CVE-2025-48386

Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. The wincred credential helper uses a static buffer (target) as a unique key for storing and comparing against internal storage. This credential helper does not properly bounds check the available space remaining in the buffer before appending to it with wcsncat(), leading to potential buffer overflows. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.

  • logo

    System detected CVE-2025-48386 with a risk of 3.85

  • logo

    System created a ticket for CVE-2025-48386

    Everything after this entry will be synced with the external system. The ticket can be found at https://github.com/l3montree-dev/devguard-action/issues/168

  • logo

    System detected CVE-2025-48386 with scanner: container-scanning:test

  • S

    Sebastian Kawelke updated the risk assessment from 3.85 to 1.9

    Confidentiality Requirement updated: high -> low, Availability Requirement updated: low -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1.9 to 3.85

    Confidentiality Requirement updated: low -> high

  • logo

    System removed scanner: container-scanning

  • logo

    System fixed CVE-2025-48386

Reopen this vulnerability

You can reopen this vuln, if you plan to mitigate the risk now, or accepted this vuln by accident.

Comment will be synced with https://github.com/l3montree-dev/devguard-action/issues/168
Last calculated at:

Affected component

Logo von deb debian/git

Installed version:
2.39.5-0
Fixed in:
no patch available

Management decisions across the organization

Copyright © 2025 L3montree GmbH and the DevGuard Contributors. All rights reserved. Version 71cda54d19c6900d5d185b8bc7c11608a8a65bac