{"affected":[{"ecosystem_specific":{"binaries":[{"libgit2-26":"0.26.6-3.5.2","libgit2-devel":"0.26.6-3.5.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15","name":"libgit2","purl":"pkg:rpm/suse/libgit2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.26.6-3.5.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for libgit2 to version 0.26.5 fixes the following issues:\n\nThe following security vulnerabilities were addressed:\n\n- CVE-2018-10887: Fixed an integer overflow which in turn leads to an out of\n  bound read, allowing to read the base object, which could be exploited by\n  an attacker to cause denial of service (DoS) (bsc#1100613).\n- CVE-2018-10888: Fixed an out-of-bound read while reading a binary delta file,\n  which could be exploited by an attacker t ocause a denial of service (DoS)\n  (bsc#1100612).\n- CVE-2018-11235: Fixed a remote code execution, which could occur with a\n  crafted .gitmodules file (bsc#1095219)\n- CVE-2018-15501: Prevent out-of-bounds reads when processing smart-protocol 'ng' packets\n  (bsc#1104641)\n","id":"SUSE-SU-2018:2469-1","modified":"2018-08-21T12:52:53Z","published":"2018-08-21T12:52:53Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20182469-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1095219"},{"type":"REPORT","url":"https://bugzilla.suse.com/1100612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1100613"},{"type":"REPORT","url":"https://bugzilla.suse.com/1104641"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-10887"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-10888"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-11235"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-15501"}],"related":["CVE-2018-10887","CVE-2018-10888","CVE-2018-11235","CVE-2018-15501"],"summary":"Security update for libgit2","upstream":["CVE-2018-10887","CVE-2018-10888","CVE-2018-11235","CVE-2018-15501"]}