Skip to content

chore(deps): update module github.com/go-git/go-git/v5 to v5.16.5 [security]#3358

Open
renovate-bot wants to merge 1 commit intoGoogleCloudPlatform:mainfrom
renovate-bot:renovate/module-swapper-go-github.com-go-git-go-git-v5-vulnerability
Open

chore(deps): update module github.com/go-git/go-git/v5 to v5.16.5 [security]#3358
renovate-bot wants to merge 1 commit intoGoogleCloudPlatform:mainfrom
renovate-bot:renovate/module-swapper-go-github.com-go-git-go-git-v5-vulnerability

Conversation

@renovate-bot
Copy link
Contributor

This PR contains the following updates:

Package Change Age Confidence
github.com/go-git/go-git/v5 v5.16.4v5.16.5 age confidence

GitHub Vulnerability Alerts

CVE-2026-25934

Impact

A vulnerability was discovered in go-git whereby data integrity values for .pack and .idx files were not properly verified. This resulted in go-git potentially consuming corrupted files, which would likely result in unexpected errors such as object not found.

For context, clients fetch packfiles from upstream Git servers. Those files contain a checksum of their contents, so that clients can perform integrity checks before consuming it. The pack indexes (.idx) are generated locally by go-git, or the git cli, when new .pack files are received and processed. The integrity checks for both files were not being verified correctly.

Note that the lack of verification of the packfile checksum has no impact on the trust relationship between the client and server, which is enforced based on the protocol being used (e.g. TLS in the case of https:// or known hosts for ssh://). In other words, the packfile checksum verification does not provide any security benefits when connecting to a malicious or compromised Git server.

Patches

Users should upgrade to v5.16.5, or the latest v6 pseudo-version, in order to mitigate this vulnerability.

Workarounds

In case updating to a fixed version of go-git is not possible, users can run git fsck from the git cli to check for data corruption on a given repository.

Credit

Thanks @​N0zoM1z0 for finding and reporting this issue privately to the go-git project.


Release Notes

go-git/go-git (github.com/go-git/go-git/v5)

v5.16.5

Compare Source

What's Changed

Full Changelog: go-git/go-git@v5.16.4...v5.16.5


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@dpebot
Copy link
Collaborator

dpebot commented Feb 10, 2026

/gcbrun

@gemini-code-assist
Copy link
Contributor

Summary of Changes

Hello @renovate-bot, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request performs a crucial dependency upgrade for the go-git module to mitigate a recently discovered security vulnerability. The update ensures that the application correctly verifies the integrity of Git packfiles, thereby preventing potential data corruption and enhancing the overall security and reliability of Git operations within the module swapper.

Highlights

  • Security Update: Updated the github.com/go-git/go-git/v5 module from v5.16.4 to v5.16.5 to address CVE-2026-25934. This vulnerability involved improper verification of data integrity values for .pack and .idx files, which could lead to go-git consuming corrupted files.
Changelog
  • infra/module-swapper/go.mod
    • Updated the github.com/go-git/go-git/v5 dependency to version v5.16.5.
  • infra/module-swapper/go.sum
    • Updated the cryptographic checksums for the github.com/go-git/go-git/v5 dependency to reflect the new version.
Activity
  • This pull request was automatically generated by Renovate Bot to update a dependency.
  • The github.com/go-git/go-git/v5 dependency was updated from v5.16.4 to v5.16.5.
  • The update specifically addresses a security vulnerability (CVE-2026-25934) related to data integrity verification in go-git.
  • Automerge is currently disabled, requiring manual review and merging.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request updates the github.com/go-git/go-git/v5 dependency from v5.16.4 to v5.16.5 to address the security vulnerability CVE-2026-25934. The changes in go.mod and go.sum are correct and necessary. This is a straightforward and important update.

@renovate-bot renovate-bot force-pushed the renovate/module-swapper-go-github.com-go-git-go-git-v5-vulnerability branch from 1ead11e to 73b63bc Compare February 19, 2026 06:31
@dpebot
Copy link
Collaborator

dpebot commented Feb 19, 2026

/gcbrun

@renovate-bot renovate-bot force-pushed the renovate/module-swapper-go-github.com-go-git-go-git-v5-vulnerability branch from 73b63bc to 3955b21 Compare February 19, 2026 08:02
@dpebot
Copy link
Collaborator

dpebot commented Feb 19, 2026

/gcbrun

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants

Comments