-------------------------------------------------------------------------
Debian LTS Advisory DLA-4031-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                         Sean Whitton
January 28, 2025                              https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package        : git
Version        : 1:2.30.2-1+deb11u4
CVE ID         : CVE-2024-50349 CVE-2024-52006
Debian Bug     : 1093042

Multiple vulnerabilities were discovered in git, a fast, scalable and
distributed revision control system.

CVE-2024-50349

    When Git asks for credentials via a terminal prompt (i.e. without
    using any credential helper), it prints out the host name for which
    the user is expected to provide a username and/or a password.  At
    this stage, any URL-encoded parts have been decoded already, and are
    printed verbatim.  This could allow attackers to craft URLs that
    contain ANSI escape sequences that the terminal interpret to confuse
    users e.g. into providing passwords for trusted Git hosting sites
    when in fact they are then sent to untrusted sites that are under
    the attacker's control.

CVE-2024-52006

    Git defines a line-based protocol that is used to exchange
    information between Git and Git credential helpers.  Some ecosystems
    (most notably, .NET and node.js) interpret single Carriage Return
    characters as newlines, which renders the protections against
    CVE-2020-5260 incomplete for credential helpers that treat Carriage
    Returns in this way.

For Debian 11 bullseye, these problems have been fixed in version
1:2.30.2-1+deb11u4.

We recommend that you upgrade your git packages.

For the detailed security status of git please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/git

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-4031-1: git Security Advisory Updates

January 28, 2025
Multiple vulnerabilities were discovered in git, a fast, scalable and distributed revision control system

Summary

CVE-2024-50349

When Git asks for credentials via a terminal prompt (i.e. without
using any credential helper), it prints out the host name for which
the user is expected to provide a username and/or a password. At
this stage, any URL-encoded parts have been decoded already, and are
printed verbatim. This could allow attackers to craft URLs that
contain ANSI escape sequences that the terminal interpret to confuse
users e.g. into providing passwords for trusted Git hosting sites
when in fact they are then sent to untrusted sites that are under
the attacker's control.

CVE-2024-52006

Git defines a line-based protocol that is used to exchange
information between Git and Git credential helpers. Some ecosystems
(most notably, .NET and node.js) interpret single Carriage Return
characters as newlines, which renders the protections against
CVE-2020-5260 incomplete for credential helpers that treat Carriage
Returns in this way.

For Debian 11 bullse...

Read the Full Advisory


Severity
Package : git
Version : 1:2.30.2-1+deb11u4
CVE ID : CVE-2024-50349 CVE-2024-52006
Debian Bug : 1093042

Related News