SB2018031237 - Fedora 27 update for libgit2
Published: March 12, 2018 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2016-8568)
The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.
The git_commit_message function in oid.c in libgit2 before 0.24.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a cat-file command with a crafted object file.
2) NULL pointer dereference (CVE-ID: CVE-2016-8569)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a cat-file command with a crafted object file.
3) Double free (CVE-ID: CVE-2018-8099)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the read_entry() function due to a double free error. A remote attacker can send a specially crafted repository index file, trick the victim into opening it and cause the service to crash.
4) Out-of-bounds read (CVE-ID: CVE-2018-8098)
The vulnerability allow a remote attacker to cause DoS condition on the target system.The weakness exists in the index.c:read_entry() function due to out-of-bounds read while decompressing a compressed prefix length. A remote attacker can send a specially crafted repository index file, trick the victim into opening it and cause the service to crash.
Remediation
Install update from vendor's website.