Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4581-1 | git security update |
EUVD |
EUVD-2019-9219 | Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository. |
Ubuntu USN |
USN-4220-1 | Git vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:25:11.529Z
Reserved: 2019-12-05T00:00:00
Link: CVE-2019-19604
No data.
Status : Modified
Published: 2019-12-11T00:15:13.260
Modified: 2024-11-21T04:35:02.160
Link: CVE-2019-19604
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN