fixtures (Trivy "secret" findings) removed
  - kubectl runs as non-root UID 10001
  - Caddy bumped 2.8.4 → 2.11.2; certmagic-gcs 0.1.2 → 0.1.7
  - Alpine 3.19 → 3.21 in github-actions(+staging) (clears musl, openssh,
    busybox CVEs)
  - HEALTHCHECK added to kubectl, caddy, github-actions(+staging)
  - cloud-helpers ADD → COPY

Go module bumps (clears 25 CVEs in the baked github-actions binary):
  google.golang.org/grpc          1.72.1 → 1.80.0   (CRIT CVE-2026-33186)
  go.opentelemetry.io/otel        1.36.0 → 1.43.0   (HIGH CVE-2026-29181)
  go.opentelemetry.io/otel/sdk    1.36.0 → 1.43.0   (HIGH CVE-2026-24051,
                                                          CVE-2026-39883)
  github.com/go-git/go-git/v5     5.13.1 → 5.18.0   (HIGH CVE-2026-25934,
                                                          CVE-2026-34165,
                                                          CVE-2026-41506)
  github.com/go-jose/go-jose/v3   3.0.4  → 3.0.5    (HIGH CVE-2026-34986)
  github.com/go-jose/go-jose/v4   4.1.3  → 4.1.4    (HIGH CVE-2026-34986)
  github.com/aws/aws-sdk-go-v2    1.26.1 → 1.41.5   (MED  GHSA-xmrv-pmrh-hhx2)
  github.com/aws/aws-sdk-go-v2/service/s3
                                  1.53.1 → 1.97.3   (MED  GHSA-xmrv-pmrh-hhx2)
  github.com/cloudflare/circl     1.6.1  → 1.6.3    (LOW  CVE-2026-1229)
  toolchain                       go1.25.1 → go1.25.9 (clears ~15 stdlib
                                                       CVEs incl. crypto/tls,
                                                       crypto/x509,
                                                       encoding/pem,
                                                       net/url, html/template)

Supersedes Dependabot PR #162 (go-git 5.13.1 → 5.16.5 — insufficient,
needed 5.18.0 for CVE-2026-41506).

Deferred (no upstream fix available):
  - github.com/docker/docker CVE-2026-34040/33997: Trivy points to v29.3.1
    but only v28.5.2+incompatible is published on proxy.golang.org.
    Reachability: pkg/clouds/pulumi/docker/pull.go uses Docker client for
    image pulls in Pulumi flows; auth-bypass is exploitable only against a
    malicious Docker daemon.
  - glibc CVE-2026-4046 in cloud-helpers: AL2023 dnf has not yet shipped
    2.34-231.amzn2023.0.4. Hardened Dockerfile runs `dnf upgrade` and will
    pick up the fix automatically. Reachability: glibc iconv() DoS via
    crafted charset; cloud-helpers Go binary doesn't call iconv. LOW risk.
  - Caddy upstream transitive deps in 2.11.2 binary (10 vulns): xcaddy
    can override direct deps via --with but not transitives in Caddy
    core's go.mod. Closes when Caddy 2.11.3+ ships.
Cre-eD added a commit that referenced this pull request May 7, 2026
…se 1) (#227)

## Summary

Phase 1 of a CIS Docker Benchmark + OWASP Container Top 10 hardening
pass on this repo's published artifacts. All 5 published images rebuilt;
CVE counts before → after:

| Image | Before | After | Notes |
|---|---|---|---|
| `simplecontainer/kubectl` | 1 HIGH | **0** | clean |
| `simplecontainer/cloud-helpers:aws-*` | 4 HIGH | 4 HIGH (deferred) |
glibc fix not yet in AL2023 dnf — auto-applies on next rebuild |
| `simplecontainer/caddy` | 48 (5H/5M/3L + Caddy core + Go stdlib) | 10
(upstream transitives) | Caddy 2.8.4 → 2.11.2 |
| `simplecontainer/github-actions` | 38 (13 alpine + 25 binary + 2
secrets) | **2** (deferred) | image 1.51GB → 1.24GB |
| `simplecontainer/github-actions:staging` | same as prod | same as prod
| synced |

**Grype cross-check (`--only-fixed`):** kubectl / caddy / github-actions
/ staging — `No vulnerabilities found`. cloud-helpers — only the
deferred glibc.

Supersedes Dependabot PR #162 (go-git 5.13.1 → 5.16.5 was insufficient;
this PR moves to 5.18.0 to clear CVE-2026-41506).

## Fixed — Dockerfile changes (CIS Docker Benchmark §4)

| CIS | What changed |
|---|---|
| 4.1 | `kubectl` runs as non-root UID 10001 |
| 4.2 / 4.7 | All `FROM` bases pinned by `@sha256:` digest (no floating
tags) |
| 4.3 | Multi-stage rewrite of `github-actions(+staging).Dockerfile`:
builder keeps `binutils`, `upx`, `python3` for `gcloud components
install`; runtime drops them and `py3-pip`. `bundledpythonunix` and
`urllib3` dummyserver test fixtures removed |
| 4.6 | `HEALTHCHECK` added to kubectl, caddy, github-actions(+staging)
|
| 4.9 | `cloud-helpers.aws.Dockerfile`: `ADD` → `COPY` |
| SSCS §5 | Pulumi installer replaced with verified tarball download
(per-version `pulumi-${VERSION}-checksums.txt` from GitHub Releases).
Google Cloud SDK pinned to 567.0.0 with inline SHA-256 ARG. **No
remaining `curl \| sh`** in any Dockerfile |
| OWASP Container 02 | Every third-party download verified before use |

Caddy upgraded 2.8.4 → 2.11.2, certmagic-gcs 0.1.2 → 0.1.7. Alpine 3.19
→ 3.21 for github-actions(+staging) (clears `musl`,
`openssh-client-common`, `busybox` CVEs).

## Fixed — Go module bumps (clears CVEs in the baked `github-actions`
binary)

| Module | Before → After | Severity |
|---|---|---|
| `google.golang.org/grpc` | 1.72.1 → 1.80.0 | **CRITICAL**
(CVE-2026-33186) |
| `go.opentelemetry.io/otel` | 1.36.0 → 1.43.0 | HIGH (CVE-2026-29181) |
| `go.opentelemetry.io/otel/sdk` | 1.36.0 → 1.43.0 | HIGH
(CVE-2026-24051, CVE-2026-39883) |
| `go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp` |
1.36.0 → 1.43.0 | MEDIUM (CVE-2026-39882) |
| `github.com/go-git/go-git/v5` | 5.13.1 → 5.18.0 | HIGH
(CVE-2026-25934, 34165, 41506) + LOW (CVE-2026-33762) |
| `github.com/go-jose/go-jose/v3` | 3.0.4 → 3.0.5 | HIGH
(CVE-2026-34986) |
| `github.com/go-jose/go-jose/v4` | 4.1.3 → 4.1.4 | HIGH
(CVE-2026-34986) |
| `github.com/aws/aws-sdk-go-v2` | 1.26.1 → 1.41.5 | MEDIUM
(GHSA-xmrv-pmrh-hhx2) |
| `github.com/aws/aws-sdk-go-v2/service/s3` | 1.53.1 → 1.97.3 | MEDIUM
(GHSA-xmrv-pmrh-hhx2) |
| `github.com/cloudflare/circl` | 1.6.1 → 1.6.3 | LOW (CVE-2026-1229) |
| `toolchain` | go1.25.1 → go1.25.9 | clears ~15 Go stdlib CVEs
(`crypto/tls`, `crypto/x509`, `encoding/pem`, `net/url`,
`html/template`, `archive/tar`, ...) |

## Deferred (no upstream fix available)

| Finding | Severity | Why | Reachability | When to revisit |
|---|---|---|---|---|
| `github.com/docker/docker` CVE-2026-34040 / 33997 | HIGH / MEDIUM |
Trivy points to v29.3.1 but only `v28.5.2+incompatible` is published on
`proxy.golang.org`. The Moby project may publish v29 later or under a
new module path. | Used by `pkg/clouds/pulumi/docker/pull.go` for Pulumi
image pulls. Auth-bypass is exploitable only against a malicious Docker
daemon authorizing plugin install — not the case in our pipelines. |
Re-check `go list -m -versions github.com/docker/docker` next pass |
| `glibc` CVE-2026-4046 in cloud-helpers AL2023 base | HIGH | AL2023 dnf
has not yet shipped 2.34-231.amzn2023.0.4. Hardened Dockerfile already
runs `dnf upgrade` so it will auto-apply on next image rebuild after
Amazon publishes. | iconv() DoS via attacker-controlled charset;
cloud-helpers Go Lambda runner doesn't call iconv. **LOW risk in this
image.** | Next image rebuild after Amazon publishes (typically
days/weeks) |
| Caddy 2.11.2 transitive deps (10 vulns) | 2C / 4H / 3M / 1L | xcaddy
can override direct deps via `--with` but not arbitrary transitives in
Caddy core's `go.mod` without forking. | Property of the upstream Caddy
core build. | Caddy 2.11.3+ release |
| Caddy non-root USER | n/a | Requires `setcap CAP_NET_BIND_SERVICE` on
binary plus coordinating cert/state directory ownership with
consumer-mounted volumes. | n/a | Phase 2+ |
| github-actions non-root USER | n/a | GitHub docker-action runners
mount `/github/workspace` as root; non-root USER triggers
`safe.directory` failures and write-permission errors. | n/a | Track
upstream GitHub guidance |

## Dependabot reconciliation

- **PR #162** (`go-git 5.13.1 → 5.16.5`): superseded by this PR (we move
to 5.18.0 — needed for CVE-2026-41506 which 5.16.5 doesn't fix). Will be
auto-closed when this PR merges; will leave a comment when ready.

## Evidence

```
# Trivy summary — kubectl
Before: 1 (LOW: 0, MEDIUM: 0, HIGH: 1, CRITICAL: 0)
After:  0

# Trivy summary — github-actions
Before: 13 alpine + 25 binary + 2 secrets (incl. 2 CRIT, 10 HIGH in binary)
After:  0 alpine + 2 binary + 0 secrets (only deferred docker/docker)

# Grype --only-fixed cross-check
sca-test/kubectl:hardened                 No vulnerabilities found
sca-test/cloud-helpers:hardened           glibc … (deferred)
sca-test/caddy:hardened                   No vulnerabilities found
sca-test/github-actions:hardened          No vulnerabilities found
sca-test/github-actions:staging-hardened  No vulnerabilities found

# Image size
simplecontainer/github-actions:latest    1.51 GB
sca-test/github-actions:hardened         1.24 GB  (-280 MB)
```

## Test plan

- [ ] CI builds all 5 images successfully on this branch (push.yaml
docker-build matrix)
- [ ] `simplecontainer/github-actions:hardened` boots — `docker run …
--version` works
- [ ] Pulumi flows still execute against new gcloud 567.0.0 + Pulumi
3.184.0 (auto-extracted from go.mod)
- [ ] Smoke test in [push.yaml](.github/workflows/push.yaml) builds —
schema-gen, golangci-lint, go test all pass against bumped go.mod
- [ ] Branch preview run validates new images end-to-end before merge
- [ ] After merge, monitor Dependabot alerts auto-close on default
branch

## Next phases (tracked separately)

2. Self-attest own artifacts — sign + scan + SBOM + SLSA provenance for
`simplecontainer/*` images and `sc.tar.gz` tarballs
3. Workflow least-privilege & pinning — drop root `contents: write`,
SHA-pin third-party actions, fix `pull_request` secret exposure, remove
`--allow-insecure-entitlement`
4. Repo controls — CODEOWNERS, SECURITY.md, expanded Dependabot, CodeQL,
gosec, branch rulesets
5. Code-level fixes — HMAC for `pkg/security/cache.go` tamper detection
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant