CVE-2018-10887 (NVD)

2018-07-10

A flaw was found in libgit2 before version 0.27.3. It has been discovered that an unexpected sign extension in git_delta_apply function in delta.c file may lead to an integer overflow which in turn leads to an out of bound read, allowing to read before the base object. An attacker may use this flaw to leak memory addresses or cause a Denial of Service.

Products Debian_linux, Libgit2
Type Out-of-bounds Read (CWE-125)
Integer Overflow or Wraparound (CWE-190)
Incorrect Conversion between Numeric Types (CWE-681)
First patch https://github.com/libgit2/libgit2/commit/3f461902dc1072acb8b7607ee65d0a0458ffac2a
Patches https://github.com/libgit2/libgit2/commit/c1577110467b701dcbcf9439ac225ea851b47d22
https://github.com/libgit2/libgit2/releases/tag/v0.27.3
Relevant file/s • ./src/delta.c (modified, +15, -17)
• ./tests/delta/apply.c (added, +12)
• ./tests/diff/binary.c (modified, +1)
Links https://lists.debian.org/debian-lts-announce/2022/03/msg00031.html
https://lists.debian.org/debian-lts-announce/2018/08/msg00024.html
https://bugzilla.redhat.com/show_bug.cgi?id=1598021

libgit2 - Tree: 3f461902dc

(? files)

Filter Settings
Files
Navigation
Patch data:

(on by default)


Patched area: