A flaw was found in libgit2, an out of bounds read when parsing an "ng" packet. libgit2 keeps track of both the current position as well as the remaining length of the packet itself. But instead of taking care not to exceed the length, libgit2 passs the current pointer's position to strchr, which will search for a certain character until hitting NUL. It is thus possible to create a crafted packet which doesn't contain a NUL byte to trigger an out-of-bounds read.
Created libgit2 tracking bugs for this issue:
Affects: epel-all [bug 1615589]
Affects: fedora-all [bug 1615587]
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):