Bug 2378808 (CVE-2025-48385) - CVE-2025-48385 git: Git arbitrary file writes
Summary: CVE-2025-48385 git: Git arbitrary file writes
Keywords:
Status: NEW
Alias: CVE-2025-48385
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2378824 2378826 2378825 2378827
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-07-08 19:01 UTC by OSIDB Bzimport
Modified: 2025-07-21 14:45 UTC (History)
13 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:11462 0 None None None 2025-07-21 14:45:31 UTC

Description OSIDB Bzimport 2025-07-08 19:01:18 UTC
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When cloning a repository Git knows to optionally fetch a bundle advertised by the remote server, which allows the server-side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection. This protocol injection can cause the client to write the fetched bundle to a location controlled by the adversary. The fetched content is fully controlled by the server, which can in the worst case lead to arbitrary code execution. The use of bundle URIs is not enabled by default and can be controlled by the bundle.heuristic config option. Some cases of the vulnerability require that the adversary is in control of where a repository will be cloned to. This either requires social engineering or a recursive clone with submodules. These cases can thus be avoided by disabling recursive clones. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.

Comment 2 errata-xmlrpc 2025-07-21 14:45:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:11462 https://access.redhat.com/errata/RHSA-2025:11462


Note You need to log in before you can comment on or make changes to this bug.