Severity
9.8CRITICAL
EPSS
17.7%
top 4.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 8
Latest updateMay 14

Description

revision.c in git before 2.7.4 uses an incorrect integer data type, which allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, leading to a heap-based buffer overflow.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages10 packages

Debiangit< 1:2.7.0-1+3
Ubuntugit< 1:1.9.1-1ubuntu0.3
NVDgit-scm/git2.7.3
NVDopensuse/leap42.1

Patches

🔴Vulnerability Details

4
GHSA
GHSA-w2rr-v7j3-2w2r: revision2022-05-14
OSV
CVE-2016-2315: revision2016-04-08
CVEList
CVE-2016-2315: revision2016-04-08
OSV
git vulnerabilities2016-03-21

📋Vendor Advisories

3
Ubuntu
Git vulnerabilities2016-03-21
Red Hat
git: path_name() integer truncation and overflow leading to buffer overflow2016-03-06
Debian
CVE-2016-2315: cgit - revision.c in git before 2.7.4 uses an incorrect integer data type, which allows...2016

💬Community

3
Bugzilla
CVE-2016-2315 CVE-2016-2324 git: remote code execution via buffer overflow [fedora-all]2016-03-16
Bugzilla
CVE-2016-2315 CVE-2016-2324 git: path_name() integer truncation and overflow leading to buffer overflow2016-03-15
Bugzilla
CVE-2016-2315 CVE-2016-2324 git: remote code execution via buffer overflow [epel-5]2016-03-15
CVE-2016-2315 (CRITICAL CVSS 9.8) | revision.c in git before 2.7.4 uses | cvebase.io