CVE-2016-10130

NameCVE-2016-10130
DescriptionThe http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs851406, 860990

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cargo (PTS)jessie, jessie (lts)0.35.0-2~deb8u1fixed
stretch (security), stretch (lts), stretch0.43.1-3~deb9u1fixed
buster0.43.1-3~deb10u1fixed
bullseye0.47.0-3fixed
bookworm0.66.0+ds1-1fixed
libgit2 (PTS)jessie, jessie (lts)0.21.1-3+deb8u1fixed
stretch (security)0.25.1+really0.24.6-1+deb9u1fixed
stretch (lts), stretch0.25.1+really0.24.6-1+deb9u3fixed
buster (security), buster, buster (lts)0.27.7+dfsg.1-0.2+deb10u2fixed
bullseye (security), bullseye1.1.0+dfsg.1-4+deb11u2fixed
bookworm (security), bookworm1.5.1+ds-1+deb12u1fixed
sid, trixie1.8.4+ds-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cargosourceexperimental0.17.0-1~exp1
cargosource(unstable)0.17.0-1860990
libgit2sourcejessie(not affected)
libgit2source(unstable)0.25.1+really0.24.6-1851406

Notes

[jessie] - libgit2 <not-affected> (Vulnerable code not present)
https://github.com/libgit2/libgit2/commit/9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22 (v0.25.1)
https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211 (v0.24.6)

Search for package or bug name: Reporting problems