QID 357355

Date Published: 2024-03-26

QID 357355: Amazon Linux Security Advisory for rust : ALAS2023-2024-566

Libgit2 is a portable c implementation of the git core methods provided as a linkable library with a solid api, allowing to build git functionality into your application.
Using well-crafted inputs to `git_revparse_single` can cause the function to enter an infinite loop, potentially causing a denial of service attack in the calling application.
The revparse function in `src/libgit2/revparse.c` uses a loop to parse the user-provided spec string.
There is an edge-case during parsing that allows a bad actor to force the loop conditions to access arbitrary memory.
Potentially, this could also leak memory if the extracted rev spec is reflected back to the attacker.
As such, libgit2 versions before 1.4.0 are not affected.
Users should upgrade to version 1.6.5 or 1.7.2. (
( CVE-2024-24575) libgit2 is a portable c implementation of the git core methods provided as a linkable library with a solid api, allowing to build git functionality into your application.
Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution.
There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed.
The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption.
Depending on the application that uses libgit2, this could lead to arbitrary code execution.
This issue has been patched in version 1.6.5 and 1.7.2. (
( CVE-2024-24577)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2023-2024-566 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 357355

    Software Advisories
    Advisory ID Software Component Link
    ALAS2023-2024-566 amazon linux 2023 URL Logo alas.aws.amazon.com/AL2023/ALAS-2024-566.html