First published: Tue Apr 14 2020(Updated: )
Felix Wilhelm discovered that Git incorrectly handled certain URLs that included newlines. A remote attacker could possibly use this issue to trick Git into returning credential information for a wrong host.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/git | <1:2.20.1-2ubuntu1.19.10.2 | 1:2.20.1-2ubuntu1.19.10.2 |
=19.10 | ||
All of | ||
ubuntu/git | <1:2.17.1-1ubuntu0.6 | 1:2.17.1-1ubuntu0.6 |
=18.04 | ||
All of | ||
ubuntu/git | <1:2.7.4-0ubuntu1.8 | 1:2.7.4-0ubuntu1.8 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Git vulnerability is USN-4329-1.
The severity of the Git vulnerability is not specified in the information provided.
The Git vulnerability allows a remote attacker to trick Git into returning credential information for a wrong host by exploiting certain URLs that include newlines.
The versions of Git affected by this vulnerability are: 1:2.20.1-2ubuntu1.19.10.2, 1:2.17.1-1ubuntu0.6, and 1:2.7.4-0ubuntu1.8.
To fix the Git vulnerability, update your Git package to version 1:2.20.1-2ubuntu1.19.10.2 (for Ubuntu 19.10), 1:2.17.1-1ubuntu0.6 (for Ubuntu 18.04), or 1:2.7.4-0ubuntu1.8 (for Ubuntu 16.04).