fix(deps): update module github.com/go-git/go-git/v5 to v5.13.0 [security] #1476
+1
−1
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v5.12.0
->v5.13.0
GitHub Vulnerability Alerts
CVE-2025-21613
Impact
An argument injection vulnerability was discovered in
go-git
versions prior tov5.13
.Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the
file
transport protocol is being used, as that is the only protocol that shells out togit
binaries.Affected versions
Users running versions of
go-git
fromv4
and above are recommended to upgrade tov5.13
in order to mitigate this vulnerability.Workarounds
In cases where a bump to the latest version of
go-git
is not possible, we recommend users to enforce restrict validation rules for values passed in the URL field.Credit
Thanks to @vin01 for responsibly disclosing this vulnerability to us.
CVE-2025-21614
Impact
A denial of service (DoS) vulnerability was discovered in go-git versions prior to
v5.13
. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion ingo-git
clients.This is a
go-git
implementation issue and does not affect the upstreamgit
cli.Patches
Users running versions of
go-git
fromv4
and above are recommended to upgrade tov5.13
in order to mitigate this vulnerability.Workarounds
In cases where a bump to the latest version of
go-git
is not possible, we recommend limiting its use to only trust-worthy Git servers.Credit
Thanks to Ionut Lalu for responsibly disclosing this vulnerability to us.
go-git clients vulnerable to DoS via maliciously crafted Git server replies
CVE-2025-21614 / GHSA-r9px-m959-cxf4 / GO-2025-3367
More information
Details
Impact
A denial of service (DoS) vulnerability was discovered in go-git versions prior to
v5.13
. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion ingo-git
clients.This is a
go-git
implementation issue and does not affect the upstreamgit
cli.Patches
Users running versions of
go-git
fromv4
and above are recommended to upgrade tov5.13
in order to mitigate this vulnerability.Workarounds
In cases where a bump to the latest version of
go-git
is not possible, we recommend limiting its use to only trust-worthy Git servers.Credit
Thanks to Ionut Lalu for responsibly disclosing this vulnerability to us.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Argument Injection via the URL field in github.com/go-git/go-git
CVE-2025-21613 / GHSA-v725-9546-7q7m / GO-2025-3368
More information
Details
Argument Injection via the URL field in github.com/go-git/go-git
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Clients vulnerable to DoS via maliciously crafted Git server replies in github.com/go-git/go-git
CVE-2025-21614 / GHSA-r9px-m959-cxf4 / GO-2025-3367
More information
Details
Clients vulnerable to DoS via maliciously crafted Git server replies in github.com/go-git/go-git
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
go-git has an Argument Injection via the URL field
CVE-2025-21613 / GHSA-v725-9546-7q7m / GO-2025-3368
More information
Details
Impact
An argument injection vulnerability was discovered in
go-git
versions prior tov5.13
.Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the
file
transport protocol is being used, as that is the only protocol that shells out togit
binaries.Affected versions
Users running versions of
go-git
fromv4
and above are recommended to upgrade tov5.13
in order to mitigate this vulnerability.Workarounds
In cases where a bump to the latest version of
go-git
is not possible, we recommend users to enforce restrict validation rules for values passed in the URL field.Credit
Thanks to @vin01 for responsibly disclosing this vulnerability to us.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
go-git/go-git (github.com/go-git/go-git/v5)
v5.13.0
Compare Source
What's Changed
git clean -x
flag. by @msuozzo in https://github.com/go-git/go-git/pull/995git clean -x
flag." by @pjbgf in https://github.com/go-git/go-git/pull/1129Untracked
while it is committed by @rodrigocam in https://github.com/go-git/go-git/pull/1023New Contributors
Full Changelog: go-git/go-git@v5.12.0...v5.13.0
Configuration
📅 Schedule: Branch creation - "" in timezone Australia/Sydney, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.