CVE-2023-22742

NameCVE-2023-22742
Descriptionlibgit2 is a cross-platform, linkable library implementation of Git. When using an SSH remote with the optional libssh2 backend, libgit2 does not perform certificate checking by default. Prior versions of libgit2 require the caller to set the `certificate_check` field of libgit2's `git_remote_callbacks` structure - if a certificate check callback is not set, libgit2 does not perform any certificate checking. This means that by default - without configuring a certificate check callback, clients will not perform validation on the server SSH keys and may be subject to a man-in-the-middle attack. Users are encouraged to upgrade to v1.4.5 or v1.5.1. Users unable to upgrade should ensure that all relevant certificates are manually checked.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3340-1
Debian Bugs1029368

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libgit2 (PTS)bullseye (security), bullseye1.1.0+dfsg.1-4+deb11u2fixed
bookworm, bookworm (security)1.5.1+ds-1+deb12u1fixed
trixie1.8.2~rc1+ds2-1fixed
sid1.8.4+ds-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libgit2sourcebuster0.27.7+dfsg.1-0.2+deb10u1DLA-3340-1
libgit2sourcebullseye1.1.0+dfsg.1-4+deb11u1
libgit2source(unstable)1.5.1+ds-11029368

Notes

https://github.com/libgit2/libgit2/commit/cd6f679af401eda1f172402006ef8265f8bd58ea (v1.4.5)
https://github.com/libgit2/libgit2/commit/42e5db98b963ae503229c63e44e06e439df50e56 (v1.5.1)
https://github.com/libgit2/libgit2/security/advisories/GHSA-8643-3wh5-rmjq

Search for package or bug name: Reporting problems