File _patchinfo of Package patchinfo.6392
<patchinfo incident="6392"> <issue id="1019037" tracker="bnc">VUL-0: CVE-2016-10130,CVE-2017-5338,CVE-2017-5339: libgit2: MITM possible due to lack of parameter for certificate parameter</issue> <issue id="1019036" tracker="bnc">VUL-0: CVE-2016-10128,CVE-2016-10129: libgit2: edge cases in the Git Smart Protocol can lead to attempting to parse outside of the buffer</issue> <issue id="2016-10130" tracker="cve" /> <issue id="2016-10128" tracker="cve" /> <issue id="2016-10129" tracker="cve" /> <issue id="2017-5339" tracker="cve" /> <issue id="2017-5338" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>sreeves1</packager> <description> This update for libgit2 fixes the several issues. These security issues were fixed: - CVE-2016-10128: Additional sanitization prevent some edge cases in the Git Smart Protocol which can lead to reading outside of a buffer (bsc#1019036). - CVE-2016-10129: Additional sanitization prevent some edge cases in the Git Smart Protocol which can lead to reading outside of a buffer (bsc#1019036). - CVE-2016-10130: When using the custom certificate callback or when using pygit2 or git2go a attacker could have caused an invalid certificate to be accepted (bsc#1019037). - CVE-2017-5338: When using the custom certificate callback or when using pygit2 or git2go a attacker could have caused an invalid certificate to be accepted (bsc#1019037). - CVE-2017-5339: When using the custom certificate callback or when using pygit2 or git2go a attacker could have caused an invalid certificate to be accepted (bsc#1019037). This update was imported from the SUSE:SLE-12-SP2:Update update project.</description> <summary>Security update for libgit2</summary> </patchinfo>