CVE-2024-25817

Publication date 6 March 2024

Last updated 17 January 2025


Ubuntu priority

Cvss 3 Severity Score

7.8 · High

Score breakdown

Buffer Overflow vulnerability in eza before version 0.18.2, allows local attackers to execute arbitrary code via the .git/HEAD, .git/refs, and .git/objects components.

Read the notes from the security team

Why is this CVE low priority?

Likely not affected due to not vendoring libgit2.

Learn more about Ubuntu priority

Status

Package Ubuntu Release Status
rust-eza 24.10 oracular
Not affected
24.04 LTS noble
Not affected
23.10 mantic Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release

Notes


sbeattie

likely due to an embedded copy of libgit2 vulnerable to CVE-2024-24577. The debian and ubuntu packages are likely not-affected due to rust-eza being patched to use the system libgit2 and not the vendored copy.

Severity score breakdown

Parameter Value
Base score 7.8 · High
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H