Vulnerability Description
Integer overflow in Git before 2.7.4 allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, which triggers a heap-based buffer overflow.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Suse | Linux Enterprise Debuginfo | 11 |
| Suse | Openstack Cloud | 5 |
| Opensuse | Leap | 42.1 |
| Opensuse | Opensuse | 13.2 |
| Suse | Linux Enterprise Server | 12.0 |
| Suse | Linux Enterprise Software Development Kit | 11 |
| Suse | Suse Linux Enterprise Server | 12 |
| Git-Scm | Git | <= 2.7.3 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183147.htmlMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179121.htmlMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180763.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00059.htmlMailing ListVendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00060.htmlMailing ListVendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00061.htmlMailing ListVendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00062.htmlMailing ListVendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00071.htmlMailing ListVendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00074.htmlMailing ListVendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00076.htmlMailing ListVendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00077.htmlMailing ListVendor Advisory
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00011.htmlMailing ListVendor Advisory
- http://pastebin.com/UX2P2jjgThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-0496.htmlThird Party Advisory
- http://www.debian.org/security/2016/dsa-3521Third Party Advisory
FAQ
What is CVE-2016-2324?
CVE-2016-2324 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Integer overflow in Git before 2.7.4 allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, which triggers a heap-based buffer overflow.
How severe is CVE-2016-2324?
CVE-2016-2324 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-2324?
Check the references section above for vendor advisories and patch information. Affected products include: Suse Linux Enterprise Debuginfo, Suse Openstack Cloud, Opensuse Leap, Opensuse Opensuse, Suse Linux Enterprise Server.