Buffer overflow in the gitpktparseline function in transports/smartpkt.c in the Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to have unspecified impact via a crafted non-flush packet.
{
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "0.24.5"
},
{
"last_affected": "0.25.0"
},
{
"last_affected": "0.25.0-rc1"
},
{
"last_affected": "0.25.0-rc2"
}
],
"cpe": [
"cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*"
]
}