A flaw was found in libgit2 before version 0.27.3. It has been discovered that an unexpected sign extension in git_delta_apply function in delta.c file may lead to an integer overflow which in turn leads to an out of bound read, allowing to read before the base object. An attacker may use this flaw to leak memory addresses or cause a Denial of Service.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1598021 | Issue Tracking Patch |
https://github.com/libgit2/libgit2/commit/3f461902dc1072acb8b7607ee65d0a0458ffac2a | Patch |
https://github.com/libgit2/libgit2/commit/c1577110467b701dcbcf9439ac225ea851b47d22 | Patch |
https://github.com/libgit2/libgit2/releases/tag/v0.27.3 | Patch Release Notes |
https://lists.debian.org/debian-lts-announce/2018/08/msg00024.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/03/msg00031.html | Mailing List Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2018-07-09T00:00:00
Updated: 2022-03-21T02:06:10
Reserved: 2018-05-09T00:00:00
Link: CVE-2018-10887
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-07-10T14:29:00.260
Modified: 2024-02-15T20:59:49.467
Link: CVE-2018-10887
JSON object: View
Redhat Information
No data.