CVE-2018-10887
Published: July 10, 2018Last modified: November 9, 2023
Description
A flaw was found in libgit2 before version 0.27.3. It has been discovered that an unexpected sign extension in git_delta_apply function in delta.c file may lead to an integer overflow which in turn leads to an out of bound read, allowing to read before the base object. An attacker may use this flaw to leak memory addresses or cause a Denial of Service.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.1 |
Attack Vector | NETWORK |
Attack complexity | LOW |
Privileges required | NONE |
User interaction | REQUIRED |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | NONE |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | Stream | libgit2 | Not affected (1.7.1-r0) |
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1598021
- https://github.com/libgit2/libgit2/commit/3f461902dc1072acb8b7607ee65d0a0458ffac2a
- https://github.com/libgit2/libgit2/commit/c1577110467b701dcbcf9439ac225ea851b47d22
- https://github.com/libgit2/libgit2/releases/tag/v0.27.3
- https://lists.debian.org/debian-lts-announce/2018/08/msg00024.html
- https://lists.debian.org/debian-lts-announce/2022/03/msg00031.html