UBUNTU-CVE-2024-25817

Source
https://ubuntu.com/security/CVE-2024-25817
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-25817.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-25817
Related
Published
2024-03-06T00:15:00Z
Modified
2024-10-15T14:12:55Z
Summary
[none]
Details

Buffer Overflow vulnerability in eza before version 0.18.2, allows local attackers to execute arbitrary code via the .git/HEAD, .git/refs, and .git/objects components.

References

Affected packages

Ubuntu:24.10 / rust-eza

Package

Name
rust-eza
Purl
pkg:deb/ubuntu/rust-eza?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.18.2-1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "low",
    "binaries": [
        {
            "binary_version": "0.18.2-1",
            "binary_name": "eza"
        },
        {
            "binary_version": "0.18.2-1",
            "binary_name": "librust-eza-dev"
        }
    ],
    "priority_reason": "Likely not affected due to not vendoring libgit2."
}

Ubuntu:24.04:LTS / rust-eza

Package

Name
rust-eza
Purl
pkg:deb/ubuntu/rust-eza?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.15.3-1
0.16.2-1build1
0.17.0-1
0.17.1-1
0.17.2-1
0.18.2-1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Likely not affected due to not vendoring libgit2."
}