[Secure-testing-team] Bug#851406: libgit2: CVE-2016-10128 CVE-2016-10129 CVE-2016-10130 CVE-2017-5338 CVE-2017-5339

Salvatore Bonaccorso carnil at debian.org
Sat Jan 14 15:52:21 UTC 2017


Source: libgit2
Version: 0.24.5-1
Severity: important
Tags: upstream patch security

Hi,

the following vulnerabilities were published for libgit2.

CVE-2016-10128[0]:
smart_pkt: verify packet length exceeds PKT_LEN_SIZE

CVE-2016-10129[1]:
smart_pkt: treat empty packet lines as error

CVE-2016-10130[2]:
http: check certificate validity before clobbering the error variable

CVE-2017-5338[3]:
http: perform 'badssl' check also via certificate callback

CVE-2017-5339[4]:
http: correct the expected error for RC4

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-10128
[1] https://security-tracker.debian.org/tracker/CVE-2016-10129
[2] https://security-tracker.debian.org/tracker/CVE-2016-10130
[3] https://security-tracker.debian.org/tracker/CVE-2017-5338
[4] https://security-tracker.debian.org/tracker/CVE-2017-5339
[5] https://github.com/libgit2/libgit2/releases/tag/v0.25.1
[6] https://github.com/libgit2/libgit2/releases/tag/v0.24.6

Please adjust the affected versions in the BTS as needed. I only
looked so far at the source of libgit2 in unstable, jessie was not
checked.

Regards,
Salvatore



More information about the Secure-testing-team mailing list