Debian Package Tracker
Register | Log in
Subscribe

golang-github-go-git-go-git

Choose email to subscribe with

general
  • source: golang-github-go-git-go-git (main)
  • version: 5.17.1-1
  • maintainer: Debian Go Packaging Team (DMD)
  • uploaders: Pirate Praveen [DMD]
  • arch: all any
  • std-ver: 4.7.4
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 5.4.2-3
  • stable: 5.14.0-1
  • testing: 5.17.0-1
  • unstable: 5.17.1-1
versioned links
  • 5.4.2-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.14.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.17.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.17.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • go-git
  • golang-github-go-git-go-git-dev
action needed
A new upstream version is available: 6.0.0-alpha.1 high
A new upstream version 6.0.0-alpha.1 is available, you should consider packaging it.
Created: 2026-03-30 Last update: 2026-04-15 04:30
3 security issues in trixie high

There are 3 open security issues in trixie.

3 important issues:
  • CVE-2026-25934: go-git is a highly extensible git implementation library written in pure Go. Prior to 5.16.5, a vulnerability was discovered in go-git whereby data integrity values for .pack and .idx files were not properly verified. This resulted in go-git potentially consuming corrupted files, which would likely result in unexpected errors such as object not found. For context, clients fetch packfiles from upstream Git servers. Those files contain a checksum of their contents, so that clients can perform integrity checks before consuming it. The pack indexes (.idx) are generated locally by go-git, or the git cli, when new .pack files are received and processed. The integrity checks for both files were not being verified correctly. This vulnerability is fixed in 5.16.5.
  • CVE-2026-33762: go-git is an extensible git implementation library written in pure Go. Prior to version 5.17.1, go-git’s index decoder for format version 4 fails to validate the path name prefix length before applying it to the previously decoded path name. A maliciously crafted index file can trigger an out-of-bounds slice operation, resulting in a runtime panic during normal index parsing. This issue only affects Git index format version 4. Earlier formats (go-git supports only v2 and v3) are not vulnerable to this issue. This issue has been patched in version 5.17.1.
  • CVE-2026-34165: go-git is an extensible git implementation library written in pure Go. From version 5.0.0 to before version 5.17.1, a vulnerability has been identified in which a maliciously crafted .idx file can cause asymmetric memory consumption, potentially exhausting available memory and resulting in a denial-of-service (DoS) condition. Exploitation requires write access to the local repository's .git directory, it order to create or alter existing .idx files. This issue has been patched in version 5.17.1.
Created: 2026-02-10 Last update: 2026-04-14 19:30
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2026-33762: go-git is an extensible git implementation library written in pure Go. Prior to version 5.17.1, go-git’s index decoder for format version 4 fails to validate the path name prefix length before applying it to the previously decoded path name. A maliciously crafted index file can trigger an out-of-bounds slice operation, resulting in a runtime panic during normal index parsing. This issue only affects Git index format version 4. Earlier formats (go-git supports only v2 and v3) are not vulnerable to this issue. This issue has been patched in version 5.17.1.
  • CVE-2026-34165: go-git is an extensible git implementation library written in pure Go. From version 5.0.0 to before version 5.17.1, a vulnerability has been identified in which a maliciously crafted .idx file can cause asymmetric memory consumption, potentially exhausting available memory and resulting in a denial-of-service (DoS) condition. Exploitation requires write access to the local repository's .git directory, it order to create or alter existing .idx files. This issue has been patched in version 5.17.1.
Created: 2026-04-02 Last update: 2026-04-14 19:30
7 security issues in bookworm high

There are 7 open security issues in bookworm.

3 important issues:
  • CVE-2026-25934: go-git is a highly extensible git implementation library written in pure Go. Prior to 5.16.5, a vulnerability was discovered in go-git whereby data integrity values for .pack and .idx files were not properly verified. This resulted in go-git potentially consuming corrupted files, which would likely result in unexpected errors such as object not found. For context, clients fetch packfiles from upstream Git servers. Those files contain a checksum of their contents, so that clients can perform integrity checks before consuming it. The pack indexes (.idx) are generated locally by go-git, or the git cli, when new .pack files are received and processed. The integrity checks for both files were not being verified correctly. This vulnerability is fixed in 5.16.5.
  • CVE-2026-33762: go-git is an extensible git implementation library written in pure Go. Prior to version 5.17.1, go-git’s index decoder for format version 4 fails to validate the path name prefix length before applying it to the previously decoded path name. A maliciously crafted index file can trigger an out-of-bounds slice operation, resulting in a runtime panic during normal index parsing. This issue only affects Git index format version 4. Earlier formats (go-git supports only v2 and v3) are not vulnerable to this issue. This issue has been patched in version 5.17.1.
  • CVE-2026-34165: go-git is an extensible git implementation library written in pure Go. From version 5.0.0 to before version 5.17.1, a vulnerability has been identified in which a maliciously crafted .idx file can cause asymmetric memory consumption, potentially exhausting available memory and resulting in a denial-of-service (DoS) condition. Exploitation requires write access to the local repository's .git directory, it order to create or alter existing .idx files. This issue has been patched in version 5.17.1.
4 issues left for the package maintainer to handle:
  • CVE-2023-49568: (needs triaging) A denial of service (DoS) vulnerability was discovered in go-git versions prior to v5.11. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in go-git clients. Applications using only the in-memory filesystem supported by go-git are not affected by this vulnerability. This is a go-git implementation issue and does not affect the upstream git cli.
  • CVE-2023-49569: (needs triaging) A path traversal vulnerability was discovered in go-git versions prior to v5.11. This vulnerability allows an attacker to create and amend files across the filesystem. In the worse case scenario, remote code execution could be achieved. Applications are only affected if they are using the ChrootOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#ChrootOS , which is the default when using "Plain" versions of Open and Clone funcs (e.g. PlainClone). Applications using BoundOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#BoundOS  or in-memory filesystems are not affected by this issue. This is a go-git implementation issue and does not affect the upstream git cli.
  • CVE-2025-21613: (needs triaging) go-git is a highly extensible git implementation library written in pure Go. An argument injection vulnerability was discovered in go-git versions prior to v5.13. Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the file transport protocol is being used, as that is the only protocol that shells out to git binaries. This vulnerability is fixed in 5.13.0.
  • CVE-2025-21614: (needs triaging) go-git is a highly extensible git implementation library written in pure Go. A denial of service (DoS) vulnerability was discovered in go-git versions prior to v5.13. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in go-git clients. Users running versions of go-git from v4 and above are recommended to upgrade to v5.13 in order to mitigate this vulnerability.

You can find information about how to handle these issues in the security team's documentation.

Created: 2024-01-13 Last update: 2026-04-14 19:30
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2025-11-02 Last update: 2026-04-15 04:31
1 new commit since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit 91e2cb5b9cd886b587ad9030617c32c0e7e3087a
Merge: 8204c6d cf4c609
Author: Andrew Lee (李健秋) <ajqlee@debian.org>
Date:   Tue Apr 14 15:38:59 2026 +0200

    Merge branch 'ajqlee/merge-request-queue' into 'debian/sid'
    
    Releasing debian version 5.17.1-1.
    
    See merge request go-team/packages/golang-github-go-git-go-git!1
Created: 2026-03-10 Last update: 2026-04-14 16:00
debian/patches: 3 patches to forward upstream low

Among the 3 debian patches available in version 5.17.1-1 of the package, we noticed the following issues:

  • 3 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-04-14 20:30
testing migrations
  • excuses:
    • Migrates after: golang-golang-x-net
    • Migration status for golang-github-go-git-go-git (5.17.0-1 to 5.17.1-1): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for gitbatch/0.6.1-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for gitsign/0.13.0-4: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for gittuf/0.12.0-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for golang-github-go-enry-go-license-detector/4.3.1-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for golang-github-go-git-go-git/5.17.1-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for golang-github-in-toto-go-witness/0.9.2-6: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for golang-google-cloud/0.117.0-5: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for lazygit/0.57.0+ds1-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Autopkgtest for tea-cli/0.11.1-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Test triggered
    • ∙ ∙ Too young, only 1 of 5 days old
    • ∙ ∙ Built-Using: golang-github-go-git-go-git golang-golang-x-net
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/g/golang-github-go-git-go-git.html
    • ∙ ∙ Reproducibility check waiting for results on amd64
    • ∙ ∙ Reproducibility check waiting for results on arm64
    • ∙ ∙ Reproducibility check waiting for results on armhf
    • ∙ ∙ Reproducibility check waiting for results on i386
    • ∙ ∙ Reproducibility check waiting for results on ppc64el
    • Not considered
news
[rss feed]
  • [2026-04-14] Accepted golang-github-go-git-go-git 5.17.1-1 (source) into unstable (Andrew Lee (李健秋)) (signed by: 李健秋 Andrew Lee)
  • [2026-03-23] golang-github-go-git-go-git 5.17.0-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-10] Accepted golang-github-go-git-go-git 5.17.0-1 (source) into unstable (Andrew Lee (李健秋)) (signed by: 李健秋 Andrew Lee)
  • [2025-10-10] golang-github-go-git-go-git 5.16.2-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-05] Accepted golang-github-go-git-go-git 5.16.2-1 (source) into unstable (Simon Josefsson)
  • [2025-03-20] golang-github-go-git-go-git 5.14.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-03-16] Accepted golang-github-go-git-go-git 5.14.0-1 (source) into unstable (Simon Josefsson)
  • [2025-02-16] golang-github-go-git-go-git 5.13.2-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-14] Accepted golang-github-go-git-go-git 5.13.2-1 (source) into unstable (Simon Josefsson)
  • [2024-12-08] golang-github-go-git-go-git 5.12.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-12-04] Accepted golang-github-go-git-go-git 5.12.0-1 (source) into unstable (Simon Josefsson)
  • [2024-08-25] golang-github-go-git-go-git 5.11.0-4 MIGRATED to testing (Debian testing watch)
  • [2024-08-20] Accepted golang-github-go-git-go-git 5.11.0-4 (source) into unstable (Shengjing Zhu)
  • [2024-06-15] golang-github-go-git-go-git 5.11.0-3 MIGRATED to testing (Debian testing watch)
  • [2024-06-10] Accepted golang-github-go-git-go-git 5.11.0-3 (source) into unstable (Maytham Alsudany)
  • [2024-06-04] Accepted golang-github-go-git-go-git 5.11.0-2 (source) into unstable (Maytham Alsudany)
  • [2024-05-29] Accepted golang-github-go-git-go-git 5.11.0-1 (source) into unstable (Maytham Alsudany) (signed by: Gürkan Myczko)
  • [2024-04-25] golang-github-go-git-go-git REMOVED from testing (Debian testing watch)
  • [2023-11-03] golang-github-go-git-go-git 5.4.2-4 MIGRATED to testing (Debian testing watch)
  • [2023-10-31] Accepted golang-github-go-git-go-git 5.4.2-4 (source) into unstable (Santiago Vila)
  • [2022-01-17] golang-github-go-git-go-git 5.4.2-3 MIGRATED to testing (Debian testing watch)
  • [2021-11-22] Accepted golang-github-go-git-go-git 5.4.2-3 (source) into unstable (Pirate Praveen) (signed by: Praveen Arimbrathodiyil)
  • [2021-11-21] Accepted golang-github-go-git-go-git 5.4.2-2 (source amd64 all) into unstable, unstable (Debian FTP Masters) (signed by: Praveen Arimbrathodiyil)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 5.16.2-1
  • 2 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing