Количество 16
Количество 16

CVE-2024-24577
libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.

CVE-2024-24577
libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.

CVE-2024-24577
libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.

CVE-2024-24577
CVE-2024-24577
libgit2 is a portable C implementation of the Git core methods provide ...

SUSE-SU-2024:2656-1
Security update for git

SUSE-SU-2024:2619-1
Security update for libgit2

SUSE-SU-2024:2610-1
Security update for libgit2

SUSE-SU-2024:2599-1
Security update for git

SUSE-SU-2024:2598-1
Security update for libgit2

SUSE-SU-2024:2592-1
Security update for git

SUSE-SU-2024:2583-1
Security update for libgit2

SUSE-SU-2024:2579-1
Security update for git

BDU:2024-01377
Уязвимость функции has_dir_name в src/libgit2/index.c реализации методов Git на языке C Libgit2, позволяющая нарушителю выполнить произвольный код

SUSE-SU-2024:2584-1
Security update for libgit2

ROS-20240410-13
Множественные уязвимости libgit2
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-24577 libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2. | CVSS3: 8.6 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-24577 libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2. | CVSS3: 9.8 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-24577 libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2. | CVSS3: 8.6 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 9.8 | 0% Низкий | больше 1 года назад | |
CVE-2024-24577 libgit2 is a portable C implementation of the Git core methods provide ... | CVSS3: 8.6 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:2656-1 Security update for git | 0% Низкий | 11 месяцев назад | |
![]() | SUSE-SU-2024:2619-1 Security update for libgit2 | 0% Низкий | 11 месяцев назад | |
![]() | SUSE-SU-2024:2610-1 Security update for libgit2 | 0% Низкий | 11 месяцев назад | |
![]() | SUSE-SU-2024:2599-1 Security update for git | 0% Низкий | 11 месяцев назад | |
![]() | SUSE-SU-2024:2598-1 Security update for libgit2 | 0% Низкий | 11 месяцев назад | |
![]() | SUSE-SU-2024:2592-1 Security update for git | 0% Низкий | 11 месяцев назад | |
![]() | SUSE-SU-2024:2583-1 Security update for libgit2 | 0% Низкий | 11 месяцев назад | |
![]() | SUSE-SU-2024:2579-1 Security update for git | 0% Низкий | 11 месяцев назад | |
![]() | BDU:2024-01377 Уязвимость функции has_dir_name в src/libgit2/index.c реализации методов Git на языке C Libgit2, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 0% Низкий | больше 1 года назад |
![]() | SUSE-SU-2024:2584-1 Security update for libgit2 | 11 месяцев назад | ||
![]() | ROS-20240410-13 Множественные уязвимости libgit2 | CVSS3: 9.8 | около 1 года назад |
Уязвимостей на страницу