Lucene search

K
redhatcveRedhat.comRH:CVE-2024-24577
HistoryFeb 07, 2024 - 1:02 a.m.

CVE-2024-24577

2024-02-0701:02:03
redhat.com
access.redhat.com
13
libgit2
arbitrary code execution
heap corruption
git_index_add
vulnerability
ctime control

9.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.8%

A flaw was found in libgit2, a cross-platform, linkable library implementation of Git. A specially crafted payload to git_index_add can cause heap corruption that could be leveraged for arbitrary code execution. The attacker must be able to trigger two consecutive calls to git_index_add with a filename that starts with a / character to exploit this vulnerability. To control the heap corruption, the attacker must be able to control the ctime field of the git_index_entry data structure.

Mitigation

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.