UBUNTU-CVE-2016-10129

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2016-10129
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-10129.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2016-10129
Related
Published
2017-03-24T15:59:00Z
Modified
2017-03-24T15:59:00Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line.

References

Affected packages

Ubuntu:Pro:14.04:LTS / libgit2

Package

Name
libgit2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.19.0-2
0.19.0-2ubuntu0.4
0.19.0-2ubuntu0.4+esm1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:16.04:LTS / libgit2

Package

Name
libgit2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.22.2-2
0.23.1-1
0.24.1-2
0.24.1-2ubuntu0.2
0.24.1-2ubuntu0.2+esm1
0.24.1-2ubuntu0.2+esm2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:18.04:LTS / libgit2

Package

Name
libgit2
Purl
pkg:deb/ubuntu/libgit2@0.26.0+dfsg.1-1.1build1?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.26.0+dfsg.1-1.1build1

Affected versions

0.*

0.25.1+really0.24.6-1
0.26.0+dfsg.1-1.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "libgit2-26-dbgsym": "0.26.0+dfsg.1-1.1build1",
            "libgit2-dev": "0.26.0+dfsg.1-1.1build1",
            "libgit2-26": "0.26.0+dfsg.1-1.1build1"
        }
    ]
}