First published: Wed Dec 27 2023(Updated: )
### Impact A denial of service (DoS) vulnerability was discovered in go-git versions prior to `v5.11`. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in `go-git` clients. Applications using only the in-memory filesystem supported by `go-git` are not affected by this vulnerability. This is a `go-git` implementation issue and does not affect the upstream `git` cli. ### Patches Users running versions of `go-git` from `v4` and above are recommended to upgrade to `v5.11` in order to mitigate this vulnerability. ### Workarounds In cases where a bump to the latest version of `go-git` is not possible, we recommend limiting its use to only trust-worthy Git servers. ## Credit Thanks to Ionut Lalu for responsibly disclosing this vulnerability to us. ### References - [GHSA-mw99-9chc-xw7r](https://github.com/go-git/go-git/security/advisories/GHSA-mw99-9chc-xw7r)
Credit: cve-requests@bitdefender.com cve-requests@bitdefender.com
Affected Software | Affected Version | How to fix |
---|---|---|
Go-git Project Go-git | >=4.0.0<5.11.0 | |
go/gopkg.in/src-d/go-git.v4 | >=4.7.1 | |
go/github.com/go-git/go-git/v5 | >=4.0.0<5.11.0 | 5.11.0 |
redhat/go-git | <5.11 | 5.11 |
IBM IBM® Db2® on Cloud Pak for Data and Db2 Warehouse on Cloud Pak for Data | <=v3.5 through refresh 10v4.0 through refresh 9v4.5 through refresh 3v4.6 through refresh 6v4.7 through refresh 4v4.8 through refresh 4 |
An upgrade to v. 5.11 fixes this issue
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.