First published: Mon Jan 06 2025(Updated: )
### Impact A denial of service (DoS) vulnerability was discovered in go-git versions prior to `v5.13`. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in `go-git` clients. This is a `go-git` implementation issue and does not affect the upstream `git` cli. ### Patches Users running versions of `go-git` from `v4` and above are recommended to upgrade to `v5.13` in order to mitigate this vulnerability. ### Workarounds In cases where a bump to the latest version of `go-git` is not possible, we recommend limiting its use to only trust-worthy Git servers. ## Credit Thanks to Ionut Lalu for responsibly disclosing this vulnerability to us.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/go-git/go-git | >=4.0.0<=4.13.1 | |
go/github.com/go-git/go-git/v5 | <5.13.0 | 5.13.0 |
go/gopkg.in/src-d/go-git.v4 | >=4.0.0<=4.13.1 | |
go-git | <5.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21614 is classified as a denial of service (DoS) vulnerability.
To fix CVE-2025-21614, upgrade to version 5.13.0 or later of go-git.
CVE-2025-21614 affects go-git versions prior to v5.13 and specific versions between 4.0.0 and up to 4.13.1.
CVE-2025-21614 allows an attacker to perform denial of service attacks through crafted Git server responses.
If you cannot upgrade, consider implementing network security measures to filter malicious Git responses.