CVE-2024-24575

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-24575
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-24575.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-24575
Aliases
  • GHSA-54mf-x2rh-hq9v
Downstream
Related
Published
2024-02-06T21:27:57Z
Modified
2025-10-14T11:58:44.029515Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
libgit2 is vulnerable to a denial of service attack in `git_revparse_single`
Details

libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to git_revparse_single can cause the function to enter an infinite loop, potentially causing a Denial of Service attack in the calling application. The revparse function in src/libgit2/revparse.c uses a loop to parse the user-provided spec string. There is an edge-case during parsing that allows a bad actor to force the loop conditions to access arbitrary memory. Potentially, this could also leak memory if the extracted rev spec is reflected back to the attacker. As such, libgit2 versions before 1.4.0 are not affected. Users should upgrade to version 1.6.5 or 1.7.2.

References

Affected packages

Git / github.com/libgit2/libgit2

Affected ranges

Type
GIT
Repo
https://github.com/libgit2/libgit2
Events
Type
GIT
Repo
https://github.com/libgit2/libgit2
Events

Affected versions

v1.*

v1.4.0
v1.5.0
v1.6.1
v1.6.2
v1.6.3
v1.6.4
v1.7.0
v1.7.1