CVE-2025-21614
ADVISORY - githubSummary
Impact
A denial of service (DoS) vulnerability was discovered in go-git versions prior to v5.13. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in go-git clients.
This is a go-git implementation issue and does not affect the upstream git cli.
Patches
Users running versions of go-git from v4 and above are recommended to upgrade to v5.13 in order to mitigate this vulnerability.
Workarounds
In cases where a bump to the latest version of go-git is not possible, we recommend limiting its use to only trust-worthy Git servers.
Credit
Thanks to Ionut Lalu for responsibly disclosing this vulnerability to us.
Common Weakness Enumeration (CWE)
Uncontrolled Resource Consumption
OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
Improper Input Validation
Uncontrolled Resource Consumption
Allocation of Resources Without Limits or Throttling
OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in