CVE-2023-49568: Maliciously crafted Git server replies can cause DoS on go-git clients
Impact
A denial of service (DoS) vulnerability was discovered in go-git versions prior to v5.11
. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in go-git
clients.
Applications using only the in-memory filesystem supported by go-git
are not affected by this vulnerability.
This is a go-git
implementation issue and does not affect the upstream git
cli.
Patches
Users running versions of go-git
from v4
and above are recommended to upgrade to v5.11
in order to mitigate this vulnerability.
Workarounds
In cases where a bump to the latest version of go-git
is not possible, we recommend limiting its use to only trust-worthy Git servers.
Credit
Thanks to Ionut Lalu for responsibly disclosing this vulnerability to us.
References
References
Detect and mitigate CVE-2023-49568 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →