Skip to content

Commit 1deabfa

Browse files
tatianabgopherbot
authored andcommitted
data/reports: add GO-2025-3367
- data/reports/GO-2025-3367.yaml Fixes #3367 Change-Id: I324c50fb8ef7e86227d11cae22050fcae0b47bc0 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/640935 Reviewed-by: Zvonimir Pavlinovic <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]> Auto-Submit: Tatiana Bradley <[email protected]>
1 parent 4ab2b0a commit 1deabfa

File tree

2 files changed

+112
-0
lines changed

2 files changed

+112
-0
lines changed

data/osv/GO-2025-3367.json

+83
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,83 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2025-3367",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2025-21614",
8+
"GHSA-r9px-m959-cxf4"
9+
],
10+
"summary": "Clients vulnerable to DoS via maliciously crafted Git server replies in github.com/go-git/go-git",
11+
"details": "Clients vulnerable to DoS via maliciously crafted Git server replies in github.com/go-git/go-git",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/go-git/go-git/v4",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "4.0.0"
24+
}
25+
]
26+
}
27+
],
28+
"ecosystem_specific": {}
29+
},
30+
{
31+
"package": {
32+
"name": "github.com/go-git/go-git/v5",
33+
"ecosystem": "Go"
34+
},
35+
"ranges": [
36+
{
37+
"type": "SEMVER",
38+
"events": [
39+
{
40+
"introduced": "0"
41+
},
42+
{
43+
"fixed": "5.13.0"
44+
}
45+
]
46+
}
47+
],
48+
"ecosystem_specific": {}
49+
},
50+
{
51+
"package": {
52+
"name": "gopkg.in/src-d/go-git.v4",
53+
"ecosystem": "Go"
54+
},
55+
"ranges": [
56+
{
57+
"type": "SEMVER",
58+
"events": [
59+
{
60+
"introduced": "4.0.0"
61+
}
62+
]
63+
}
64+
],
65+
"ecosystem_specific": {}
66+
}
67+
],
68+
"references": [
69+
{
70+
"type": "ADVISORY",
71+
"url": "https://github.com/go-git/go-git/security/advisories/GHSA-r9px-m959-cxf4"
72+
}
73+
],
74+
"credits": [
75+
{
76+
"name": "Ionut Lalu"
77+
}
78+
],
79+
"database_specific": {
80+
"url": "https://pkg.go.dev/vuln/GO-2025-3367",
81+
"review_status": "REVIEWED"
82+
}
83+
}

data/reports/GO-2025-3367.yaml

+29
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
id: GO-2025-3367
2+
modules:
3+
- module: github.com/go-git/go-git/v4
4+
versions:
5+
- introduced: 4.0.0
6+
vulnerable_at: 4.13.1
7+
- module: github.com/go-git/go-git/v5
8+
versions:
9+
- fixed: 5.13.0
10+
vulnerable_at: 5.12.0
11+
- module: gopkg.in/src-d/go-git.v4
12+
versions:
13+
- introduced: 4.0.0
14+
vulnerable_at: 4.13.1
15+
summary: Clients vulnerable to DoS via maliciously crafted Git server replies in github.com/go-git/go-git
16+
cves:
17+
- CVE-2025-21614
18+
ghsas:
19+
- GHSA-r9px-m959-cxf4
20+
credits:
21+
- Ionut Lalu
22+
references:
23+
- advisory: https://github.com/go-git/go-git/security/advisories/GHSA-r9px-m959-cxf4
24+
notes:
25+
- I could not find a fix commit, so leaving all packages vulnerable.
26+
source:
27+
id: GHSA-r9px-m959-cxf4
28+
created: 2025-01-06T15:18:07.39952-10:00
29+
review_status: REVIEWED

0 commit comments

Comments
 (0)