9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.004 Low
EPSS
Percentile
74.6%
Debian Security Advisory DSA-4581-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
December 10, 2019 https://www.debian.org/security/faq
Package : git
CVE ID : CVE-2019-1348 CVE-2019-1349 CVE-2019-1352 CVE-2019-1353
CVE-2019-1387 CVE-2019-19604
Several vulnerabilities have been discovered in git, a fast, scalable,
distributed revision control system.
CVE-2019-1348
It was reported that the --export-marks option of git fast-import is
exposed also via the in-stream command feature export-marks=...,
allowing to overwrite arbitrary paths.
CVE-2019-1387
It was discovered that submodule names are not validated strictly
enough, allowing very targeted attacks via remote code execution
when performing recursive clones.
CVE-2019-19604
Joern Schneeweisz reported a vulnerability, where a recursive clone
followed by a submodule update could execute code contained within
the repository without the user explicitly having asked for that. It
is now disallowed for `.gitmodules` to have entries that set
`submodule.<name>.update=!command`.
In addition this update addresses a number of security issues which are
only an issue if git is operating on an NTFS filesystem (CVE-2019-1349,
CVE-2019-1352 and CVE-2019-1353).
For the oldstable distribution (stretch), these problems have been fixed
in version 1:2.11.0-3+deb9u5.
For the stable distribution (buster), these problems have been fixed in
version 1:2.20.1-2+deb10u1.
We recommend that you upgrade your git packages.
For the detailed security status of git please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/git
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | armhf | git | < 1:2.20.1-2+deb10u1 | git_1:2.20.1-2+deb10u1_armhf.deb |
Debian | 9 | mipsel | git | < 1:2.11.0-3+deb9u5 | git_1:2.11.0-3+deb9u5_mipsel.deb |
Debian | 8 | all | git-daemon-sysvinit | < 1:2.1.4-2.1+deb8u8 | git-daemon-sysvinit_1:2.1.4-2.1+deb8u8_all.deb |
Debian | 8 | all | git-core | < 1:2.1.4-2.1+deb8u8 | git-core_1:2.1.4-2.1+deb8u8_all.deb |
Debian | 8 | all | git-daemon-run | < 1:2.1.4-2.1+deb8u8 | git-daemon-run_1:2.1.4-2.1+deb8u8_all.deb |
Debian | 9 | all | git-daemon-sysvinit | < 1:2.11.0-3+deb9u5 | git-daemon-sysvinit_1:2.11.0-3+deb9u5_all.deb |
Debian | 8 | i386 | git | < 1:2.1.4-2.1+deb8u8 | git_1:2.1.4-2.1+deb8u8_i386.deb |
Debian | 9 | all | gitweb | < 1:2.11.0-3+deb9u5 | gitweb_1:2.11.0-3+deb9u5_all.deb |
Debian | 9 | mips64el | git-dbgsym | < 1:2.11.0-3+deb9u5 | git-dbgsym_1:2.11.0-3+deb9u5_mips64el.deb |
Debian | 9 | all | git-email | < 1:2.11.0-3+deb9u5 | git-email_1:2.11.0-3+deb9u5_all.deb |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.004 Low
EPSS
Percentile
74.6%