Information about security advisories affecting libgit2 and the releases that provide resolution.
In case you think to have found a security issue with libgit2, please do not open a public issue. Instead, you can report the issue to the private mailing list email@example.com.
As the index is never transferred via the network, exploitation requires an attacker to have access to the local repository.
This does not affect you if you rely on a system-installed version of zlib. All users of v0.26.0 who use the bundled zlib should upgrade to this release.
libgit2 v0.24.6 and libgit2 v0.25.1, January 9th, 2017
Includes two fixes, one performs extra sanitization for some edge cases in the Git Smart Protocol which can lead to attempting to parse outside of the buffer.
The second fix affects the certificate check callback. It provides a
parameter to indicate whether the native cryptographic library considered the
certificate to be correct. This parameter is always
true before these
releases leading to a possible MITM.
This does not affect you if you do not use the custom certificate callback or if you do not take this value into account. This does affect you if you use pygit2 or git2go regardless of whether you specify a certificate check callback.