A flaw was found in libgit2 before version 0.27.3. A missing check in git_delta_apply function in delta.c file, may lead to an out-of-bound read while reading a binary delta file. An attacker may use this flaw to cause a Denial of Service.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/libgit2/libgit2/commit/9844d38bed10e9ff17174434b3421b227ae710f3 | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2018/08/msg00024.html | third party advisory mailing list |
https://github.com/libgit2/libgit2/releases/tag/v0.27.3 | release notes third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1598024 | issue tracking third party advisory patch |
https://lists.debian.org/debian-lts-announce/2022/03/msg00031.html | third party advisory mailing list |