CVE-2024-24790 Affecting gitsign package, versions <0.10.2-r2
Threat Intelligence
EPSS
0.06% (28th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-WOLFILATEST-GITSIGN-7251910
- published 13 Jun 2024
- disclosed 5 Jun 2024
Introduced: 5 Jun 2024
CVE-2024-24790 Open this link in a new tabHow to fix?
Upgrade Wolfi
gitsign
to version 0.10.2-r2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream gitsign
package and not the gitsign
package as distributed by Wolfi
.
See How to fix?
for Wolfi
relevant fixed versions and status.
The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms.
CVSS Scores
version 3.1