Логотип exploitDog
bind:"BDU:2024-01377" OR bind:"CVE-2024-24577"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2024-01377" OR bind:"CVE-2024-24577"

Количество 16

Количество 16

fstec логотип

BDU:2024-01377

почти 2 года назад

Уязвимость функции has_dir_name в src/libgit2/index.c реализации методов Git на языке C Libgit2, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий
redos логотип

ROS-20240410-13

больше 1 года назад

Множественные уязвимости libgit2

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2024-24577

почти 2 года назад

libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.

CVSS3: 8.6
EPSS: Низкий
redhat логотип

CVE-2024-24577

почти 2 года назад

libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2024-24577

почти 2 года назад

libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.

CVSS3: 8.6
EPSS: Низкий
msrc логотип

CVE-2024-24577

почти 2 года назад

libgit2 is vulnerable to arbitrary code execution due to heap corruption in `git_index_add`

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2024-24577

почти 2 года назад

libgit2 is a portable C implementation of the Git core methods provide ...

CVSS3: 8.6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2656-1

больше 1 года назад

Security update for git

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2619-1

больше 1 года назад

Security update for libgit2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2610-1

больше 1 года назад

Security update for libgit2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2599-1

больше 1 года назад

Security update for git

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2598-1

больше 1 года назад

Security update for libgit2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2592-1

больше 1 года назад

Security update for git

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2583-1

больше 1 года назад

Security update for libgit2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2579-1

больше 1 года назад

Security update for git

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2584-1

больше 1 года назад

Security update for libgit2

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2024-01377

Уязвимость функции has_dir_name в src/libgit2/index.c реализации методов Git на языке C Libgit2, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
0%
Низкий
почти 2 года назад
redos логотип
ROS-20240410-13

Множественные уязвимости libgit2

CVSS3: 9.8
больше 1 года назад
ubuntu логотип
CVE-2024-24577

libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.

CVSS3: 8.6
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2024-24577

libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.

CVSS3: 9.8
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2024-24577

libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.

CVSS3: 8.6
0%
Низкий
почти 2 года назад
msrc логотип
CVE-2024-24577

libgit2 is vulnerable to arbitrary code execution due to heap corruption in `git_index_add`

CVSS3: 9.8
0%
Низкий
почти 2 года назад
debian логотип
CVE-2024-24577

libgit2 is a portable C implementation of the Git core methods provide ...

CVSS3: 8.6
0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2024:2656-1

Security update for git

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2619-1

Security update for libgit2

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2610-1

Security update for libgit2

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2599-1

Security update for git

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2598-1

Security update for libgit2

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2592-1

Security update for git

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2583-1

Security update for libgit2

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2579-1

Security update for git

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2584-1

Security update for libgit2

больше 1 года назад

Уязвимостей на страницу