CVE-2024-52005

NameCVE-2024-52005
DescriptionGit is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
git (PTS)bullseye1:2.30.2-1+deb11u2vulnerable
bullseye (security)1:2.30.2-1+deb11u4vulnerable
bookworm1:2.39.5-0+deb12u1vulnerable
bookworm (security)1:2.39.5-0+deb12u2vulnerable
sid, trixie1:2.47.2-0.1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gitsource(unstable)(unfixed)unimportant

Notes

https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329
Terminal emulators need to perform proper escaping

Search for package or bug name: Reporting problems