Improper Input Validation Affecting git package, versions <1:2.7.4-0ubuntu1.7
Threat Intelligence
EPSS
7.74% (95th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UBUNTU1604-GIT-537188
- published 10 Dec 2019
- disclosed 24 Jan 2020
Introduced: 10 Dec 2019
CVE-2019-1349 Open this link in a new tabHow to fix?
Upgrade Ubuntu:16.04 git to version 1:2.7.4-0ubuntu1.7 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream git package and not the git package as distributed by Ubuntu.
See How to fix? for Ubuntu:16.04 relevant fixed versions and status.
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1350, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2019-1349
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349
- https://security-tracker.debian.org/tracker/CVE-2019-1349
- https://security.gentoo.org/glsa/202003-30
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1349
- https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html
- https://access.redhat.com/errata/RHSA-2020:0228
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
CVSS Scores
version 3.1