Source: golang-github-go-git-go-git
Version: 5.17.0-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for golang-github-go-git-go-git.

CVE-2026-33762[0]:
| go-git is an extensible git implementation library written in pure
| Go. Prior to version 5.17.1, go-git’s index decoder for format
| version 4 fails to validate the path name prefix length before
| applying it to the previously decoded path name. A maliciously
| crafted index file can trigger an out-of-bounds slice operation,
| resulting in a runtime panic during normal index parsing. This issue
| only affects Git index format version 4. Earlier formats (go-git
| supports only v2 and v3) are not vulnerable to this issue. This
| issue has been patched in version 5.17.1.


CVE-2026-34165[1]:
| go-git is an extensible git implementation library written in pure
| Go. From version 5.0.0 to before version 5.17.1, a vulnerability has
| been identified in which a maliciously crafted .idx file can cause
| asymmetric memory consumption, potentially exhausting available
| memory and resulting in a denial-of-service (DoS) condition.
| Exploitation requires write access to the local repository's .git
| directory, it order to create or alter existing .idx files. This
| issue has been patched in version 5.17.1.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-33762
    https://www.cve.org/CVERecord?id=CVE-2026-33762
    https://github.com/go-git/go-git/security/advisories/GHSA-gm2x-2g9h-ccm8
[1] https://security-tracker.debian.org/tracker/CVE-2026-34165
    https://www.cve.org/CVERecord?id=CVE-2026-34165
    https://github.com/go-git/go-git/security/advisories/GHSA-jhf3-xxhw-2wpp

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to