HistoryEditJSON (OSV)

RUSTSEC-2024-0013

Memory corruption, denial of service, and arbitrary code execution in libgit2

Reported
Issued
Package
libgit2-sys (crates.io)
Type
Vulnerability
Categories
Aliases
References
CVSS Score
8.6 HIGH
CVSS Details
Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
Low
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
Patched
  • >=0.16.2
Affected Functions
Version
libgit2_sys::git_index_add
  • <0.16.2
libgit2_sys::git_revparse_single
  • <0.16.2, >=0.13.0

Description

The libgit2 project fixed three security issues in the 1.7.2 release. These issues are:

The libgit2-sys crate bundles libgit2, or optionally links to a system libgit2 library. In either case, versions of the libgit2 library less than 1.7.2 are vulnerable. The 0.16.2 release of libgit2-sys bundles the fixed version of 1.7.2, and requires a system libgit2 version of at least 1.7.2.

It is recommended that all users upgrade.

Advisory available under CC0-1.0 license.