Source: golang-github-go-git-go-git
Version: 5.16.2-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for golang-github-go-git-go-git.

CVE-2026-25934[0]:
| go-git is a highly extensible git implementation library written in
| pure Go. Prior to 5.16.5, a vulnerability was discovered in go-git
| whereby data integrity values for .pack and .idx files were not
| properly verified. This resulted in go-git potentially consuming
| corrupted files, which would likely result in unexpected errors such
| as object not found. For context, clients fetch packfiles from
| upstream Git servers. Those files contain a checksum of their
| contents, so that clients can perform integrity checks before
| consuming it. The pack indexes (.idx) are generated locally by go-
| git, or the git cli, when new .pack files are received and
| processed. The integrity checks for both files were not being
| verified correctly. This vulnerability is fixed in 5.16.5.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-25934
    https://www.cve.org/CVERecord?id=CVE-2026-25934
[1] https://github.com/go-git/go-git/security/advisories/GHSA-37cx-329c-33x3

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to