libgit2 is vulnerable to Heap Buffer Overflow. The vulnerability is due to improper handling of string paths in the has_dir_name
function within index.c
. This logic in path processing may cause the application to crash, resulting in Denial of Service (DoS) .
github.com/libgit2/libgit2/commit/487af0cf6687dc48b0a960fa2f39894e2d84d77b
github.com/libgit2/libgit2/commit/eb4c1716cd92bf56f2770653a915d5fc01eab8f3
github.com/libgit2/libgit2/releases/tag/v1.6.5
github.com/libgit2/libgit2/releases/tag/v1.7.2
github.com/libgit2/libgit2/security/advisories/GHSA-j2v7-4f6v-gpg8
lists.debian.org/debian-lts-announce/2024/02/msg00012.html
lists.fedoraproject.org/archives/list/[email protected]/message/4M3P7WIEPXNRLBINQRJFXUSTNKBCHYC7/
lists.fedoraproject.org/archives/list/[email protected]/message/7CNDW3PF6NHO7OXNM5GN6WSSGAMA7MZE/
lists.fedoraproject.org/archives/list/[email protected]/message/S635BGHHZUMRPI7QOXOJ45QHDD5FFZ3S/
lists.fedoraproject.org/archives/list/[email protected]/message/Z6MXOX7I43OWNN7R6M54XLG6U5RXY244/
lists.fedoraproject.org/archives/list/[email protected]/message/ZGNHOEE2RBLH7KCJUPUNYG4CDTW4HTBT/