CVE-2024-24575

libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_revparse_single` can cause the function to enter an infinite loop, potentially causing a Denial of Service attack in the calling application. The revparse function in `src/libgit2/revparse.c` uses a loop to parse the user-provided spec string. There is an edge-case during parsing that allows a bad actor to force the loop conditions to access arbitrary memory. Potentially, this could also leak memory if the extracted rev spec is reflected back to the attacker. As such, libgit2 versions before 1.4.0 are not affected. Users should upgrade to version 1.6.5 or 1.7.2.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libgit2:libgit2:*:*:*:*:*:*:*:*
cpe:2.3:a:libgit2:libgit2:*:*:*:*:*:*:*:*

History

22 Feb 2024, 04:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGNHOEE2RBLH7KCJUPUNYG4CDTW4HTBT/ -

20 Feb 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z6MXOX7I43OWNN7R6M54XLG6U5RXY244/ -

17 Feb 2024, 02:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4M3P7WIEPXNRLBINQRJFXUSTNKBCHYC7/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7CNDW3PF6NHO7OXNM5GN6WSSGAMA7MZE/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S635BGHHZUMRPI7QOXOJ45QHDD5FFZ3S/ -

15 Feb 2024, 14:31

Type Values Removed Values Added
First Time Libgit2 libgit2
Libgit2
CPE cpe:2.3:a:libgit2:libgit2:*:*:*:*:*:*:*:*
Summary
  • (es) libgit2 es una implementación C portátil de los métodos principales de Git proporcionada como una librería vinculable con una API sólida, que permite incorporar la funcionalidad de Git en su aplicación. El uso de entradas bien manipuladas para `git_revparse_single` puede hacer que la función entre en un bucle infinito, lo que podría provocar un ataque de denegación de servicio en la aplicación que realiza la llamada. La función revparse en `src/libgit2/revparse.c` usa un bucle para analizar la cadena de especificaciones proporcionada por el usuario. Hay un caso límite durante el análisis que permite a un mal actor forzar las condiciones del bucle para acceder a la memoria arbitraria. Potencialmente, esto también podría perder memoria si la especificación de rev extraída se refleja al atacante. Como tal, las versiones de libgit2 anteriores a 1.4.0 no se ven afectadas. Los usuarios deben actualizar a la versión 1.6.5 o 1.7.2.
References () https://github.com/libgit2/libgit2/commit/add2dabb3c16aa49b33904dcdc07cd915efc12fa - () https://github.com/libgit2/libgit2/commit/add2dabb3c16aa49b33904dcdc07cd915efc12fa - Patch
References () https://github.com/libgit2/libgit2/releases/tag/v1.6.5 - () https://github.com/libgit2/libgit2/releases/tag/v1.6.5 - Release Notes
References () https://github.com/libgit2/libgit2/releases/tag/v1.7.2 - () https://github.com/libgit2/libgit2/releases/tag/v1.7.2 - Release Notes
References () https://github.com/libgit2/libgit2/security/advisories/GHSA-54mf-x2rh-hq9v - () https://github.com/libgit2/libgit2/security/advisories/GHSA-54mf-x2rh-hq9v - Third Party Advisory

06 Feb 2024, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-06 22:16

Updated : 2024-02-22 04:15


NVD link : CVE-2024-24575

Mitre link : CVE-2024-24575

CVE.ORG link : CVE-2024-24575


JSON object : View

Products Affected

libgit2

  • libgit2
CWE
CWE-400

Uncontrolled Resource Consumption