First published: Sat Aug 18 2018(Updated: )
In ng_pkt in transports/smart_pkt.c in libgit2 before 0.26.6 and 0.27.x before 0.27.4, a remote attacker can send a crafted smart-protocol "ng" packet that lacks a '\0' byte to trigger an out-of-bounds read that leads to DoS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
libgit2 | <0.26.6 | |
libgit2 | >=0.27.0<0.27.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15501 is a vulnerability in libgit2 before version 0.26.6 and 0.27.x before 0.27.4 that allows a remote attacker to trigger an out-of-bounds read leading to denial of service (DoS).
Debian Debian Linux 8.0 is affected by CVE-2018-15501. Users running this version should update to a patched version of libgit2.
Debian Debian Linux 9.0 is affected by CVE-2018-15501. Users running this version should update to a patched version of libgit2.
Libgit2 before version 0.26.6 is affected by CVE-2018-15501. Users running this version should update to a newer version.
Libgit2 between version 0.27.0 and 0.27.4 are affected by CVE-2018-15501. Users running these versions should update to a patched version.