Your message dated Wed, 18 Jul 2018 08:26:09 +0530
with message-id <13d050b5-a300-22c1-daa8-77082a6d7...@onenetbeyond.org>
and subject line libgit2 0.27 is in unstable
has caused the Debian Bug report #892961,
regarding libgit2: CVE-2018-8098
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
892961: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892961
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libgit2
Version: 0.26.0+dfsg.1-1.1
Severity: important
Tags: patch security upstream

Hi,

the following vulnerability was published for libgit2.

CVE-2018-8098[0]:
| Integer overflow in the index.c:read_entry() function while
| decompressing a compressed prefix length in libgit2 before v0.26.2
| allows an attacker to cause a denial of service (out-of-bounds read)
| via a crafted repository index file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-8098
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8098
[1] 
https://github.com/libgit2/libgit2/commit/3207ddb0103543da8ad2139ec6539f590f9900c1
[2] 
https://github.com/libgit2/libgit2/commit/3db1af1f370295ad5355b8f64b865a2a357bcac0

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
closing

Attachment: signature.asc
Description: OpenPGP digital signature


--- End Message ---

Reply via email to