openEuler 22.03 LTS SP3 update for git



| Updated: 2025-07-18
Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2025-48384
CVE-2025-48386
CWE-ID CWE-93
CWE-119
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
openEuler
Operating systems & Components / Operating system

perl-Git-SVN
Operating systems & Components / Operating system package or component

perl-Git
Operating systems & Components / Operating system package or component

gitk
Operating systems & Components / Operating system package or component

git-web
Operating systems & Components / Operating system package or component

git-svn
Operating systems & Components / Operating system package or component

git-help
Operating systems & Components / Operating system package or component

git-gui
Operating systems & Components / Operating system package or component

git-email
Operating systems & Components / Operating system package or component

git-debugsource
Operating systems & Components / Operating system package or component

git-debuginfo
Operating systems & Components / Operating system package or component

git-daemon
Operating systems & Components / Operating system package or component

git-core
Operating systems & Components / Operating system package or component

git
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) CRLF injection

EUVDB-ID: #VU112637

Risk: Medium

CVSSv4.0: 6.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2025-48384

CWE-ID: CWE-93 - Improper Neutralization of CRLF Sequences ('CRLF Injection')

Exploit availability: Yes

Description

The vulnerability allows a remote user to compromise the affected system.

The vulnerability exists due to insufficient validation of attacker-supplied data when reading config values. A remote user can pass specially crafted config lines to the application containing CR-LF characters and execute arbitrary code on the system after checkout.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

perl-Git-SVN: before 2.33.0-18

perl-Git: before 2.33.0-18

gitk: before 2.33.0-18

git-web: before 2.33.0-18

git-svn: before 2.33.0-18

git-help: before 2.33.0-18

git-gui: before 2.33.0-18

git-email: before 2.33.0-18

git-debugsource: before 2.33.0-18

git-debuginfo: before 2.33.0-18

git-daemon: before 2.33.0-18

git-core: before 2.33.0-18

git: before 2.33.0-18

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1793


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

2) Buffer overflow

EUVDB-ID: #VU112639

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-48386

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in wincred credential helper. The wincred credential helper uses a static buffer (target) as a unique key for storing and comparing against internal storage. This credential helper does not properly bounds check the available space remaining in the buffer before appending to it with wcsncat(), leading to potential buffer overflows.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

perl-Git-SVN: before 2.33.0-18

perl-Git: before 2.33.0-18

gitk: before 2.33.0-18

git-web: before 2.33.0-18

git-svn: before 2.33.0-18

git-help: before 2.33.0-18

git-gui: before 2.33.0-18

git-email: before 2.33.0-18

git-debugsource: before 2.33.0-18

git-debuginfo: before 2.33.0-18

git-daemon: before 2.33.0-18

git-core: before 2.33.0-18

git: before 2.33.0-18

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1793


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###