PT-2025-28647 · Git +10 · Git +10

Dgl

·

Published

2025-07-08

·

Updated

2025-08-26

·

CVE-2025-48384

CVSS v3.1
8.0
VectorAV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:**

Git versions 2.43.7 through 2.50.1

**Description:**

Git is a distributed revision control system susceptible to a flaw in handling carriage return characters (`r`). Specifically, when writing configuration entries, trailing carriage returns are not properly quoted, leading to their loss when the configuration is read. When initializing a submodule, if the submodule path contains a trailing carriage return, the altered path is read, potentially causing the submodule to be checked out to an incorrect location. If a symlink exists pointing to the submodule hooks directory, and that directory contains an executable post-checkout hook, the script may be unintentionally executed. This can lead to remote code execution (RCE) when cloning malicious repositories with the `--recursive` flag on Unix-like systems.

**Recommendations:**

Git versions prior to 2.50.1 should be updated to version 2.50.1 or later to address this issue.

Fix

RCE

Link Following

Weakness Enumeration

Related Identifiers

ALSA-2025:11462
ALSA-2025:11533
ALSA-2025:11534
ALT-PU-2025-9640
BDU:2025-08691
BIT-GIT-2025-48384
CESA-2025_11534
CVE-2025-48384
GHSA-VWQX-4FM8-6QC9
OPENSUSE-SU-2025:15337-1
RHSA-2025:11686
RHSA-2025:11688
RHSA-2025:11793
RHSA-2025:11794
RHSA-2025:11795
RHSA-2025:11796
RHSA-2025:11800
RHSA-2025:11801
RHSA-2025_11462
RHSA-2025_11534
USN-7626-1
USN-7626-2
USN-7626-3

Affected Products

Alt Linux
Almalinux
Astra Linux
Centos
Debian
Git
Linuxmint
Red Hat
Red Os
Rocky Linux
Ubuntu