VYPR

Bitnami package

git

pkg:bitnami/git

Vulnerabilities (13)

  • CVE-2025-48386MedJul 8, 2025
    affected < 2.50.1fixed 2.50.1

    Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. The wincred credential helper uses a static buffer (target) as a unique key for storing and comparing against int

  • CVE-2025-48385HigJul 8, 2025
    affected < 2.50.1fixed 2.50.1

    Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When cloning a repository Git knows to optionally fetch a bundle advertised by the remote server, which allows th

  • CVE-2025-48384KEVJul 8, 2025
    affected < 2.50.1fixed 2.50.1

    Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config

  • CVE-2024-52005Jan 15, 2025
    affected < 2.40.5fixed 2.40.5

    Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed with "remote:" and printed d

  • CVE-2024-50349Jan 14, 2025
    affected < 2.40.4fixed 2.40.4

    Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When Git asks for credentials via a terminal prompt (i.e. without using any credential helper), it prints out the

  • CVE-2024-52006Jan 14, 2025
    affected < 2.40.4fixed 2.40.4

    Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. Git defines a line-based protocol that is used to exchange information between Git and Git credential helpers. So

  • CVE-2024-32465May 14, 2024
    affected < 2.39.4fixed 2.39.4

    Git is a revision control system. The Git project recommends to avoid working in untrusted repositories, and instead to clone it first with `git clone --no-local` to obtain a clean copy. Git has specific protections to make that a safe operation even with an untrusted source repo

  • CVE-2024-32021May 14, 2024
    affected < 2.39.4fixed 2.39.4

    Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, when cloning a local source repository that contains symlinks via the filesystem, Git may create hardlinks to arbitrary user-readable files on the same filesystem as th

  • CVE-2024-32020May 14, 2024
    affected < 2.39.4fixed 2.39.4

    Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, local clones may end up hardlinking files into the target repository's object database when source and target repository reside on the same disk. If the source reposito

  • CVE-2024-32004May 14, 2024
    affected < 2.39.4fixed 2.39.4

    Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, an attacker can prepare a local repository in such a way that, when cloned, will execute arbitrary code during the operation. The problem has been patched in versions 2

  • CVE-2024-32002May 14, 2024
    affected < 2.39.4fixed 2.39.4

    Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a

  • CVE-2022-25648Apr 19, 2022
    affected < 1.11.0fixed 1.11.0

    The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags

  • CVE-2020-5260Apr 14, 2020
    affected < 2.17.4fixed 2.17.4

    Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the o