git-1.8.3.1-22.el7

エラータID: AXSA:2020-001:03

Release date: 
Tuesday, April 21, 2020 - 13:22
Subject: 
git-1.8.3.1-22.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.

Security Fix(es):

* git: Crafted URL containing new lines can cause credential leak (CVE-2020-5260)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2020-5260
Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that contain an encoded newline can inject unintended values into the credential helper protocol stream, causing the credential helper to retrieve the password for one server (e.g., good.example.com) for an HTTP request being made to another server (e.g., evil.example.com), resulting in credentials for the former being sent to the latter. There are no restrictions on the relationship between the two, meaning that an attacker can craft a URL that will present stored credentials for any host to a host of their choosing. The vulnerability can be triggered by feeding a malicious URL to git clone. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The problem has been patched in the versions published on April 14th, 2020, going back to v2.17.x. Anyone wishing to backport the change further can do so by applying commit 9a6bbee (the full release includes extra checks for git fsck, but that commit is sufficient to protect clients against the vulnerability). The patched versions are: 2.17.4, 2.18.3, 2.19.4, 2.20.3, 2.21.2, 2.22.3, 2.23.2, 2.24.2, 2.25.3, 2.26.1.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. git-1.8.3.1-22.el7.src.rpm
    MD5: af1a38616b8d83344da07dee0ef4c05d
    SHA-256: e57e54e4bcf6473313254e30ff13d2d48554e3a9fed10046023fd0cfb1dacef2
    Size: 4.37 MB

Asianux Server 7 for x86_64
  1. git-1.8.3.1-22.el7.x86_64.rpm
    MD5: 20963019952cd2b08e8b3ed0bb0d63d9
    SHA-256: 3987203600944945d24db3c271b4afe0fb4c5cad6743866d8f59de2ce14bdaf1
    Size: 4.39 MB
  2. perl-Git-1.8.3.1-22.el7.noarch.rpm
    MD5: 2ff83129dfb28ded21cfc5cfd20b5714
    SHA-256: 3a4f166824a39be6ff1e32de7c589b50d8a8deb39f6db7fe6ba540054e2d4b40
    Size: 54.76 kB