• CVE-2024-24577

发布时间: 2024年2月23日

修改时间: 2024年10月31日

概要

libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.

CVSS v3 指标

NVD openEuler
Confidentiality High High
Attack Vector Network Network
CVSS评分 9.8 8.6
Attack Complexity Low Low
Privileges Required None None
Scope Unchanged Unchanged
Integrity High Low
User Interaction None None
Availability High Low

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-1482 libgit2 security update 2024年2月23日
KylinSec-SA-2024-1477 rust security update 2024年2月23日
KylinSec-SA-2024-1563 rust security update 2024年2月23日

影响产品

产品 状态
KY3.4-4A libgit2 Fixed
KY3.4-5A libgit2 Fixed
KY3.5.1 libgit2 Fixed
KY3.5.2 libgit2 Fixed