------------------------------------------------------------------------- Debian LTS Advisory DLA-4031-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Sean Whitton January 28, 2025 https://wiki.debian.org/LTS ------------------------------------------------------------------------- Package : git Version : 1:2.30.2-1+deb11u4 CVE ID : CVE-2024-50349 CVE-2024-52006 Debian Bug : 1093042 Multiple vulnerabilities were discovered in git, a fast, scalable and distributed revision control system. CVE-2024-50349 When Git asks for credentials via a terminal prompt (i.e. without using any credential helper), it prints out the host name for which the user is expected to provide a username and/or a password. At this stage, any URL-encoded parts have been decoded already, and are printed verbatim. This could allow attackers to craft URLs that contain ANSI escape sequences that the terminal interpret to confuse users e.g. into providing passwords for trusted Git hosting sites when in fact they are then sent to untrusted sites that are under the attacker's control. CVE-2024-52006 Git defines a line-based protocol that is used to exchange information between Git and Git credential helpers. Some ecosystems (most notably, .NET and node.js) interpret single Carriage Return characters as newlines, which renders the protections against CVE-2020-5260 incomplete for credential helpers that treat Carriage Returns in this way. For Debian 11 bullseye, these problems have been fixed in version 1:2.30.2-1+deb11u4. We recommend that you upgrade your git packages. For the detailed security status of git please refer to its security tracker page at: https://security-tracker.debian.org/tracker/git Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature