Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2025-21613 - github.com/go-git/go-git/v5 CRITICAL in Amazon Inspector #611

Open
nickstrijbos opened this issue Jan 7, 2025 · 16 comments
Assignees

Comments

@nickstrijbos
Copy link

A critical security vulnerability (CVE-2025-21613) has been identified in the go-git library. This vulnerability has been flagged as CRITICAL by Amazon Inspector and requires immediate attention. The amazon-ssm-agent project currently uses an outdated version of go-git as specified in the go.mod file here. Can this be patched to v5.13.0?

which is also being used by the amazon-ecs-ami we are currently using. https://github.com/aws/amazon-ecs-ami

github.com/go-git/go-git/v5 v5.12.0

@drmihalj
Copy link
Contributor

drmihalj commented Jan 7, 2025

Hello Nick,
Thank you for bringing this to our attention, the team is aware of this issue and fix will be available soon.

@drmihalj drmihalj self-assigned this Jan 7, 2025
@leeuw471
Copy link

@drmihalj Any updates on the timeline? Since this is quite a high scoring cve would love to get rid of it.

@drmihalj
Copy link
Contributor

Hi @leeuw471, the fix will be available with the coming release.

@glaubitz
Copy link

Hi @leeuw471, the fix will be available with the coming release.

Hello, we're also affected in openSUSE and SUSE Linux Enterprise and I would like to fix this as soon as possible.

Would be great to get a point release with an updated go-git module.

@nickstrijbos
Copy link
Author

Hi @leeuw471, the fix will be available with the coming release.

Also when will there be a release coming, can you give us some specifics as of a date?

@Aperocky
Copy link
Contributor

Aperocky commented Jan 14, 2025

We are expecting to release it this current week.

@nickstrijbos
Copy link
Author

We are expecting to release it this current week.

Hi @Aperocky it's already thursday when will be there a release? Also opened up a PR not sure if that was helpfull.

@yaronbenezra
Copy link

can you give the date for the upcoming release?

@Aperocky
Copy link
Contributor

The release is now out on Github, regional deployments has been ongoing since earlier this week. Please look for Agent version 3.3.1611.0 which contains the fix.

@TLaue
Copy link

TLaue commented Jan 23, 2025

Hi @Aperocky, one quick question: has this issue really been solved with version 3.3.1611.0 as the PR #614 is still open and AWS Inspector is still flagging this vulnerability even after updating the SSM agent to version 3.3.1611.0

@glaubitz
Copy link

Hi @Aperocky, one quick question: has this issue really been solved with version 3.3.1611.0 as the PR #614 is still open and AWS Inspector is still flagging this vulnerability even after updating the SSM agent to version 3.3.1611.0

Well, go.mod lists the fixed version: https://github.com/aws/amazon-ssm-agent/blob/mainline/go.mod#L20

@TLaue
Copy link

TLaue commented Jan 23, 2025

The AWS Systems Manager updates the SSM agent to version 3.3.1611.0 but Inspector still reports this new version as vulnerable.

@glaubitz
Copy link

The AWS Systems Manager updates the SSM agent to version 3.3.1611.0 but Inspector still reports this new version as vulnerable.

And it's not possible that the Inspector report is wrong? I mean, the go-git module has definitely been updated to the fixed version (>= 5.13.0), so it's definitely fixed.

@leeuw471
Copy link

For us after manually updating the SSM agent to 3.3.1611 in the ecs ami ec2 the inspector finding goes away and it's marked as safe

@TLaue
Copy link

TLaue commented Jan 23, 2025

In this case it might be an issue of the update mechanism when using AWS SSM. Inspector reports the following:

Installed version / Fixed version
0:3.3.1611.0-1.X86_64 / 0:3.3.1611.0-4.36.1

In this case it seems to be not an issue of the SSM agent itself.

@Aperocky
Copy link
Contributor

Thanks for this report, I'll direct this to the the Inspector team to understand what is going on with this:

Installed version / Fixed version
0:3.3.1611.0-1.X86_64 / 0:3.3.1611.0-4.36.1

@Aperocky Aperocky reopened this Jan 23, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants