From nobody Tue Jul 08 17:19:40 2025 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4bc7C06Ldsz61G5G; Tue, 08 Jul 2025 17:19:40 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4bc7C0580sz48mC; Tue, 08 Jul 2025 17:19:40 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1751995180; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=C/34J54Jm9ByObowZBx1UW4IX3mTCKrda+i/rbzoSFo=; b=WW2TyZ8D/QX52Nk4oSFAnw6YgJciBWE2Jsz9ExWxYw8lVdpuKH4NLNv1NgHPSXXHcJq4wa fP4CWMwEfzaSKqFcyngYM7vWVgsdaKXAW0zUHX9Kg4AF3dg1Zr7rnW2r4+/uin2WWW067V iFAp76gHCSWB3A0XJWDCzQzKevjGEAe22M0wMbRqXCsj6hYbyRnT0v2ZbUaGb1nPvB0eup cUyf4JHX1ZKHcGEV8TJrEyj8wwrGSan/svfjpGrQ/l1LFXseIKu5g+0F25bccS9Wa2cION WLu1nXSRpB0rgNF/ULRiko9OGT0usm7a9PrN3jd/NgXuVMwsnygD8MeoWgClCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1751995180; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=C/34J54Jm9ByObowZBx1UW4IX3mTCKrda+i/rbzoSFo=; b=CchJkNVsWkL5+/kYkTuJbIWLkLiDdU/WpxIKwxA8PVPGRAvPj0eG2tuAxlKIBXvcRpAAr9 ijW+WQGGfbsnGsTR1Scb5PTd1pj6AqPX+qDYDoKyvmELHianMcSSjqkiyaabUJ1MnaEmJh HnptbpwbPbN5I0X98VlMQbeQCZW2pEKp+pjjZESnTli5xsvxJxzQzp8yF4YOo4te2FwuLk IuE2G26h7Mjk4y5Hvo5Pi8qQOn2SJv9nOeipH9bG5eCBo1XH59rU3ULmt2zAQxsve3ZdnV z0dYR2iMRvHlNg85/RLXvPElVD8uWoOtXT3xY0N47Hu8HfIC1cfHrd81bJ6akQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1751995180; a=rsa-sha256; cv=none; b=dIEIlhDrwCRj3OLIu4syLZ4Ud/nAib/K/Vzw7S1C94xUEaRpjuVPzLLbF0/ZiiHJAmczFU 1fblmkitnRfSnWLqkV+hS9mRgDzDhzslq9SArOJAZhb8LNRR35LdZuh4fQvu6wbEg5IMac Rc8NzD4akUZ9wL1j2mlpg5L/Upv4ZDA0SDSPO/lT3+aQMSg3zQSWhX9vOKBbvdBLtIeF3u mVKhSl1OipX9QPuzIExcI/gKS7F6Yor8XREdUFBHlJ5I5OvhZgHjQDcs+uBFx9T1x+9acI NlhMzAMNvOLmSU2a4UWB0DIxphxgK7Xz5DOAQOpRxMK9rkPwmsecRiYlzKNtiQ== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4bc7C04bfJzmJL; Tue, 08 Jul 2025 17:19:40 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.18.1/8.18.1) with ESMTP id 568HJeQ3078065; Tue, 8 Jul 2025 17:19:40 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.18.1/8.18.1/Submit) id 568HJel8078062; Tue, 8 Jul 2025 17:19:40 GMT (envelope-from git) Date: Tue, 8 Jul 2025 17:19:40 GMT Message-Id: <202507081719.568HJel8078062@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Renato Botelho Subject: git: 1bd91518d50c - main - security/vuxml: Add multiple git vulnerabilities List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-ports-main@freebsd.org Sender: owner-dev-commits-ports-main@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: garga X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 1bd91518d50c9abade64445524c272d17f9aa43c Auto-Submitted: auto-generated The branch main has been updated by garga: URL: https://cgit.FreeBSD.org/ports/commit/?id=1bd91518d50c9abade64445524c272d17f9aa43c commit 1bd91518d50c9abade64445524c272d17f9aa43c Author: Renato Botelho AuthorDate: 2025-07-08 17:09:44 +0000 Commit: Renato Botelho CommitDate: 2025-07-08 17:19:09 +0000 security/vuxml: Add multiple git vulnerabilities * CVE-2025-27613 * CVE-2025-27614 * CVE-2025-46835 * CVE-2025-48384 * CVE-2025-48385 * CVE-2025-48386 Sponsored by: Rubicon Communications, LLC ("Netgate") --- security/vuxml/vuln/2025.xml | 88 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 88 insertions(+) diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index d36ddddbedfe..e4159b1dc703 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,91 @@ + + git -- multiple vulnerabilities + + + git + git-cvs + git-gui + git-p4 + git-svn + 2.50.1 + + + + +

Git development team reports:

+
+

CVE-2025-27613: Gitk: + When a user clones an untrusted repository and runs Gitk without + additional command arguments, any writable file can be created and + truncated. The option "Support per-file encoding" must have been + enabled. The operation "Show origin of this line" is affected as + well, regardless of the option being enabled or not. +

+

CVE-2025-27614: Gitk: + A Git repository can be crafted in such a way that a user who has + cloned the repository can be tricked into running any script + supplied by the attacker by invoking `gitk filename`, where + `filename` has a particular structure. +

+

CVE-2025-46835: Git GUI: + When a user clones an untrusted repository and is tricked into + editing a file located in a maliciously named directory in the + repository, then Git GUI can create and overwrite any writable + file. +

+

CVE-2025-48384: Git: + When reading a config value, Git strips any trailing carriage + return and line feed (CRLF). When writing a config entry, values + with a trailing CR are not quoted, causing the CR to be lost when + the config is later read. When initializing a submodule, if the + submodule path contains a trailing CR, the altered path is read + resulting in the submodule being checked out to an incorrect + location. If a symlink exists that points the altered path to the + submodule hooks directory, and the submodule contains an executable + post-checkout hook, the script may be unintentionally executed + after checkout. +

+

CVE-2025-48385: Git: + When cloning a repository Git knows to optionally fetch a bundle + advertised by the remote server, which allows the server-side to + offload parts of the clone to a CDN. The Git client does not + perform sufficient validation of the advertised bundles, which + allows the remote side to perform protocol injection. + This protocol injection can cause the client to write the fetched + bundle to a location controlled by the adversary. The fetched + content is fully controlled by the server, which can in the worst + case lead to arbitrary code execution. +

+

CVE-2025-48386: Git: + The wincred credential helper uses a static buffer (`target`) as a + unique key for storing and comparing against internal storage. This + credential helper does not properly bounds check the available + space remaining in the buffer before appending to it with + `wcsncat()`, leading to potential buffer overflows. +

+
+ +
+ + CVE-2025-27613 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27613 + CVE-2025-27614 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27614 + CVE-2025-46835 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46835 + CVE-2025-48384 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48384 + CVE-2025-48385 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48385 + CVE-2025-48386 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48386 + + + 2025-04-11 + 2025-07-08 + +
+ MongoDB -- Incorrect Handling of incomplete data may prevent mongoS from Accepting New Connections