16 results (0.009 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

06 Feb 2024 — libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leadi... • https://github.com/libgit2/libgit2/releases/tag/v1.6.5 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

06 Feb 2024 — libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_revparse_single` can cause the function to enter an infinite loop, potentially causing a Denial of Service attack in the calling application. The revparse function in `src/libgit2/revparse.c` uses a loop to parse the user-provided spec string. There is an edge-case during parsing that allows a bad actor to... • https://github.com/libgit2/libgit2/commit/add2dabb3c16aa49b33904dcdc07cd915efc12fa • CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.9EPSS: 0%CPEs: 2EXPL: 0

20 Jan 2023 — libgit2 is a cross-platform, linkable library implementation of Git. When using an SSH remote with the optional libssh2 backend, libgit2 does not perform certificate checking by default. Prior versions of libgit2 require the caller to set the `certificate_check` field of libgit2's `git_remote_callbacks` structure - if a certificate check callback is not set, libgit2 does not perform any certificate checking. This means that by default - without configuring a certificate check callback, clients will not perf... • http://www.openwall.com/lists/oss-security/2023/11/06/5 • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 9.8EPSS: 5%CPEs: 2EXPL: 0

27 Apr 2020 — An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. path.c mishandles equivalent filenames that exist because of NTFS Alternate Data Streams. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1352. Se descubrió un problema en libgit2 versiones anteriores a 0.28.4 y versiones 0.9x anteriores a 0.99.0. El archivo path.c maneja inapropiadamente los nombres de archivo equivalentes que existen debido al Flujo de Datos Alternativo de NTFS. • https://github.com/git/git/security/advisories/GHSA-5wph-8frv-58vj • CWE-706: Use of Incorrectly-Resolved Name or Reference •

CVSS: 9.8EPSS: 3%CPEs: 2EXPL: 0

27 Apr 2020 — An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. checkout.c mishandles equivalent filenames that exist because of NTFS short names. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1353. Se descubrió un problema en libgit2 versiones anteriores a 0.28.4 y versiones 0.9x anteriores a 0.99.0. El archivo checkout.c maneja inapropiadamente los nombres de archivo equivalentes que existen debido a los nombres cortos de NTFS. • https://github.com/git/git/security/advisories/GHSA-589j-mmg9-733v • CWE-706: Use of Incorrectly-Resolved Name or Reference •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

18 Aug 2018 — In ng_pkt in transports/smart_pkt.c in libgit2 before 0.26.6 and 0.27.x before 0.27.4, a remote attacker can send a crafted smart-protocol "ng" packet that lacks a '\0' byte to trigger an out-of-bounds read that leads to DoS. En ng_pkt en transports/smart_pkt.c en libgit2 antes de 0.26.6 y 0.27.x antes de 0.27.4, un atacante remoto puede enviar un paquete "ng" de protocolo inteligente manipulado que le falte un byte "\0" para activar una lectura fuera de límites que conduzca a una denegación de servicio (Do... • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9406 • CWE-125: Out-of-bounds Read •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

10 Jul 2018 — A flaw was found in libgit2 before version 0.27.3. A missing check in git_delta_apply function in delta.c file, may lead to an out-of-bound read while reading a binary delta file. An attacker may use this flaw to cause a Denial of Service. Se ha descubierto un problema en versiones anteriores a la 0.27.3 de libgit2. La falta de una comprobación en la función git_delta_apply en el archivo delta.c puede conducir a una lectura fuera de límites mientras se lee un archivo delta binario. • https://bugzilla.redhat.com/show_bug.cgi?id=1598024 • CWE-20: Improper Input Validation CWE-125: Out-of-bounds Read •

CVSS: 8.1EPSS: 0%CPEs: 3EXPL: 0

10 Jul 2018 — A flaw was found in libgit2 before version 0.27.3. It has been discovered that an unexpected sign extension in git_delta_apply function in delta.c file may lead to an integer overflow which in turn leads to an out of bound read, allowing to read before the base object. An attacker may use this flaw to leak memory addresses or cause a Denial of Service. Se ha descubierto un problema en versiones anteriores a la 0.27.3 de libgit2. Se ha descubierto que una extensión sign inesperada en la función git_delta_app... • https://bugzilla.redhat.com/show_bug.cgi?id=1598021 • CWE-125: Out-of-bounds Read CWE-190: Integer Overflow or Wraparound CWE-194: Unexpected Sign Extension CWE-681: Incorrect Conversion between Numeric Types •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

14 Mar 2018 — Incorrect returning of an error code in the index.c:read_entry() function leads to a double free in libgit2 before v0.26.2, which allows an attacker to cause a denial of service via a crafted repository index file. El retorno incorrecto de un código de error en la función index.c:read_entry() conduce a una doble liberación (double free) en libgit2, en versiones anteriores a la v0.26.2, que permite que un atacante provoque una denegación de servicio (DoS) mediante un archivo de índice de repositorios manipul... • https://github.com/libgit2/libgit2/commit/58a6fe94cb851f71214dbefac3f9bffee437d6fe • CWE-415: Double Free •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

14 Mar 2018 — Integer overflow in the index.c:read_entry() function while decompressing a compressed prefix length in libgit2 before v0.26.2 allows an attacker to cause a denial of service (out-of-bounds read) via a crafted repository index file. Desbordamiento de enteros en la función index.c:read_entry() mientras se descomprime una longitud de prefijo comprimida en libgit2, en versiones anteriores a la v0.26.2, permite que un atacante provoque una denegación de servicio (lectura fuera de límites) mediante un archivo de... • https://github.com/libgit2/libgit2/commit/3207ddb0103543da8ad2139ec6539f590f9900c1 • CWE-190: Integer Overflow or Wraparound •