CPANSA-Git-Raw-2016-10128-libgit2: Git-Raw vulnerability
| Publisher | giterlizzi | Document category | csaf_security_advisory |
|---|---|---|---|
| Initial release date | 2017-03-24T00:00:00 | Engine | CSAF Perl Toolkit 0.26 |
| Current release date | 2017-03-24T00:00:00 | Build Date | |
| Current version | 1 | Status | final |
| CVSS v3.1 Base Score | 9.8 | Severity | Critical |
| Original language | Language | en | |
| Also referred to | |||
Vulnerability Description
Buffer overflow in the git_pkt_parse_line function in transports/smart_pkt.c in the Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to have unspecified impact via a crafted non-flush packet.
Vulnerabilities
CVE-2016-10128
Vulnerability DescriptionBuffer overflow in the git_pkt_parse_line function in transports/smart_pkt.c in the Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to have unspecified impact via a crafted non-flush packet.
| Weakness | CWE-119 : Improper Restriction of Operations within the Bounds of a Memory Buffer |
|---|
Product status
Known affected
| Product | Score | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Git-Raw greater than or equal 0.61 and less than or equal 0.74 |
|
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-Git-Raw-2016-10128-libgit2 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2017/cpansa-git-raw-2016-10128-libgit2.json - https://libgit2.github.com/security/ external
https://libgit2.github.com/security/ - https://github.com/libgit2/libgit2/commit/66e3774d279672ee51c3b54545a79d20d1ada834 external
https://github.com/libgit2/libgit2/commit/66e3774d279672ee51c3b54545a79d20d1ada834 - https://github.com/libgit2/libgit2/commit/4ac39c76c0153d1ee6889a0984c39e97731684b2 external
https://github.com/libgit2/libgit2/commit/4ac39c76c0153d1ee6889a0984c39e97731684b2 - http://www.openwall.com/lists/oss-security/2017/01/11/6 external
http://www.openwall.com/lists/oss-security/2017/01/11/6 - http://www.openwall.com/lists/oss-security/2017/01/10/5 external
http://www.openwall.com/lists/oss-security/2017/01/10/5 - http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html external
http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html - http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html external
http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html - http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html external
http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html - http://www.securityfocus.com/bid/95338 external
http://www.securityfocus.com/bid/95338 - CVE-2016-10128 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2016-10128
Revision history
| Version | Date of the revision | Summary of the revision |
|---|---|---|
| 1 | Fri Mar 24 00:00:00 2017 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/