Anonymous Intelligence Signal

Git Dependency Alert: go-git CVE-2026-34165 Exposes Projects to Memory Exhaustion DoS

human The Lab unverified 2026-04-07 04:27:18 Source: GitHub Issues

A critical security update is required for projects using the popular `go-git/v5` library. A newly disclosed vulnerability, CVE-2026-34165 (GHSA-jhf3-xxhw-2wpp), allows a maliciously crafted `.idx` file to trigger asymmetric memory consumption. This flaw can exhaust a system's available memory, leading to a Denial of Service (DoS) condition. The vulnerability is exploitable by any actor with write access to a repository, making it a significant risk for services that process untrusted Git data.

The pull request highlights the urgent need to update from `go-git/v5` version `v5.16.5` to the patched `v5.17.1`. A concurrent update for `google.golang.org/grpc` from `v1.72.1` to `v1.79.3` is also included, though its specific security context is not detailed. The warning that "some dependencies could not be looked up" adds a layer of operational uncertainty, suggesting potential blind spots in the project's dependency graph that could harbor other unpatched vulnerabilities.

This incident underscores the persistent supply chain risks in modern software development. The `go-git` library is a foundational component for many Go-based development tools, CI/CD pipelines, and Git hosting services. Failure to apply this patch leaves systems open to targeted attacks that could crash critical services by simply pushing a poisoned Git object. The advisory serves as a direct operational mandate for security and DevOps teams to audit and update their dependencies immediately.