Search for packages
| purl | pkg:deb/debian/libgit2@0.21.1-3~bpo7%2B1 |
| Next non-vulnerable version | 1.1.0+dfsg.1-4+deb11u2 |
| Latest non-vulnerable version | 1.1.0+dfsg.1-4+deb11u2 |
| Risk | 10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-1uzu-6121-x7bc
Aliases: CVE-2018-10887 |
Out-of-bounds Read The libgit2 library, which is used by pygit2, is vulnerable to an integer overflow which leads to an out-of-bound read. An attacker may use this flaw to leak memory addresses or cause a Denial of Service. |
Affected by 4 other vulnerabilities. |
|
VCID-2s6d-9bsu-zqaq
Aliases: CVE-2018-10888 |
Out-of-bounds Read A flaw was found in libgit2 which is wrapped by the rugged gem. A missing check in git_delta_apply function in `delta.c` file, may lead to an out-of-bound read while reading a binary delta file. An attacker may use this flaw to cause a Denial of Service. |
Affected by 4 other vulnerabilities. |
|
VCID-52tu-vs8k-fbfe
Aliases: CVE-2020-12278 GHSA-5wph-8frv-58vj |
libgit2: files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams |
Affected by 0 other vulnerabilities. |
|
VCID-bejf-17ah-tybt
Aliases: CVE-2016-10128 |
Buffer overflow in the git_pkt_parse_line function in transports/smart_pkt.c in the Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to have unspecified impact via a crafted non-flush packet. |
Affected by 9 other vulnerabilities. |
|
VCID-er9h-5wad-buhg
Aliases: CVE-2018-8098 |
libgit2: denial of service (DoS) via crafted repository index files |
Affected by 4 other vulnerabilities. |
|
VCID-fhjz-7s1y-f7bm
Aliases: CVE-2024-24577 |
libgit2: arbitrary code execution due to heap corruption in git_index_add |
Affected by 0 other vulnerabilities. |
|
VCID-j1c4-rux6-wygr
Aliases: CVE-2014-9390 GHSA-6vvc-c2m3-cjf3 PYSEC-2020-217 |
Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem. |
Affected by 9 other vulnerabilities. |
|
VCID-mpm1-9224-6kgu
Aliases: CVE-2018-8099 |
libgit2: denial of service (DoS) via crafted repository index files |
Affected by 4 other vulnerabilities. |
|
VCID-nq88-cr6a-17fw
Aliases: CVE-2018-15501 |
Out-of-bounds Read In the library libgit2, which is used by pygit2, a remote attacker can send a crafted smart-protocol `ng` packet that lacks a `\0` byte to trigger an out-of-bounds read leading to a DoS. |
Affected by 4 other vulnerabilities. |
|
VCID-rvbe-y541-nyh7
Aliases: CVE-2016-10129 |
The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line. |
Affected by 9 other vulnerabilities. |
|
VCID-t2ph-v249-a7g9
Aliases: CVE-2023-22742 GHSA-8643-3wh5-rmjq |
Improper Verification of Cryptographic Signature libgit2 is a cross-platform, linkable library implementation of Git. When using an SSH remote with the optional libssh2 backend, libgit2 does not perform certificate checking by default. Prior versions of libgit2 require the caller to set the `certificate_check` field of libgit2's `git_remote_callbacks` structure - if a certificate check callback is not set, libgit2 does not perform any certificate checking. This means that by default - without configuring a certificate check callback, clients will not perform validation on the server SSH keys and may be subject to a man-in-the-middle attack. Users are encouraged to upgrade to v1.4.5 or v1.5.1. Users unable to upgrade should ensure that all relevant certificates are manually checked. |
Affected by 0 other vulnerabilities. |
|
VCID-tkgy-cec8-dfdy
Aliases: CVE-2016-8569 |
The git_oid_nfmt function in commit.c in libgit2 before 0.24.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a cat-file command with a crafted object file. |
Affected by 9 other vulnerabilities. |
|
VCID-tmtv-wcxy-sqht
Aliases: CVE-2020-12279 GHSA-589j-mmg9-733v |
libgit2: NTFS protections inactive when running Git in the Windows Subsystem for Linux |
Affected by 0 other vulnerabilities. |
|
VCID-xab7-k14p-uqbx
Aliases: CVE-2016-10130 |
The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable. |
Affected by 9 other vulnerabilities. |
|
VCID-yq57-g8j1-kfeu
Aliases: CVE-2016-8568 |
The git_commit_message function in oid.c in libgit2 before 0.24.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a cat-file command with a crafted object file. |
Affected by 9 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||