Skip to content

Duplicate Advisory: eza Potential Heap Overflow Vulnerability for AArch64

Moderate severity GitHub Reviewed Published Mar 6, 2024 to the GitHub Advisory Database • Updated Mar 6, 2024
Withdrawn This advisory was withdrawn on Mar 6, 2024

Package

cargo eza (Rust)

Affected versions

< 0.18.2

Patched versions

0.18.2

Description

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-3qx3-6hxr-j2ch. This link is maintained to preserve external references.

Original Description

Buffer Overflow vulnerability in eza before version 0.18.2, allows local attackers to execute arbitrary code via the .git/HEAD, .git/refs, and .git/objects components.

References

Published by the National Vulnerability Database Mar 6, 2024
Published to the GitHub Advisory Database Mar 6, 2024
Reviewed Mar 6, 2024
Withdrawn Mar 6, 2024
Last updated Mar 6, 2024

Severity

Moderate

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-3xc6-7h59-j2x4

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.