Note:
This project will be discontinued after December 13, 2021. [more]
2018-07-10
A flaw was found in libgit2 before version 0.27.3. It has been discovered that an unexpected sign extension in git_delta_apply function in delta.c file may lead to an integer overflow which in turn leads to an out of bound read, allowing to read before the base object. An attacker may use this flaw to leak memory addresses or cause a Denial of Service.
Products | Debian_linux, Libgit2 |
Type | Out-of-bounds Read (CWE-125) Integer Overflow or Wraparound (CWE-190) Incorrect Conversion between Numeric Types (CWE-681) |
First patch |
https://github.com/libgit2/libgit2/commit/3f461902dc1072acb8b7607ee65d0a0458ffac2a |
Patches |
• https://github.com/libgit2/libgit2/commit/c1577110467b701dcbcf9439ac225ea851b47d22
• https://github.com/libgit2/libgit2/releases/tag/v0.27.3 |
Relevant file/s |
• ./src/delta.c (modified, +15, -17)
• ./tests/delta/apply.c (added, +12) • ./tests/diff/binary.c (modified, +1) |
Links |
• https://lists.debian.org/debian-lts-announce/2022/03/msg00031.html
• https://lists.debian.org/debian-lts-announce/2018/08/msg00024.html • https://bugzilla.redhat.com/show_bug.cgi?id=1598021 |
Navigation
Patch data:
Patched area:
(on by default)
Patched area: