SB2018031236 - Fedora 28 update for libgit2



SB2018031236 - Fedora 28 update for libgit2

Published: March 12, 2018 Updated: April 24, 2025

Security Bulletin ID SB2018031236
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 25% Low 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Out-of-bounds read (CVE-ID: CVE-2016-8568)

The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.

The git_commit_message function in oid.c in libgit2 before 0.24.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a cat-file command with a crafted object file.


2) NULL pointer dereference (CVE-ID: CVE-2016-8569)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a cat-file command with a crafted object file.


3) Double free (CVE-ID: CVE-2018-8099)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the read_entry() function due to a double free error. A remote attacker can send a specially crafted repository index file, trick the victim into opening it and cause the service to crash.

4) Out-of-bounds read (CVE-ID: CVE-2018-8098)

The vulnerability allow a remote attacker to cause DoS condition on the target system.

The weakness exists in the index.c:read_entry() function due to out-of-bounds read while decompressing a compressed prefix length. A remote attacker can send a specially crafted repository index file, trick the victim into opening it and cause the service to crash.

Remediation

Install update from vendor's website.