First published: Wed Jul 04 2018(Updated: )
A flaw was found in libgit2 before version 0.27.3. It has been discovered that an unexpected sign extension in git_delta_apply function in delta.c file may lead to an integer overflow which in turn leads to an out of bound read, allowing to read before the base object. An attacker may use this flaw to leak memory addresses or cause a Denial of Service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libgit2 | <0.27.3 | 0.27.3 |
redhat/libgit2 | <0.26.5 | 0.26.5 |
CentOS Libgcc | <0.27.3 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10887 is a vulnerability in libgit2 before version 0.27.3 that allows an integer overflow and out-of-bounds read, potentially leading to unauthorized access.
CVE-2018-10887 has a severity rating of 8.1 (high).
Versions up to (but excluding) 0.27.3 of libgit2 are affected by CVE-2018-10887.
To fix CVE-2018-10887, update libgit2 to version 0.27.3 or higher.
More information about CVE-2018-10887 can be found at the following references: [insert references here].