-
Notifications
You must be signed in to change notification settings - Fork 328
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2025-21613 - github.com/go-git/go-git/v5 CRITICAL in Amazon Inspector #611
Comments
Hello Nick, |
@drmihalj Any updates on the timeline? Since this is quite a high scoring cve would love to get rid of it. |
Hi @leeuw471, the fix will be available with the coming release. |
Hello, we're also affected in openSUSE and SUSE Linux Enterprise and I would like to fix this as soon as possible. Would be great to get a point release with an updated |
Also when will there be a release coming, can you give us some specifics as of a date? |
We are expecting to release it this current week. |
Hi @Aperocky it's already thursday when will be there a release? Also opened up a PR not sure if that was helpfull. |
can you give the date for the upcoming release? |
The release is now out on Github, regional deployments has been ongoing since earlier this week. Please look for Agent version 3.3.1611.0 which contains the fix. |
Well, |
The AWS Systems Manager updates the SSM agent to version 3.3.1611.0 but Inspector still reports this new version as vulnerable. |
And it's not possible that the Inspector report is wrong? I mean, the |
For us after manually updating the SSM agent to 3.3.1611 in the ecs ami ec2 the inspector finding goes away and it's marked as safe |
In this case it might be an issue of the update mechanism when using AWS SSM. Inspector reports the following: Installed version / Fixed version In this case it seems to be not an issue of the SSM agent itself. |
Thanks for this report, I'll direct this to the the Inspector team to understand what is going on with this:
|
A critical security vulnerability (CVE-2025-21613) has been identified in the
go-git
library. This vulnerability has been flagged as CRITICAL by Amazon Inspector and requires immediate attention. Theamazon-ssm-agent
project currently uses an outdated version ofgo-git
as specified in thego.mod
file here. Can this be patched tov5.13.0
?which is also being used by the amazon-ecs-ami we are currently using. https://github.com/aws/amazon-ecs-ami
amazon-ssm-agent/go.mod
Line 20 in f6ab670
The text was updated successfully, but these errors were encountered: