Skip to content

fix(deps): update module github.com/go-git/go-git/v5 to v5.19.0 [security]#324

Open
netic-renovate[bot] wants to merge 1 commit into
mainfrom
renovate/go-github.com-go-git-go-git-v5-vulnerability
Open

fix(deps): update module github.com/go-git/go-git/v5 to v5.19.0 [security]#324
netic-renovate[bot] wants to merge 1 commit into
mainfrom
renovate/go-github.com-go-git-go-git-v5-vulnerability

Conversation

@netic-renovate
Copy link
Copy Markdown
Contributor

This PR contains the following updates:

Package Change Age Confidence
github.com/go-git/go-git/v5 v5.18.0v5.19.0 age confidence

go-git's improper parsing of specially crafted objects may lead to inconsistent interpretation compared to upstream Git

CVE-2026-45022 / GHSA-389r-gv7p-r3rp

More information

Details

Impact

go-git may parse malformed Git objects in a way that differs from upstream Git. When commit or tag objects contain ambiguous or malformed headers, go-git’s decoded representation may expose values differently from how Git itself would interpret or reject the same object.

Additionally, go-git’s commit signing and verification logic operates over commit data reconstructed from go-git’s parsed representation rather than the original raw object bytes. As a result, go-git may sign or verify a commit payload that is not byte-for-byte equivalent to the object stored in the repository.

This can cause a signature to appear valid for a commit whose displayed or effective metadata differs from the object that was intended to be signed.

Patches

Users should upgrade to a patched version in order to mitigate this vulnerability. Versions prior to v5 are likely to be affected, users are recommended to upgrade to a supported go-git version.

Credit

Thanks to @​bugbunny-research (https://bugbunny.ai/) for reporting this to sigstore/gitsign, and to @​wlynch, @​patzielinski and @​adityasaky for coordinating the disclosure with the go-git project. 🙇 🥇

Thanks to @​wayphinder for reporting this to the go-git project. 🙇

Severity

  • CVSS Score: 7.0 / 10 (High)
  • Vector String: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Release Notes

go-git/go-git (github.com/go-git/go-git/v5)

v5.19.0

Compare Source

What's Changed

Full Changelog: go-git/go-git@v5.18.0...v5.19.0


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate.

@netic-renovate netic-renovate Bot added renovate-auto-approve Enables auto approval for Renovate PRs security labels May 11, 2026
@netic-renovate netic-renovate Bot requested review from a team and gh-netic-robot as code owners May 11, 2026 16:29
@netic-renovate
Copy link
Copy Markdown
Contributor Author

ℹ️ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 5 additional dependencies were updated

Details:

Package Change
github.com/go-git/go-billy/v5 v5.8.0 -> v5.9.0
golang.org/x/mod v0.34.0 -> v0.35.0
github.com/pjbgf/sha1cd v0.4.0 -> v0.6.0
golang.org/x/exp v0.0.0-20251023183803-a4bb9ffd2546 -> v0.0.0-20260410095643-746e56fc9e2f
golang.org/x/tools v0.43.0 -> v0.44.0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

renovate-auto-approve Enables auto approval for Renovate PRs security

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants