Search for packages
| purl | pkg:deb/debian/libgit2@1.1.0%2Bdfsg.1-4%2Bdeb11u2?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1uzu-6121-x7bc | Out-of-bounds Read The libgit2 library, which is used by pygit2, is vulnerable to an integer overflow which leads to an out-of-bound read. An attacker may use this flaw to leak memory addresses or cause a Denial of Service. |
CVE-2018-10887
|
| VCID-2s6d-9bsu-zqaq | Out-of-bounds Read A flaw was found in libgit2 which is wrapped by the rugged gem. A missing check in git_delta_apply function in `delta.c` file, may lead to an out-of-bound read while reading a binary delta file. An attacker may use this flaw to cause a Denial of Service. |
CVE-2018-10888
|
| VCID-52tu-vs8k-fbfe | libgit2: files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams |
CVE-2020-12278
GHSA-5wph-8frv-58vj |
| VCID-bejf-17ah-tybt | Buffer overflow in the git_pkt_parse_line function in transports/smart_pkt.c in the Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to have unspecified impact via a crafted non-flush packet. |
CVE-2016-10128
|
| VCID-er9h-5wad-buhg | libgit2: denial of service (DoS) via crafted repository index files |
CVE-2018-8098
|
| VCID-fhjz-7s1y-f7bm | libgit2: arbitrary code execution due to heap corruption in git_index_add |
CVE-2024-24577
|
| VCID-j1c4-rux6-wygr | Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem. |
CVE-2014-9390
GHSA-6vvc-c2m3-cjf3 PYSEC-2020-217 |
| VCID-k211-ta2v-8fb2 | libgit2: potential infiniate loop condition in git_revparse_single |
CVE-2024-24575
|
| VCID-mpm1-9224-6kgu | libgit2: denial of service (DoS) via crafted repository index files |
CVE-2018-8099
|
| VCID-nq88-cr6a-17fw | Out-of-bounds Read In the library libgit2, which is used by pygit2, a remote attacker can send a crafted smart-protocol `ng` packet that lacks a `\0` byte to trigger an out-of-bounds read leading to a DoS. |
CVE-2018-15501
|
| VCID-rvbe-y541-nyh7 | The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line. |
CVE-2016-10129
|
| VCID-t2ph-v249-a7g9 | Improper Verification of Cryptographic Signature libgit2 is a cross-platform, linkable library implementation of Git. When using an SSH remote with the optional libssh2 backend, libgit2 does not perform certificate checking by default. Prior versions of libgit2 require the caller to set the `certificate_check` field of libgit2's `git_remote_callbacks` structure - if a certificate check callback is not set, libgit2 does not perform any certificate checking. This means that by default - without configuring a certificate check callback, clients will not perform validation on the server SSH keys and may be subject to a man-in-the-middle attack. Users are encouraged to upgrade to v1.4.5 or v1.5.1. Users unable to upgrade should ensure that all relevant certificates are manually checked. |
CVE-2023-22742
GHSA-8643-3wh5-rmjq |
| VCID-tkgy-cec8-dfdy | The git_oid_nfmt function in commit.c in libgit2 before 0.24.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a cat-file command with a crafted object file. |
CVE-2016-8569
|
| VCID-tmtv-wcxy-sqht | libgit2: NTFS protections inactive when running Git in the Windows Subsystem for Linux |
CVE-2020-12279
GHSA-589j-mmg9-733v |
| VCID-xab7-k14p-uqbx | The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable. |
CVE-2016-10130
|
| VCID-yq57-g8j1-kfeu | The git_commit_message function in oid.c in libgit2 before 0.24.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a cat-file command with a crafted object file. |
CVE-2016-8568
|