First published: Tue Mar 05 2024(Updated: )
It was discovered that libgit2 mishandled equivalent filenames on NTFS partitions. If a user or automated system were tricked into cloning a specially crafted repository, an attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2020-12278, CVE-2020-12279) It was discovered that libgit2 did not perform certificate checking by default. An attacker could possibly use this issue to perform a machine-in-the-middle attack. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2023-22742) It was discovered that libgit2 could be made to run into an infinite loop. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 23.10. (CVE-2024-24575) It was discovered that libgit2 did not properly manage memory. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-24577)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libgit2-1.5 | <1.5.1+ds-1ubuntu1.1 | 1.5.1+ds-1ubuntu1.1 |
Ubuntu Ubuntu | =23.10 | |
All of | ||
ubuntu/libgit2-1.1 | <1.1.0+dfsg.1-4.1ubuntu0.1 | 1.1.0+dfsg.1-4.1ubuntu0.1 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/libgit2-28 | <0.28.4+dfsg.1-2ubuntu0.1 | 0.28.4+dfsg.1-2ubuntu0.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/libgit2-26 | <0.26.0+dfsg.1-1.1ubuntu0.2+esm1 | 0.26.0+dfsg.1-1.1ubuntu0.2+esm1 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/libgit2-24 | <0.24.1-2ubuntu0.2+esm2 | 0.24.1-2ubuntu0.2+esm2 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)