[Secure-testing-team] Bug#851406: libgit2: CVE-2016-10128 CVE-2016-10129 CVE-2016-10130 CVE-2017-5338 CVE-2017-5339
Salvatore Bonaccorso
carnil at debian.org
Sat Jan 14 15:52:21 UTC 2017
Source: libgit2
Version: 0.24.5-1
Severity: important
Tags: upstream patch security
Hi,
the following vulnerabilities were published for libgit2.
CVE-2016-10128[0]:
smart_pkt: verify packet length exceeds PKT_LEN_SIZE
CVE-2016-10129[1]:
smart_pkt: treat empty packet lines as error
CVE-2016-10130[2]:
http: check certificate validity before clobbering the error variable
CVE-2017-5338[3]:
http: perform 'badssl' check also via certificate callback
CVE-2017-5339[4]:
http: correct the expected error for RC4
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2016-10128
[1] https://security-tracker.debian.org/tracker/CVE-2016-10129
[2] https://security-tracker.debian.org/tracker/CVE-2016-10130
[3] https://security-tracker.debian.org/tracker/CVE-2017-5338
[4] https://security-tracker.debian.org/tracker/CVE-2017-5339
[5] https://github.com/libgit2/libgit2/releases/tag/v0.25.1
[6] https://github.com/libgit2/libgit2/releases/tag/v0.24.6
Please adjust the affected versions in the BTS as needed. I only
looked so far at the source of libgit2 in unstable, jessie was not
checked.
Regards,
Salvatore
More information about the Secure-testing-team
mailing list