
Cloud Vulnerability DB
A community-led vulnerabilities database
RUSTSEC-2024-0013 is a security vulnerability affecting the libgit2 library used in Rust applications. The vulnerability was discovered in early 2024 and affects versions prior to libgit2 v1.7.2. This vulnerability encompasses multiple security issues including potential memory corruption, denial of service, and arbitrary code execution risks (Git2-rs PR).
The vulnerability consists of two distinct CVEs: CVE-2024-24575 (GHSA-54mf-x2rh-hq9v) and CVE-2024-24577 (GHSA-j2v7-4f6v-gpg8). These issues were addressed in libgit2 version 1.7.2, which was incorporated into the Rust git2-rs library through a submodule update (Git2-rs PR).
The vulnerability could potentially lead to memory corruption, denial of service conditions, and in worst-case scenarios, arbitrary code execution in applications using affected versions of libgit2 (Git2-rs PR).
The recommended mitigation is to update to libgit2 version 1.7.2 or later. This update has been implemented in the Rust git2-rs library through a submodule update (Git2-rs PR).
The vulnerability has prompted immediate response from various Rust-based projects, with multiple repositories creating pull requests to address the security concern. Notable projects affected include docs.rs, gitui, and various Stackable operators, demonstrating the widespread impact across the Rust ecosystem (Git2-rs PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."