-------------------------------------------------------------------------
Debian LTS Advisory DLA-4031-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Sean Whitton
January 28, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------
Package : git
Version : 1:2.30.2-1+deb11u4
CVE ID : CVE-2024-50349 CVE-2024-52006
Debian Bug : 1093042
Multiple vulnerabilities were discovered in git, a fast, scalable and
distributed revision control system.
CVE-2024-50349
When Git asks for credentials via a terminal prompt (i.e. without
using any credential helper), it prints out the host name for which
the user is expected to provide a username and/or a password. At
this stage, any URL-encoded parts have been decoded already, and are
printed verbatim. This could allow attackers to craft URLs that
contain ANSI escape sequences that the terminal interpret to confuse
users e.g. into providing passwords for trusted Git hosting sites
when in fact they are then sent to untrusted sites that are under
the attacker's control.
CVE-2024-52006
Git defines a line-based protocol that is used to exchange
information between Git and Git credential helpers. Some ecosystems
(most notably, .NET and node.js) interpret single Carriage Return
characters as newlines, which renders the protections against
CVE-2020-5260 incomplete for credential helpers that treat Carriage
Returns in this way.
For Debian 11 bullseye, these problems have been fixed in version
1:2.30.2-1+deb11u4.
We recommend that you upgrade your git packages.
For the detailed security status of git please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/git
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature