CVE-2026-25934
mediumCVSS v3 Base Score
4.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
EPSS Score
0.0%
Exploitation probability in 30 days
Top 100% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Confidentiality
None
Integrity
Low
Availability
None
Vulnerability Report
Generated by CyberWatcher
Description
go-git is a highly extensible git implementation library written in pure Go. Prior to 5.16.5, a vulnerability was discovered in go-git whereby data integrity values for .pack and .idx files were not properly verified. This resulted in go-git potentially consuming corrupted files, which would likely result in unexpected errors such as object not found. For context, clients fetch packfiles from upstream Git servers. Those files contain a checksum of their contents, so that clients can perform integrity checks before consuming it. The pack indexes (.idx) are generated locally by go-git, or the git cli, when new .pack files are received and processed. The integrity checks for both files were not being verified correctly. This vulnerability is fixed in 5.16.5.
CWE
CWE-354Affected Products
Assisted Installer for Red Hat OpenShift Container Platform 2Builds for Red Hat OpenShiftConfidential Compute AttestationExternal Secrets Operator for Red Hat OpenShiftKernel Module Management Operator for Red Hat OpenshiftLogging Subsystem for Red Hat OpenShiftMachine Deletion Remediation OperatorMigration Toolkit for ContainersMigration Toolkit for VirtualizationMulticluster Engine for Kubernetes