vulnerability
Amazon Linux 2023: CVE-2024-24575: Important priority package update for libgit2 (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Feb 6, 2024 | Feb 17, 2025 | Jul 9, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Feb 6, 2024
Added
Feb 17, 2025
Modified
Jul 9, 2025
Description
libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_revparse_single` can cause the function to enter an infinite loop, potentially causing a Denial of Service attack in the calling application. The revparse function in `src/libgit2/revparse.c` uses a loop to parse the user-provided spec string. There is an edge-case during parsing that allows a bad actor to force the loop conditions to access arbitrary memory. Potentially, this could also leak memory if the extracted rev spec is reflected back to the attacker. As such, libgit2 versions before 1.4.0 are not affected. Users should upgrade to version 1.6.5 or 1.7.2.
A flaw was found in libgit2, a cross-platform, linkable library implementation of Git. This flaw allows an attacker using a specially-crafted payload to `git_revparse_single` and cause the function to enter an infinite loop. This issue potentially causes a denial of service attack in the calling application.
A flaw was found in libgit2, a cross-platform, linkable library implementation of Git. This flaw allows an attacker using a specially-crafted payload to `git_revparse_single` and cause the function to enter an infinite loop. This issue potentially causes a denial of service attack in the calling application.
Solutions
amazon-linux-2023-upgrade-cargoamazon-linux-2023-upgrade-cargo-debuginfoamazon-linux-2023-upgrade-clippyamazon-linux-2023-upgrade-clippy-debuginfoamazon-linux-2023-upgrade-libgit2amazon-linux-2023-upgrade-libgit2-debuginfoamazon-linux-2023-upgrade-libgit2-debugsourceamazon-linux-2023-upgrade-libgit2-develamazon-linux-2023-upgrade-rustamazon-linux-2023-upgrade-rust-analysisamazon-linux-2023-upgrade-rust-analyzeramazon-linux-2023-upgrade-rust-analyzer-debuginfoamazon-linux-2023-upgrade-rust-debugger-commonamazon-linux-2023-upgrade-rust-debuginfoamazon-linux-2023-upgrade-rust-debugsourceamazon-linux-2023-upgrade-rust-docamazon-linux-2023-upgrade-rustfmtamazon-linux-2023-upgrade-rustfmt-debuginfoamazon-linux-2023-upgrade-rust-gdbamazon-linux-2023-upgrade-rust-lldbamazon-linux-2023-upgrade-rust-srcamazon-linux-2023-upgrade-rust-std-staticamazon-linux-2023-upgrade-rust-std-static-wasm32-unknown-unknownamazon-linux-2023-upgrade-rust-std-static-wasm32-wasi
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.