Source: git
Version: 1:2.39.5-0+deb12u1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 1:2.45.2-1
Control: found -1 1:2.47.1-1

Hi,

The following vulnerabilities were published for git.

CVE-2024-50349[0]:
| Git is a fast, scalable, distributed revision control system with an
| unusually rich command set that provides both high-level operations
| and full access to internals. When Git asks for credentials via a
| terminal prompt (i.e. without using any credential helper), it
| prints out the host name for which the user is expected to provide a
| username and/or a password. At this stage, any URL-encoded parts
| have been decoded already, and are printed verbatim. This allows
| attackers to craft URLs that contain ANSI escape sequences that the
| terminal interpret to confuse users e.g. into providing passwords
| for trusted Git hosting sites when in fact they are then sent to
| untrusted sites that are under the attacker's control. This issue
| has been patch via commits `7725b81` and `c903985` which are
| included in release versions v2.48.1, v2.47.1, v2.46.3, v2.45.3,
| v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised
| to upgrade. Users unable to upgrade should avoid cloning from
| untrusted URLs, especially recursive clones.


CVE-2024-52006[1]:
| Git is a fast, scalable, distributed revision control system with an
| unusually rich command set that provides both high-level operations
| and full access to internals. Git defines a line-based protocol that
| is used to exchange information between Git and Git credential
| helpers. Some ecosystems (most notably, .NET and node.js) interpret
| single Carriage Return characters as newlines, which renders the
| protections against CVE-2020-5260 incomplete for credential helpers
| that treat Carriage Returns in this way. This issue has been
| addressed in commit `b01b9b8` which is included in release versions
| v2.48.1, v2.47.1, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4,
| v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to
| upgrade should avoid cloning from untrusted URLs, especially
| recursive clones.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-50349
    https://www.cve.org/CVERecord?id=CVE-2024-50349
[1] https://security-tracker.debian.org/tracker/CVE-2024-52006
    https://www.cve.org/CVERecord?id=CVE-2024-52006
[2] https://www.openwall.com/lists/oss-security/2025/01/14/4

Regards,
Salvatore

Reply via email to