chore(deps): bump github.com/meigma/blob from 1.1.1 to 1.1.2 in the go-minor-patch group across 1 directory#33
Conversation
Bumps the go-minor-patch group with 1 update in the / directory: [github.com/meigma/blob](https://github.com/meigma/blob). Updates `github.com/meigma/blob` from 1.1.1 to 1.1.2 - [Release notes](https://github.com/meigma/blob/releases) - [Changelog](https://github.com/meigma/blob/blob/master/CHANGELOG.md) - [Commits](meigma/blob@v1.1.1...v1.1.2) --- updated-dependencies: - dependency-name: github.com/meigma/blob dependency-version: 1.1.2 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: go-minor-patch ... Signed-off-by: dependabot[bot] <support@github.com>
LabelsThe following labels could not be found: Please fix the above issues or remove invalid values from |
Kusari Analysis Results:Caution Flagged Issues Detected While the dependency update itself (v1.1.1 → v1.1.2) is safe with no direct security concerns, the code analysis identified 6 critical security vulnerabilities in the broader codebase that must be addressed before merging. Most critical is CVE-2026-24686, a path traversal vulnerability in go-tuf allowing arbitrary file writes. Additionally, three vulnerabilities exist in Go stdlib v1.25.5 affecting TLS session resumption, handshake processing, and URL parsing. Two additional go-tuf vulnerabilities (DoS and improper threshold validation) further compound the risk. Required actions: (1) Update Go stdlib to v1.25.6 or later to address CVE-2025-68121, CVE-2025-61730, and CVE-2025-61726, (2) Update github.com/theupdateframework/go-tuf from v0.7.0 to latest patched version, (3) Update github.com/theupdateframework/go-tuf/v2 from v2.3.1 to latest patched version. The cumulative risk of these vulnerabilities, particularly the critical path traversal issue, outweighs the benefit of merging this otherwise safe dependency update. Note View full detailed analysis result for more information on the output and the checks that were run. Required Code MitigationsUpdate Go stdlib to a patched version that addresses CVE-2025-68121, CVE-2025-61730, and CVE-2025-61726. Upgrade to Go 1.25.6 or later if available.
Update github.com/theupdateframework/go-tuf from v0.7.0 to the latest patched version that addresses CVE-2026-23991, CVE-2026-23992, and CVE-2026-24686. The path traversal vulnerability is particularly critical as it allows arbitrary file writes.
Update github.com/theupdateframework/go-tuf/v2 from v2.3.1 to the latest patched version that addresses CVE-2026-24686 (path traversal vulnerability).
Found this helpful? Give it a 👍 or 👎 reaction! |
Bumps the go-minor-patch group with 1 update in the / directory: github.com/meigma/blob.
Updates
github.com/meigma/blobfrom 1.1.1 to 1.1.2Release notes
Sourced from github.com/meigma/blob's releases.
Changelog
Sourced from github.com/meigma/blob's changelog.
Commits
36e2e64chore(master): release 1.1.2 (#61)7857128fix: wire blockCache through to registry Pull (#62)5d4b964fix: wire WithRefCacheTTL to ref cache creation (#60)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore <dependency name> major versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)@dependabot ignore <dependency name> minor versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)@dependabot ignore <dependency name>will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)@dependabot unignore <dependency name>will remove all of the ignore conditions of the specified dependency@dependabot unignore <dependency name> <ignore condition>will remove the ignore condition of the specified dependency and ignore conditions