Количество 15
Количество 15
CVE-2025-48384
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
CVE-2025-48384
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
CVE-2025-48384
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
CVE-2025-48384
GitHub: CVE-2025-48384 Git Symlink Vulnerability
CVE-2025-48384
Git is a fast, scalable, distributed revision control system with an u ...
ELSA-2025-11688
ELSA-2025-11688: git security update (IMPORTANT)
BDU:2025-08691
Уязвимость распределенной системы контроля версий Git средства разработки программного обеспечения Microsoft Visual Studio, позволяющая нарушителю выполнить произвольный код
SUSE-SU-2025:03022-1
Security update for git
SUSE-SU-2025:03037-1
Security update for git
SUSE-SU-2025:03012-1
security update for git, git-lfs, obs-scm-bridge, python-PyYAML
RLSA-2025:11534
Important: git security update
ELSA-2025-11534
ELSA-2025-11534: git security update (IMPORTANT)
ELSA-2025-11533
ELSA-2025-11533: git security update (IMPORTANT)
ELSA-2025-11462
ELSA-2025-11462: git security update (IMPORTANT)
ROS-20250807-04
Множественные уязвимости git
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-48384 Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1. | CVSS3: 8 | 7% Низкий | 4 месяца назад | |
CVE-2025-48384 Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1. | CVSS3: 8 | 7% Низкий | 4 месяца назад | |
CVE-2025-48384 Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1. | CVSS3: 8 | 7% Низкий | 4 месяца назад | |
CVE-2025-48384 GitHub: CVE-2025-48384 Git Symlink Vulnerability | 7% Низкий | 4 месяца назад | ||
CVE-2025-48384 Git is a fast, scalable, distributed revision control system with an u ... | CVSS3: 8 | 7% Низкий | 4 месяца назад | |
ELSA-2025-11688 ELSA-2025-11688: git security update (IMPORTANT) | 3 месяца назад | |||
BDU:2025-08691 Уязвимость распределенной системы контроля версий Git средства разработки программного обеспечения Microsoft Visual Studio, позволяющая нарушителю выполнить произвольный код | CVSS3: 8 | 7% Низкий | 4 месяца назад | |
SUSE-SU-2025:03022-1 Security update for git | 2 месяца назад | |||
SUSE-SU-2025:03037-1 Security update for git | 2 месяца назад | |||
SUSE-SU-2025:03012-1 security update for git, git-lfs, obs-scm-bridge, python-PyYAML | 2 месяца назад | |||
RLSA-2025:11534 Important: git security update | 3 месяца назад | |||
ELSA-2025-11534 ELSA-2025-11534: git security update (IMPORTANT) | 4 месяца назад | |||
ELSA-2025-11533 ELSA-2025-11533: git security update (IMPORTANT) | 4 месяца назад | |||
ELSA-2025-11462 ELSA-2025-11462: git security update (IMPORTANT) | 4 месяца назад | |||
ROS-20250807-04 Множественные уязвимости git | CVSS3: 8.6 | 3 месяца назад |
Уязвимостей на страницу