Description
go-git is an extensible git implementation library written in pure Go. Prior to version 5.17.1, go-git’s index decoder for format version 4 fails to validate the path name prefix length before applying it to the previously decoded path name. A maliciously crafted index file can trigger an out-of-bounds slice operation, resulting in a runtime panic during normal index parsing. This issue only affects Git index format version 4. Earlier formats (go-git supports only v2 and v3) are not vulnerable to this issue. This issue has been patched in version 5.17.1.
Published: 2026-03-31
Score: 2.8 Low
EPSS: n/a
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

A flaw in the go‑git library’s decoder for git index format version 4 allows a maliciously crafted index file to cause an out‑of‑bounds slice operation, resulting in a runtime panic during normal parsing. This crash terminates the application using go‑git, effectively denying service to legitimate users. The weakness is an integer bounds check error as catalogued by CWE‑129.

Affected Systems

The vulnerability impacts the go‑git library prior to version 5.17.1. Only index files of format v4 are affected; earlier supported formats v2 and v3 are not vulnerable. Any application that imports or parses such a file will be exposed if it uses an affected library version.

Risk and Exploitability

The CVSS score of 2.8 indicates a low severity. No EPSS score is publicly available and the issue is not listed in the CISA KEV catalog. The attack vector is inferred to involve supplying a crafted index file to an application that processes git repositories with go‑git, which could occur locally or from a remote source if the application downloads or receives untrusted repositories. Given the lack of publicly known exploits and the low CVSS, overall risk remains low, though any running instance parsing untrusted data could be disrupted.

Generated by OpenCVE AI on March 31, 2026 at 15:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the go‑git library to version 5.17.1 or later to apply the patch.
  • If an upgrade is not feasible immediately, avoid loading index files that come from untrusted or external sources until the library is updated.
  • Monitor application logs for panic exceptions that may indicate an attempt to exploit this vulnerability.

Generated by OpenCVE AI on March 31, 2026 at 15:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-gm2x-2g9h-ccm8 go-git missing validation decoding Index v4 files leads to panic
History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Go-git
Go-git go-git
Vendors & Products Go-git
Go-git go-git

Tue, 31 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description go-git is an extensible git implementation library written in pure Go. Prior to version 5.17.1, go-git’s index decoder for format version 4 fails to validate the path name prefix length before applying it to the previously decoded path name. A maliciously crafted index file can trigger an out-of-bounds slice operation, resulting in a runtime panic during normal index parsing. This issue only affects Git index format version 4. Earlier formats (go-git supports only v2 and v3) are not vulnerable to this issue. This issue has been patched in version 5.17.1.
Title go-git: Missing validation decoding Index v4 files leads to panic
Weaknesses CWE-129
References
Metrics cvssV3_1

{'score': 2.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T18:53:08.221Z

Reserved: 2026-03-23T18:30:14.126Z

Link: CVE-2026-33762

cve-icon Vulnrichment

Updated: 2026-03-31T18:50:27.235Z

cve-icon NVD

Status : Received

Published: 2026-03-31T15:16:15.597

Modified: 2026-03-31T15:16:15.597

Link: CVE-2026-33762

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:38:33Z

Weaknesses