CVE-2019-1387

NameCVE-2019-1387
DescriptionAn issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. Recursive clones are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2059-1, DLA-3844-1, DLA-3867-1, DSA-4581-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
git (PTS)bullseye1:2.30.2-1+deb11u2vulnerable
bullseye (security)1:2.30.2-1+deb11u3fixed
bookworm, bookworm (security)1:2.39.5-0+deb12u1fixed
trixie1:2.45.2-1fixed
sid1:2.45.2-1.2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gitsourcejessie1:2.1.4-2.1+deb8u8DLA-2059-1
gitsourcestretch1:2.11.0-3+deb9u5DSA-4581-1
gitsourcebuster1:2.20.1-2+deb10u9DLA-3844-1
gitsourcebullseye1:2.30.2-1+deb11u3DLA-3867-1
gitsource(unstable)1:2.24.0-2

Notes

https://git.kernel.org/pub/scm/git/git.git/commit/?id=a8dee3ca610f5a1d403634492136c887f83b59d2
https://www.openwall.com/lists/oss-security/2019/12/13/1
follow-up fix: https://git.kernel.org/pub/scm/git/git.git/commit/?id=9cf85473209ea8ae2b56c13145c4704d12ee1374

Search for package or bug name: Reporting problems