First published: Fri Mar 24 2017(Updated: )
The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
libgit2 | <=0.24.5 | |
libgit2 | =0.25.0 | |
libgit2 | =0.25.0-rc1 | |
libgit2 | =0.25.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10129 is classified as a denial of service vulnerability due to a NULL pointer dereference.
To fix CVE-2016-10129, update libgit2 to version 0.24.6 or 0.25.1 or later.
CVE-2016-10129 affects libgit2 versions before 0.24.6 and specifically 0.25.0 and its release candidates.
Remote attackers can exploit CVE-2016-10129 by sending an empty packet line to the Git Smart Protocol.
While CVE-2016-10129 leads to a denial of service, its criticality depends on the context and potential impact on services relying on libgit2.