15 results (0.006 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. • https://github.com/libgit2/libgit2/releases/tag/v1.6.5 https://github.com/libgit2/libgit2/releases/tag/v1.7.2 https://github.com/libgit2/libgit2/security/advisories/GHSA-j2v7-4f6v-gpg8 https://lists.debian.org/debian-lts-announce/2024/02/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4M3P7WIEPXNRLBINQRJFXUSTNKBCHYC7 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7CNDW3PF6NHO7OXNM5GN6WSSGAMA7MZE https://lists. • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 5.9EPSS: 0%CPEs: 2EXPL: 0

libgit2 is a cross-platform, linkable library implementation of Git. When using an SSH remote with the optional libssh2 backend, libgit2 does not perform certificate checking by default. Prior versions of libgit2 require the caller to set the `certificate_check` field of libgit2's `git_remote_callbacks` structure - if a certificate check callback is not set, libgit2 does not perform any certificate checking. This means that by default - without configuring a certificate check callback, clients will not perform validation on the server SSH keys and may be subject to a man-in-the-middle attack. Users are encouraged to upgrade to v1.4.5 or v1.5.1. • http://www.openwall.com/lists/oss-security/2023/11/06/5 https://github.com/libgit2/libgit2/commit/42e5db98b963ae503229c63e44e06e439df50e56 https://github.com/libgit2/libgit2/commit/cd6f679af401eda1f172402006ef8265f8bd58ea https://github.com/libgit2/libgit2/releases/tag/v1.4.5 https://github.com/libgit2/libgit2/releases/tag/v1.5.1 https://github.com/libgit2/libgit2/security/advisories/GHSA-8643-3wh5-rmjq https://www.libssh2.org • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 9.8EPSS: 3%CPEs: 2EXPL: 0

An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. path.c mishandles equivalent filenames that exist because of NTFS Alternate Data Streams. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1352. Se descubrió un problema en libgit2 versiones anteriores a 0.28.4 y versiones 0.9x anteriores a 0.99.0. El archivo path.c maneja inapropiadamente los nombres de archivo equivalentes que existen debido al Flujo de Datos Alternativo de NTFS. • https://github.com/git/git/security/advisories/GHSA-5wph-8frv-58vj https://github.com/libgit2/libgit2/commit/3f7851eadca36a99627ad78cbe56a40d3776ed01 https://github.com/libgit2/libgit2/commit/e1832eb20a7089f6383cfce474f213157f5300cb https://github.com/libgit2/libgit2/releases/tag/v0.28.4 https://github.com/libgit2/libgit2/releases/tag/v0.99.0 https://lists.debian.org/debian-lts-announce/2022/03/msg00031.html https://lists.debian.org/debian-lts-announce/2023/02/msg00034.html • CWE-706: Use of Incorrectly-Resolved Name or Reference •

CVSS: 9.8EPSS: 2%CPEs: 2EXPL: 0

An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. checkout.c mishandles equivalent filenames that exist because of NTFS short names. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1353. Se descubrió un problema en libgit2 versiones anteriores a 0.28.4 y versiones 0.9x anteriores a 0.99.0. El archivo checkout.c maneja inapropiadamente los nombres de archivo equivalentes que existen debido a los nombres cortos de NTFS. • https://github.com/git/git/security/advisories/GHSA-589j-mmg9-733v https://github.com/libgit2/libgit2/commit/64c612cc3e25eff5fb02c59ef5a66ba7a14751e4 https://github.com/libgit2/libgit2/releases/tag/v0.28.4 https://github.com/libgit2/libgit2/releases/tag/v0.99.0 https://lists.debian.org/debian-lts-announce/2022/03/msg00031.html https://lists.debian.org/debian-lts-announce/2023/02/msg00034.html • CWE-706: Use of Incorrectly-Resolved Name or Reference •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

In ng_pkt in transports/smart_pkt.c in libgit2 before 0.26.6 and 0.27.x before 0.27.4, a remote attacker can send a crafted smart-protocol "ng" packet that lacks a '\0' byte to trigger an out-of-bounds read that leads to DoS. En ng_pkt en transports/smart_pkt.c en libgit2 antes de 0.26.6 y 0.27.x antes de 0.27.4, un atacante remoto puede enviar un paquete "ng" de protocolo inteligente manipulado que le falte un byte "\0" para activar una lectura fuera de límites que conduzca a una denegación de servicio (DoS). • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9406 https://bugzilla.suse.com/show_bug.cgi?id=1104641 https://github.com/libgit2/libgit2/commit/1f9a8510e1d2f20ed7334eeeddb92c4dd8e7c649 https://github.com/libgit2/libgit2/releases/tag/v0.26.6 https://github.com/libgit2/libgit2/releases/tag/v0.27.4 https://lists.debian.org/debian-lts-announce/2018/08/msg00024.html https://lists.debian.org/debian-lts-announce/2022/03/msg00031.html https://www.pro-linux.de/sicherheit/2/44650/ • CWE-125: Out-of-bounds Read •