Количество 16
Количество 16
CVE-2024-24577
libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.
CVE-2024-24577
libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.
CVE-2024-24577
libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.
CVE-2024-24577
libgit2 is vulnerable to arbitrary code execution due to heap corruption in `git_index_add`
CVE-2024-24577
libgit2 is a portable C implementation of the Git core methods provide ...
SUSE-SU-2024:2656-1
Security update for git
SUSE-SU-2024:2619-1
Security update for libgit2
SUSE-SU-2024:2610-1
Security update for libgit2
SUSE-SU-2024:2599-1
Security update for git
SUSE-SU-2024:2598-1
Security update for libgit2
SUSE-SU-2024:2592-1
Security update for git
SUSE-SU-2024:2583-1
Security update for libgit2
SUSE-SU-2024:2579-1
Security update for git
BDU:2024-01377
Уязвимость функции has_dir_name в src/libgit2/index.c реализации методов Git на языке C Libgit2, позволяющая нарушителю выполнить произвольный код
SUSE-SU-2024:2584-1
Security update for libgit2
ROS-20240410-13
Множественные уязвимости libgit2
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-24577 libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2. | CVSS3: 8.6 | 0% Низкий | почти 2 года назад | |
CVE-2024-24577 libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2. | CVSS3: 9.8 | 0% Низкий | почти 2 года назад | |
CVE-2024-24577 libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2. | CVSS3: 8.6 | 0% Низкий | почти 2 года назад | |
CVE-2024-24577 libgit2 is vulnerable to arbitrary code execution due to heap corruption in `git_index_add` | CVSS3: 9.8 | 0% Низкий | почти 2 года назад | |
CVE-2024-24577 libgit2 is a portable C implementation of the Git core methods provide ... | CVSS3: 8.6 | 0% Низкий | почти 2 года назад | |
SUSE-SU-2024:2656-1 Security update for git | 0% Низкий | больше 1 года назад | ||
SUSE-SU-2024:2619-1 Security update for libgit2 | 0% Низкий | больше 1 года назад | ||
SUSE-SU-2024:2610-1 Security update for libgit2 | 0% Низкий | больше 1 года назад | ||
SUSE-SU-2024:2599-1 Security update for git | 0% Низкий | больше 1 года назад | ||
SUSE-SU-2024:2598-1 Security update for libgit2 | 0% Низкий | больше 1 года назад | ||
SUSE-SU-2024:2592-1 Security update for git | 0% Низкий | больше 1 года назад | ||
SUSE-SU-2024:2583-1 Security update for libgit2 | 0% Низкий | больше 1 года назад | ||
SUSE-SU-2024:2579-1 Security update for git | 0% Низкий | больше 1 года назад | ||
BDU:2024-01377 Уязвимость функции has_dir_name в src/libgit2/index.c реализации методов Git на языке C Libgit2, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 0% Низкий | почти 2 года назад | |
SUSE-SU-2024:2584-1 Security update for libgit2 | больше 1 года назад | |||
ROS-20240410-13 Множественные уязвимости libgit2 | CVSS3: 9.8 | больше 1 года назад |
Уязвимостей на страницу