Bug 2338289 (CVE-2024-52005)
Summary: | CVE-2024-52005 git: The sideband payload is passed unfiltered to the terminal in git | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | adudiak, chazlett, crizzo, dfreiber, drow, gmalinko, janstey, jburrell, jmitchel, jtanner, kshier, omaciel, pdelbell, rstepani, stcannon, vkumar, yguenane |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in Git. When cloning, fetching, or pushing from a server, informational or error messages are transported from the remote Git process to the client via a sideband channel. These messages are prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information or to mislead the user into executing untrusted scripts.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2338315, 2338314 | ||
Bug Blocks: |
Description
OSIDB Bzimport
2025-01-15 18:01:31 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:7409 https://access.redhat.com/errata/RHSA-2025:7409 This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:7482 https://access.redhat.com/errata/RHSA-2025:7482 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:7640 https://access.redhat.com/errata/RHSA-2025:7640 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2025:7641 https://access.redhat.com/errata/RHSA-2025:7641 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:8414 https://access.redhat.com/errata/RHSA-2025:8414 |