Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-c5e4-td2w-37by
Summary
go-git clients vulnerable to DoS via maliciously crafted Git server replies
### Impact
A denial of service (DoS) vulnerability was discovered in go-git versions prior to `v5.13`. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in `go-git` clients. 

This is a `go-git` implementation issue and does not affect the upstream `git` cli.

### Patches
Users running versions of `go-git` from `v4` and above are recommended to upgrade to `v5.13` in order to mitigate this vulnerability.

### Workarounds
In cases where a bump to the latest version of `go-git` is not possible, we recommend limiting its use to only trust-worthy Git servers.

## Credit
Thanks to Ionut Lalu for responsibly disclosing this vulnerability to us.
Aliases
0
alias CVE-2025-21614
1
alias GHSA-r9px-m959-cxf4
Fixed_packages
0
url pkg:deb/debian/golang-github-go-git-go-git@5.13.2-1?distro=trixie
purl pkg:deb/debian/golang-github-go-git-go-git@5.13.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-go-git-go-git@5.13.2-1%3Fdistro=trixie
1
url pkg:deb/debian/golang-github-go-git-go-git@5.14.0-1
purl pkg:deb/debian/golang-github-go-git-go-git@5.14.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62r9-cvp9-tfbg
1
vulnerability VCID-kqrm-h42a-13ce
2
vulnerability VCID-m4t6-vddc-3bfw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-go-git-go-git@5.14.0-1
2
url pkg:deb/debian/golang-github-go-git-go-git@5.14.0-1?distro=trixie
purl pkg:deb/debian/golang-github-go-git-go-git@5.14.0-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62r9-cvp9-tfbg
1
vulnerability VCID-kqrm-h42a-13ce
2
vulnerability VCID-m4t6-vddc-3bfw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-go-git-go-git@5.14.0-1%3Fdistro=trixie
3
url pkg:deb/debian/golang-github-go-git-go-git@5.17.0-1?distro=trixie
purl pkg:deb/debian/golang-github-go-git-go-git@5.17.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-go-git-go-git@5.17.0-1%3Fdistro=trixie
4
url pkg:deb/debian/golang-github-go-git-go-git@5.17.1-1?distro=trixie
purl pkg:deb/debian/golang-github-go-git-go-git@5.17.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-go-git-go-git@5.17.1-1%3Fdistro=trixie
5
url pkg:golang/github.com/go-git/go-git/v5@5.13.0
purl pkg:golang/github.com/go-git/go-git/v5@5.13.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/go-git/go-git/v5@5.13.0
Affected_packages
0
url pkg:deb/debian/golang-github-go-git-go-git@5.4.2-3
purl pkg:deb/debian/golang-github-go-git-go-git@5.4.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62r9-cvp9-tfbg
1
vulnerability VCID-6smu-rrju-z7ca
2
vulnerability VCID-c5e4-td2w-37by
3
vulnerability VCID-j8jp-r751-sbf8
4
vulnerability VCID-kqrm-h42a-13ce
5
vulnerability VCID-m4t6-vddc-3bfw
6
vulnerability VCID-rka6-epua-h7gz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-go-git-go-git@5.4.2-3
1
url pkg:deb/debian/golang-github-go-git-go-git@5.4.2-3?distro=trixie
purl pkg:deb/debian/golang-github-go-git-go-git@5.4.2-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62r9-cvp9-tfbg
1
vulnerability VCID-6smu-rrju-z7ca
2
vulnerability VCID-c5e4-td2w-37by
3
vulnerability VCID-j8jp-r751-sbf8
4
vulnerability VCID-kqrm-h42a-13ce
5
vulnerability VCID-m4t6-vddc-3bfw
6
vulnerability VCID-rka6-epua-h7gz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-go-git-go-git@5.4.2-3%3Fdistro=trixie
2
url pkg:rpm/redhat/grafana@9.2.10-21?arch=el8_10
purl pkg:rpm/redhat/grafana@9.2.10-21?arch=el8_10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-c5e4-td2w-37by
1
vulnerability VCID-j8jp-r751-sbf8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@9.2.10-21%3Farch=el8_10
3
url pkg:rpm/redhat/grafana@9.2.10-21?arch=el9_4
purl pkg:rpm/redhat/grafana@9.2.10-21?arch=el9_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-c5e4-td2w-37by
1
vulnerability VCID-j8jp-r751-sbf8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@9.2.10-21%3Farch=el9_4
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21614.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21614.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21614
reference_id
reference_type
scores
0
value 0.00222
scoring_system epss
scoring_elements 0.44841
published_at 2026-04-21T12:55:00Z
1
value 0.00222
scoring_system epss
scoring_elements 0.44819
published_at 2026-04-07T12:55:00Z
2
value 0.00222
scoring_system epss
scoring_elements 0.44871
published_at 2026-04-08T12:55:00Z
3
value 0.00222
scoring_system epss
scoring_elements 0.44873
published_at 2026-04-09T12:55:00Z
4
value 0.00222
scoring_system epss
scoring_elements 0.4489
published_at 2026-04-11T12:55:00Z
5
value 0.00222
scoring_system epss
scoring_elements 0.44858
published_at 2026-04-12T12:55:00Z
6
value 0.00222
scoring_system epss
scoring_elements 0.4486
published_at 2026-04-13T12:55:00Z
7
value 0.00222
scoring_system epss
scoring_elements 0.44913
published_at 2026-04-16T12:55:00Z
8
value 0.00222
scoring_system epss
scoring_elements 0.44906
published_at 2026-04-18T12:55:00Z
9
value 0.00222
scoring_system epss
scoring_elements 0.44879
published_at 2026-04-04T12:55:00Z
10
value 0.00228
scoring_system epss
scoring_elements 0.4561
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21614
2
reference_url https://github.com/go-git/go-git
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/go-git/go-git
3
reference_url https://github.com/go-git/go-git/security/advisories/GHSA-r9px-m959-cxf4
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-06T16:34:38Z/
url https://github.com/go-git/go-git/security/advisories/GHSA-r9px-m959-cxf4
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-21614
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-21614
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1092679
reference_id 1092679
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1092679
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2335901
reference_id 2335901
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2335901
7
reference_url https://access.redhat.com/errata/RHSA-2025:0401
reference_id RHSA-2025:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0401
8
reference_url https://access.redhat.com/errata/RHSA-2025:0444
reference_id RHSA-2025:0444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0444
9
reference_url https://access.redhat.com/errata/RHSA-2025:0445
reference_id RHSA-2025:0445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0445
10
reference_url https://access.redhat.com/errata/RHSA-2025:0654
reference_id RHSA-2025:0654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0654
11
reference_url https://access.redhat.com/errata/RHSA-2025:0662
reference_id RHSA-2025:0662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0662
12
reference_url https://access.redhat.com/errata/RHSA-2025:0907
reference_id RHSA-2025:0907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0907
13
reference_url https://access.redhat.com/errata/RHSA-2025:1119
reference_id RHSA-2025:1119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1119
14
reference_url https://access.redhat.com/errata/RHSA-2025:1704
reference_id RHSA-2025:1704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1704
15
reference_url https://access.redhat.com/errata/RHSA-2025:1869
reference_id RHSA-2025:1869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1869
16
reference_url https://access.redhat.com/errata/RHSA-2025:1870
reference_id RHSA-2025:1870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1870
17
reference_url https://access.redhat.com/errata/RHSA-2025:1888
reference_id RHSA-2025:1888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1888
18
reference_url https://access.redhat.com/errata/RHSA-2025:3069
reference_id RHSA-2025:3069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3069
19
reference_url https://usn.ubuntu.com/8088-1/
reference_id USN-8088-1
reference_type
scores
url https://usn.ubuntu.com/8088-1/
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
1
cwe_id 400
name Uncontrolled Resource Consumption
description The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
2
cwe_id 770
name Allocation of Resources Without Limits or Throttling
description The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-c5e4-td2w-37by