DEBIAN-CVE-2018-10887

Source
https://security-tracker.debian.org/tracker/CVE-2018-10887
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2018-10887.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2018-10887
Upstream
Published
2018-07-10T14:29:00Z
Modified
2025-09-25T22:40:41Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in libgit2 before version 0.27.3. It has been discovered that an unexpected sign extension in gitdeltaapply function in delta.c file may lead to an integer overflow which in turn leads to an out of bound read, allowing to read before the base object. An attacker may use this flaw to leak memory addresses or cause a Denial of Service.

References

Affected packages

Debian:11 / libgit2

Package

Name
libgit2
Purl
pkg:deb/debian/libgit2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.27.4+dfsg.1-0.1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / libgit2

Package

Name
libgit2
Purl
pkg:deb/debian/libgit2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.27.4+dfsg.1-0.1

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / libgit2

Package

Name
libgit2
Purl
pkg:deb/debian/libgit2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.27.4+dfsg.1-0.1

Ecosystem specific

{
    "urgency": "low"
}

Debian:14 / libgit2

Package

Name
libgit2
Purl
pkg:deb/debian/libgit2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.27.4+dfsg.1-0.1

Ecosystem specific

{
    "urgency": "low"
}