Логотип exploitDog
bind:"CVE-2024-24577"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-24577"

Количество 16

Количество 16

ubuntu логотип

CVE-2024-24577

больше 1 года назад

libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.

CVSS3: 8.6
EPSS: Низкий
redhat логотип

CVE-2024-24577

больше 1 года назад

libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2024-24577

больше 1 года назад

libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.

CVSS3: 8.6
EPSS: Низкий
msrc логотип

CVE-2024-24577

больше 1 года назад

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2024-24577

больше 1 года назад

libgit2 is a portable C implementation of the Git core methods provide ...

CVSS3: 8.6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2656-1

11 месяцев назад

Security update for git

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2619-1

11 месяцев назад

Security update for libgit2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2610-1

11 месяцев назад

Security update for libgit2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2599-1

11 месяцев назад

Security update for git

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2598-1

11 месяцев назад

Security update for libgit2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2592-1

11 месяцев назад

Security update for git

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2583-1

11 месяцев назад

Security update for libgit2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2579-1

11 месяцев назад

Security update for git

EPSS: Низкий
fstec логотип

BDU:2024-01377

больше 1 года назад

Уязвимость функции has_dir_name в src/libgit2/index.c реализации методов Git на языке C Libgit2, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2584-1

11 месяцев назад

Security update for libgit2

EPSS: Низкий
redos логотип

ROS-20240410-13

около 1 года назад

Множественные уязвимости libgit2

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-24577

libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.

CVSS3: 8.6
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-24577

libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.

CVSS3: 9.8
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-24577

libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.

CVSS3: 8.6
0%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 9.8
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-24577

libgit2 is a portable C implementation of the Git core methods provide ...

CVSS3: 8.6
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2656-1

Security update for git

0%
Низкий
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2619-1

Security update for libgit2

0%
Низкий
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2610-1

Security update for libgit2

0%
Низкий
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2599-1

Security update for git

0%
Низкий
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2598-1

Security update for libgit2

0%
Низкий
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2592-1

Security update for git

0%
Низкий
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2583-1

Security update for libgit2

0%
Низкий
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2579-1

Security update for git

0%
Низкий
11 месяцев назад
fstec логотип
BDU:2024-01377

Уязвимость функции has_dir_name в src/libgit2/index.c реализации методов Git на языке C Libgit2, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2584-1

Security update for libgit2

11 месяцев назад
redos логотип
ROS-20240410-13

Множественные уязвимости libgit2

CVSS3: 9.8
около 1 года назад

Уязвимостей на страницу