UBUNTU-CVE-2016-10128

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2016-10128
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-10128.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2016-10128
Related
Published
2017-03-24T15:59:00Z
Modified
2017-03-24T15:59:00Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Buffer overflow in the gitpktparseline function in transports/smartpkt.c in the Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to have unspecified impact via a crafted non-flush packet.

References

Affected packages

Ubuntu:Pro:14.04:LTS / libgit2

Package

Name
libgit2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.19.0-2
0.19.0-2ubuntu0.4
0.19.0-2ubuntu0.4+esm1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:16.04:LTS / libgit2

Package

Name
libgit2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.22.2-2
0.23.1-1
0.24.1-2
0.24.1-2ubuntu0.2
0.24.1-2ubuntu0.2+esm1
0.24.1-2ubuntu0.2+esm2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:18.04:LTS / libgit2

Package

Name
libgit2
Purl
pkg:deb/ubuntu/libgit2@0.26.0+dfsg.1-1.1build1?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.26.0+dfsg.1-1.1build1

Affected versions

0.*

0.25.1+really0.24.6-1
0.26.0+dfsg.1-1.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "libgit2-26-dbgsym": "0.26.0+dfsg.1-1.1build1",
            "libgit2-dev": "0.26.0+dfsg.1-1.1build1",
            "libgit2-26": "0.26.0+dfsg.1-1.1build1"
        }
    ]
}