git-1.8.3.1-22.el7
エラータID: AXSA:2020-001:03
リリース日:
2020/04/21 Tuesday - 13:22
題名:
git-1.8.3.1-22.el7
影響のあるチャネル:
Asianux Server 7 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- Gitには、改行の処理に問題があるため、巧妙に細工された悪意あるURLを入力することで、
"credential helper" が 認証情報を攻撃者のサーバーへ漏洩してしまう脆弱性が
あります。(CVE-2020-5260)
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp/
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2020-5260
Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that contain an encoded newline can inject unintended values into the credential helper protocol stream, causing the credential helper to retrieve the password for one server (e.g., good.example.com) for an HTTP request being made to another server (e.g., evil.example.com), resulting in credentials for the former being sent to the latter. There are no restrictions on the relationship between the two, meaning that an attacker can craft a URL that will present stored credentials for any host to a host of their choosing. The vulnerability can be triggered by feeding a malicious URL to git clone. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The problem has been patched in the versions published on April 14th, 2020, going back to v2.17.x. Anyone wishing to backport the change further can do so by applying commit 9a6bbee (the full release includes extra checks for git fsck, but that commit is sufficient to protect clients against the vulnerability). The patched versions are: 2.17.4, 2.18.3, 2.19.4, 2.20.3, 2.21.2, 2.22.3, 2.23.2, 2.24.2, 2.25.3, 2.26.1.
Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that contain an encoded newline can inject unintended values into the credential helper protocol stream, causing the credential helper to retrieve the password for one server (e.g., good.example.com) for an HTTP request being made to another server (e.g., evil.example.com), resulting in credentials for the former being sent to the latter. There are no restrictions on the relationship between the two, meaning that an attacker can craft a URL that will present stored credentials for any host to a host of their choosing. The vulnerability can be triggered by feeding a malicious URL to git clone. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The problem has been patched in the versions published on April 14th, 2020, going back to v2.17.x. Anyone wishing to backport the change further can do so by applying commit 9a6bbee (the full release includes extra checks for git fsck, but that commit is sufficient to protect clients against the vulnerability). The patched versions are: 2.17.4, 2.18.3, 2.19.4, 2.20.3, 2.21.2, 2.22.3, 2.23.2, 2.24.2, 2.25.3, 2.26.1.
追加情報:
N/A
ダウンロード:
SRPMS
- git-1.8.3.1-22.el7.src.rpm
MD5: af1a38616b8d83344da07dee0ef4c05d
SHA-256: e57e54e4bcf6473313254e30ff13d2d48554e3a9fed10046023fd0cfb1dacef2
Size: 4.37 MB
Asianux Server 7 for x86_64
- git-1.8.3.1-22.el7.x86_64.rpm
MD5: 20963019952cd2b08e8b3ed0bb0d63d9
SHA-256: 3987203600944945d24db3c271b4afe0fb4c5cad6743866d8f59de2ce14bdaf1
Size: 4.39 MB - perl-Git-1.8.3.1-22.el7.noarch.rpm
MD5: 2ff83129dfb28ded21cfc5cfd20b5714
SHA-256: 3a4f166824a39be6ff1e32de7c589b50d8a8deb39f6db7fe6ba540054e2d4b40
Size: 54.76 kB