Impact
Unauthorized manipulation of .pack and .idx files can leave a git repository in an inconsistent state, causing subsequent repository operations to fail with errors such as "object not found". The vulnerability stems from improper verification of checksum values, meaning that corrupted or malformed pack files could be accepted silently, which may lead to unreliable repository content or operational disruption.
Affected Systems
The flaw affects any project that uses the go-git library versions prior to 5.16.5, regardless of the hosting platform or deployment environment. The library itself, named go-git, is commonly embedded in Go applications that perform git operations or mirror repositories.
Risk and Exploitability
With a CVSS score of 4.3 and an EPSS probability below 1%, the likelihood of exploitation is low and the flaw is not listed in the CISA KEV catalog. The attack vector is limited to scenarios where corrupted pack or index files are introduced into a repository that the application ingests; no remote code execution or critical confidentiality breach is possible. The risk, however, manifests as application errors that could negatively impact availability or data integrity for users of the affected library.
OpenCVE Enrichment
Github GHSA