The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line.
[
{
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "git_pkt_parse_line",
"file": "src/transports/smart_pkt.c"
},
"digest": {
"function_hash": "281870942429809697964233429407479786064",
"length": 1554.0
},
"signature_type": "Function",
"source": "https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a",
"id": "CVE-2016-10129-13623382"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "add_push_report_sideband_pkt",
"file": "src/transports/smart_protocol.c"
},
"digest": {
"function_hash": "11998386278566652511447441156810463108",
"length": 767.0
},
"signature_type": "Function",
"source": "https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037",
"id": "CVE-2016-10129-195a9e9d"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "src/transports/smart_protocol.c"
},
"digest": {
"line_hashes": [
"152246948140881630936620450931454110309",
"16811967277530017021368320486600957734",
"292879344649057299944075837653643135603",
"298549967763928690655120293789489243655",
"1351908264529889708827696681179913415",
"209556476821616921868639732362087551565",
"4717289514444315326256119004573329260",
"31197857794155343171574802300529497082",
"49883739687684654055446185609463295700",
"209343592385465559184471154071075468438"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037",
"id": "CVE-2016-10129-32280dec"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "add_push_report_sideband_pkt",
"file": "src/transports/smart_protocol.c"
},
"digest": {
"function_hash": "72184853542100227498318633168291035819",
"length": 774.0
},
"signature_type": "Function",
"source": "https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a",
"id": "CVE-2016-10129-3da35acb"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "git_pkt_parse_line",
"file": "src/transports/smart_pkt.c"
},
"digest": {
"function_hash": "281870942429809697964233429407479786064",
"length": 1554.0
},
"signature_type": "Function",
"source": "https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037",
"id": "CVE-2016-10129-6b0895d6"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "parse_report",
"file": "src/transports/smart_protocol.c"
},
"digest": {
"function_hash": "135059002852762528863613157248762657959",
"length": 1360.0
},
"signature_type": "Function",
"source": "https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a",
"id": "CVE-2016-10129-74a8fb91"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "src/transports/smart_pkt.c"
},
"digest": {
"line_hashes": [
"101839755603793106290328484701736422963",
"293975838795653773247296107534766666266",
"34812744770404104391051262345145744343",
"313420562608858859424183210121050054975",
"169105847764280994761539095595198651178",
"22445389468608118118616150183562509198",
"59273898729997772823423609055344856504"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a",
"id": "CVE-2016-10129-915a9770"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "src/transports/smart_protocol.c"
},
"digest": {
"line_hashes": [
"152246948140881630936620450931454110309",
"16811967277530017021368320486600957734",
"292879344649057299944075837653643135603",
"298549967763928690655120293789489243655",
"1351908264529889708827696681179913415",
"209556476821616921868639732362087551565",
"4717289514444315326256119004573329260",
"31197857794155343171574802300529497082",
"49883739687684654055446185609463295700",
"209343592385465559184471154071075468438"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a",
"id": "CVE-2016-10129-9c8e013c"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "src/transports/smart_pkt.c"
},
"digest": {
"line_hashes": [
"101839755603793106290328484701736422963",
"293975838795653773247296107534766666266",
"34812744770404104391051262345145744343",
"313420562608858859424183210121050054975",
"169105847764280994761539095595198651178",
"22445389468608118118616150183562509198",
"59273898729997772823423609055344856504"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037",
"id": "CVE-2016-10129-c97927a5"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "parse_report",
"file": "src/transports/smart_protocol.c"
},
"digest": {
"function_hash": "135059002852762528863613157248762657959",
"length": 1360.0
},
"signature_type": "Function",
"source": "https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037",
"id": "CVE-2016-10129-cd5e456d"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-10129.json"