[USN-6678-1] libgit2 vulnerabilities

Fabian Toepfer fabian.toepfer at canonical.com
Tue Mar 5 18:58:57 UTC 2024


==========================================================================
Ubuntu Security Notice USN-6678-1
March 05, 2024

libgit2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in libgit2.

Software Description:
- libgit2: Portable C implementation of the Git core methods library

Details:

It was discovered that libgit2 mishandled equivalent filenames on NTFS
partitions. If a user or automated system were tricked into cloning a
specially crafted repository, an attacker could possibly use this issue to
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS. (CVE-2020-12278, CVE-2020-12279)

It was discovered that libgit2 did not perform certificate checking by
default. An attacker could possibly use this issue to perform a
machine-in-the-middle attack. This issue only affected Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2023-22742)

It was discovered that libgit2 could be made to run into an infinite loop.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 23.10. (CVE-2024-24575)

It was discovered that libgit2 did not properly manage memory. An attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. (CVE-2024-24577)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
   libgit2-1.5                     1.5.1+ds-1ubuntu1.1

Ubuntu 22.04 LTS:
   libgit2-1.1                     1.1.0+dfsg.1-4.1ubuntu0.1

Ubuntu 20.04 LTS:
   libgit2-28                      0.28.4+dfsg.1-2ubuntu0.1

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
   libgit2-26                      0.26.0+dfsg.1-1.1ubuntu0.2+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
   libgit2-24                      0.24.1-2ubuntu0.2+esm2

In general, a standard system update will make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-6678-1
   CVE-2020-12278, CVE-2020-12279, CVE-2023-22742, CVE-2024-24575,
   CVE-2024-24577

Package Information:
   https://launchpad.net/ubuntu/+source/libgit2/1.5.1+ds-1ubuntu1.1
https://launchpad.net/ubuntu/+source/libgit2/1.1.0+dfsg.1-4.1ubuntu0.1
https://launchpad.net/ubuntu/+source/libgit2/0.28.4+dfsg.1-2ubuntu0.1

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20240305/80c67a2a/attachment-0001.sig>


More information about the ubuntu-security-announce mailing list