Bug 2338289 (CVE-2024-52005)
| Summary: | CVE-2024-52005 git: The sideband payload is passed unfiltered to the terminal in git | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | adudiak, chazlett, crizzo, dfreiber, drow, gmalinko, janstey, jburrell, jmitchel, jtanner, kshier, omaciel, pdelbell, rstepani, stcannon, vkumar, yguenane |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: |
A flaw was found in Git. When cloning, fetching, or pushing from a server, informational or error messages are transported from the remote Git process to the client via a sideband channel. These messages are prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information or to mislead the user into executing untrusted scripts.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2338314, 2338315 | ||
| Bug Blocks: | |||
|
Description
OSIDB Bzimport
2025-01-15 18:01:31 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:7409 https://access.redhat.com/errata/RHSA-2025:7409 This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:7482 https://access.redhat.com/errata/RHSA-2025:7482 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:7640 https://access.redhat.com/errata/RHSA-2025:7640 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2025:7641 https://access.redhat.com/errata/RHSA-2025:7641 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:8414 https://access.redhat.com/errata/RHSA-2025:8414 |