The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line.
{ "vanir_signatures": [ { "source": "https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a", "signature_version": "v1", "id": "CVE-2016-10129-13623382", "signature_type": "Function", "target": { "file": "src/transports/smart_pkt.c", "function": "git_pkt_parse_line" }, "digest": { "function_hash": "281870942429809697964233429407479786064", "length": 1554.0 }, "deprecated": false }, { "source": "https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037", "signature_version": "v1", "id": "CVE-2016-10129-195a9e9d", "signature_type": "Function", "target": { "file": "src/transports/smart_protocol.c", "function": "add_push_report_sideband_pkt" }, "digest": { "function_hash": "11998386278566652511447441156810463108", "length": 767.0 }, "deprecated": false }, { "source": "https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037", "signature_version": "v1", "id": "CVE-2016-10129-32280dec", "signature_type": "Line", "target": { "file": "src/transports/smart_protocol.c" }, "digest": { "line_hashes": [ "152246948140881630936620450931454110309", "16811967277530017021368320486600957734", "292879344649057299944075837653643135603", "298549967763928690655120293789489243655", "1351908264529889708827696681179913415", "209556476821616921868639732362087551565", "4717289514444315326256119004573329260", "31197857794155343171574802300529497082", "49883739687684654055446185609463295700", "209343592385465559184471154071075468438" ], "threshold": 0.9 }, "deprecated": false }, { "source": "https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a", "signature_version": "v1", "id": "CVE-2016-10129-3da35acb", "signature_type": "Function", "target": { "file": "src/transports/smart_protocol.c", "function": "add_push_report_sideband_pkt" }, "digest": { "function_hash": "72184853542100227498318633168291035819", "length": 774.0 }, "deprecated": false }, { "source": "https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037", "signature_version": "v1", "id": "CVE-2016-10129-6b0895d6", "signature_type": "Function", "target": { "file": "src/transports/smart_pkt.c", "function": "git_pkt_parse_line" }, "digest": { "function_hash": "281870942429809697964233429407479786064", "length": 1554.0 }, "deprecated": false }, { "source": "https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a", "signature_version": "v1", "id": "CVE-2016-10129-74a8fb91", "signature_type": "Function", "target": { "file": "src/transports/smart_protocol.c", "function": "parse_report" }, "digest": { "function_hash": "135059002852762528863613157248762657959", "length": 1360.0 }, "deprecated": false }, { "source": "https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a", "signature_version": "v1", "id": "CVE-2016-10129-915a9770", "signature_type": "Line", "target": { "file": "src/transports/smart_pkt.c" }, "digest": { "line_hashes": [ "101839755603793106290328484701736422963", "293975838795653773247296107534766666266", "34812744770404104391051262345145744343", "313420562608858859424183210121050054975", "169105847764280994761539095595198651178", "22445389468608118118616150183562509198", "59273898729997772823423609055344856504" ], "threshold": 0.9 }, "deprecated": false }, { "source": "https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a", "signature_version": "v1", "id": "CVE-2016-10129-9c8e013c", "signature_type": "Line", "target": { "file": "src/transports/smart_protocol.c" }, "digest": { "line_hashes": [ "152246948140881630936620450931454110309", "16811967277530017021368320486600957734", "292879344649057299944075837653643135603", "298549967763928690655120293789489243655", "1351908264529889708827696681179913415", "209556476821616921868639732362087551565", "4717289514444315326256119004573329260", "31197857794155343171574802300529497082", "49883739687684654055446185609463295700", "209343592385465559184471154071075468438" ], "threshold": 0.9 }, "deprecated": false }, { "source": "https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037", "signature_version": "v1", "id": "CVE-2016-10129-c97927a5", "signature_type": "Line", "target": { "file": "src/transports/smart_pkt.c" }, "digest": { "line_hashes": [ "101839755603793106290328484701736422963", "293975838795653773247296107534766666266", "34812744770404104391051262345145744343", "313420562608858859424183210121050054975", "169105847764280994761539095595198651178", "22445389468608118118616150183562509198", "59273898729997772823423609055344856504" ], "threshold": 0.9 }, "deprecated": false }, { "source": "https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037", "signature_version": "v1", "id": "CVE-2016-10129-cd5e456d", "signature_type": "Function", "target": { "file": "src/transports/smart_protocol.c", "function": "parse_report" }, "digest": { "function_hash": "135059002852762528863613157248762657959", "length": 1360.0 }, "deprecated": false } ] }