Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/libgit2@1.1.0%2Bdfsg.1-4%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libgit2@1.1.0%2Bdfsg.1-4%2Bdeb11u2?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (16)
Vulnerability Summary Aliases
VCID-1uzu-6121-x7bc Out-of-bounds Read The libgit2 library, which is used by pygit2, is vulnerable to an integer overflow which leads to an out-of-bound read. An attacker may use this flaw to leak memory addresses or cause a Denial of Service. CVE-2018-10887
VCID-2s6d-9bsu-zqaq Out-of-bounds Read A flaw was found in libgit2 which is wrapped by the rugged gem. A missing check in git_delta_apply function in `delta.c` file, may lead to an out-of-bound read while reading a binary delta file. An attacker may use this flaw to cause a Denial of Service. CVE-2018-10888
VCID-52tu-vs8k-fbfe libgit2: files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams CVE-2020-12278
GHSA-5wph-8frv-58vj
VCID-bejf-17ah-tybt Buffer overflow in the git_pkt_parse_line function in transports/smart_pkt.c in the Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to have unspecified impact via a crafted non-flush packet. CVE-2016-10128
VCID-er9h-5wad-buhg libgit2: denial of service (DoS) via crafted repository index files CVE-2018-8098
VCID-fhjz-7s1y-f7bm libgit2: arbitrary code execution due to heap corruption in git_index_add CVE-2024-24577
VCID-j1c4-rux6-wygr Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem. CVE-2014-9390
GHSA-6vvc-c2m3-cjf3
PYSEC-2020-217
VCID-k211-ta2v-8fb2 libgit2: potential infiniate loop condition in git_revparse_single CVE-2024-24575
VCID-mpm1-9224-6kgu libgit2: denial of service (DoS) via crafted repository index files CVE-2018-8099
VCID-nq88-cr6a-17fw Out-of-bounds Read In the library libgit2, which is used by pygit2, a remote attacker can send a crafted smart-protocol `ng` packet that lacks a `\0` byte to trigger an out-of-bounds read leading to a DoS. CVE-2018-15501
VCID-rvbe-y541-nyh7 The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line. CVE-2016-10129
VCID-t2ph-v249-a7g9 Improper Verification of Cryptographic Signature libgit2 is a cross-platform, linkable library implementation of Git. When using an SSH remote with the optional libssh2 backend, libgit2 does not perform certificate checking by default. Prior versions of libgit2 require the caller to set the `certificate_check` field of libgit2's `git_remote_callbacks` structure - if a certificate check callback is not set, libgit2 does not perform any certificate checking. This means that by default - without configuring a certificate check callback, clients will not perform validation on the server SSH keys and may be subject to a man-in-the-middle attack. Users are encouraged to upgrade to v1.4.5 or v1.5.1. Users unable to upgrade should ensure that all relevant certificates are manually checked. CVE-2023-22742
GHSA-8643-3wh5-rmjq
VCID-tkgy-cec8-dfdy The git_oid_nfmt function in commit.c in libgit2 before 0.24.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a cat-file command with a crafted object file. CVE-2016-8569
VCID-tmtv-wcxy-sqht libgit2: NTFS protections inactive when running Git in the Windows Subsystem for Linux CVE-2020-12279
GHSA-589j-mmg9-733v
VCID-xab7-k14p-uqbx The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable. CVE-2016-10130
VCID-yq57-g8j1-kfeu The git_commit_message function in oid.c in libgit2 before 0.24.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a cat-file command with a crafted object file. CVE-2016-8568

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:29:20.822502+00:00 Debian Importer Fixing VCID-yq57-g8j1-kfeu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:24:52.149970+00:00 Debian Importer Fixing VCID-er9h-5wad-buhg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:18:34.135385+00:00 Debian Importer Fixing VCID-rvbe-y541-nyh7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:53:56.964944+00:00 Debian Importer Fixing VCID-fhjz-7s1y-f7bm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:52:01.888275+00:00 Debian Importer Fixing VCID-t2ph-v249-a7g9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:43:03.628805+00:00 Debian Importer Fixing VCID-1uzu-6121-x7bc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:36:22.067489+00:00 Debian Importer Fixing VCID-bejf-17ah-tybt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:18:34.735163+00:00 Debian Importer Fixing VCID-xab7-k14p-uqbx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:59:55.776469+00:00 Debian Importer Fixing VCID-tkgy-cec8-dfdy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:57:50.917770+00:00 Debian Importer Fixing VCID-52tu-vs8k-fbfe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:38.188881+00:00 Debian Importer Fixing VCID-nq88-cr6a-17fw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:48.450761+00:00 Debian Importer Fixing VCID-2s6d-9bsu-zqaq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:03:23.975961+00:00 Debian Importer Fixing VCID-mpm1-9224-6kgu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:28.398935+00:00 Debian Importer Fixing VCID-k211-ta2v-8fb2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:56.153457+00:00 Debian Importer Fixing VCID-j1c4-rux6-wygr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:39.449909+00:00 Debian Importer Fixing VCID-tmtv-wcxy-sqht https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:18:29.871406+00:00 Debian Importer Fixing VCID-yq57-g8j1-kfeu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:15:11.160411+00:00 Debian Importer Fixing VCID-er9h-5wad-buhg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:10:10.234113+00:00 Debian Importer Fixing VCID-rvbe-y541-nyh7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:51:23.050106+00:00 Debian Importer Fixing VCID-fhjz-7s1y-f7bm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:49:57.185154+00:00 Debian Importer Fixing VCID-t2ph-v249-a7g9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:43:09.558835+00:00 Debian Importer Fixing VCID-1uzu-6121-x7bc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:38:08.889526+00:00 Debian Importer Fixing VCID-bejf-17ah-tybt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:25:11.163905+00:00 Debian Importer Fixing VCID-xab7-k14p-uqbx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:27:49.638424+00:00 Debian Importer Fixing VCID-tkgy-cec8-dfdy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:26:14.271289+00:00 Debian Importer Fixing VCID-52tu-vs8k-fbfe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:22:54.259671+00:00 Debian Importer Fixing VCID-nq88-cr6a-17fw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:13.707544+00:00 Debian Importer Fixing VCID-2s6d-9bsu-zqaq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:44:48.410325+00:00 Debian Importer Fixing VCID-mpm1-9224-6kgu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:34.097842+00:00 Debian Importer Fixing VCID-k211-ta2v-8fb2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:31.142955+00:00 Debian Importer Fixing VCID-j1c4-rux6-wygr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:11.166786+00:00 Debian Importer Fixing VCID-tmtv-wcxy-sqht https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:28:50.844774+00:00 Debian Importer Fixing VCID-fhjz-7s1y-f7bm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:50.785217+00:00 Debian Importer Fixing VCID-k211-ta2v-8fb2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:50.733945+00:00 Debian Importer Fixing VCID-t2ph-v249-a7g9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:50.686336+00:00 Debian Importer Fixing VCID-tmtv-wcxy-sqht https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:50.645321+00:00 Debian Importer Fixing VCID-52tu-vs8k-fbfe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:50.600783+00:00 Debian Importer Fixing VCID-mpm1-9224-6kgu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:50.551715+00:00 Debian Importer Fixing VCID-er9h-5wad-buhg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:50.503995+00:00 Debian Importer Fixing VCID-nq88-cr6a-17fw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:50.459887+00:00 Debian Importer Fixing VCID-2s6d-9bsu-zqaq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:50.410940+00:00 Debian Importer Fixing VCID-1uzu-6121-x7bc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:50.360980+00:00 Debian Importer Fixing VCID-tkgy-cec8-dfdy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:50.311830+00:00 Debian Importer Fixing VCID-yq57-g8j1-kfeu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:50.261613+00:00 Debian Importer Fixing VCID-xab7-k14p-uqbx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:50.213706+00:00 Debian Importer Fixing VCID-rvbe-y541-nyh7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:50.166133+00:00 Debian Importer Fixing VCID-bejf-17ah-tybt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:50.113948+00:00 Debian Importer Fixing VCID-j1c4-rux6-wygr https://security-tracker.debian.org/tracker/data/json 38.1.0