git-2.18.4-2.el8
エラータID: AXSA:2020-405:06
リリース日:
2020/09/21 Monday - 02:38
題名:
git-2.18.4-2.el8
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- git には、不正な URL を契機に外部 credential helper から使途を特定せずに
認証情報を取得し、攻撃者にそれを漏洩してしまう問題があります。これは
CVE-2020-5260 (GHSA-qm7j-c969-7j4q) と類似の問題です。(CVE-2020-11008)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2020-11008
Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. This bug is similar to CVE-2020-5260(GHSA-qm7j-c969-7j4q). The fix for that bug still left the door open for an exploit where _some_ credential is leaked (but the attacker cannot control which one). Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that are considered illegal as of the recently published Git versions can cause Git to send a "blank" pattern to helpers, missing hostname and protocol fields. Many helpers will interpret this as matching _any_ URL, and will return some unspecified stored password, leaking the password to an attacker's server. The vulnerability can be triggered by feeding a malicious URL to `git clone`. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The root of the problem is in Git itself, which should not be feeding blank input to helpers. However, the ability to exploit the vulnerability in practice depends on which helpers are in use. Credential helpers which are known to trigger the vulnerability: - Git's "store" helper - Git's "cache" helper - the "osxkeychain" helper that ships in Git's "contrib" directory Credential helpers which are known to be safe even with vulnerable versions of Git: - Git Credential Manager for Windows Any helper not in this list should be assumed to trigger the vulnerability.
Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. This bug is similar to CVE-2020-5260(GHSA-qm7j-c969-7j4q). The fix for that bug still left the door open for an exploit where _some_ credential is leaked (but the attacker cannot control which one). Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that are considered illegal as of the recently published Git versions can cause Git to send a "blank" pattern to helpers, missing hostname and protocol fields. Many helpers will interpret this as matching _any_ URL, and will return some unspecified stored password, leaking the password to an attacker's server. The vulnerability can be triggered by feeding a malicious URL to `git clone`. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The root of the problem is in Git itself, which should not be feeding blank input to helpers. However, the ability to exploit the vulnerability in practice depends on which helpers are in use. Credential helpers which are known to trigger the vulnerability: - Git's "store" helper - Git's "cache" helper - the "osxkeychain" helper that ships in Git's "contrib" directory Credential helpers which are known to be safe even with vulnerable versions of Git: - Git Credential Manager for Windows Any helper not in this list should be assumed to trigger the vulnerability.
追加情報:
N/A
ダウンロード:
SRPMS
- git-2.18.4-2.el8.src.rpm
MD5: 3664dcdec378e799770c8c8d1a68d6f4
SHA-256: 015a8d96f55a339306d5f94fc8d9464b6a1e8afb5f455c6af82842efc4be8c2d
Size: 4.96 MB
Asianux Server 8 for x86_64
- git-2.18.4-2.el8.x86_64.rpm
MD5: d075dd6a236fab1c60e3f28ca16dcc0d
SHA-256: dbc9152db8cd42746cdd247916ce51e61248a271c4dc9fd8512e714bbf0e028c
Size: 185.46 kB - git-all-2.18.4-2.el8.noarch.rpm
MD5: fd7cd02a3ff8300c6e1d948673866ddc
SHA-256: 43512e8dc0e034f6bad681b612ff60977e33a8667c0eff47f7e6de7b25a47674
Size: 46.84 kB - git-core-2.18.4-2.el8.x86_64.rpm
MD5: 3b57fa6124e23d63a8ab392a5daa1602
SHA-256: d5d8625fa706bb3eea7572d0219b29b209f4abd67cb9900c43faac1322d77fa7
Size: 4.30 MB - git-core-doc-2.18.4-2.el8.noarch.rpm
MD5: 471fb6ee9680786970692dab390856ef
SHA-256: b2e0186b22b6364de387bdaaca6afa59ca26e2dd004da83a884120903b45c185
Size: 2.27 MB - git-daemon-2.18.4-2.el8.x86_64.rpm
MD5: f49d315b21fb4b02709a73951bb73792
SHA-256: 578410fbe9b773677c02aed01aab32949bc08cd29d6014bc7a6eab43aa191c04
Size: 709.28 kB - git-email-2.18.4-2.el8.noarch.rpm
MD5: 6a2fb61c3cade8b4270d1f60dd499145
SHA-256: 36086e2089799cad9a5134ce0d765d5a042f3194fae32e71750b8c29f94321dd
Size: 86.48 kB - git-gui-2.18.4-2.el8.noarch.rpm
MD5: 6c4a09cca8915517e33fd3a9bef999c5
SHA-256: d6d4d4b54ceedbb56f32d6803fcf952909de3ce4932c8374db2005fd2c3026a0
Size: 294.97 kB - git-instaweb-2.18.4-2.el8.x86_64.rpm
MD5: 5ada887de77e702f1d09476fc8f063d0
SHA-256: 14af46909a6c9f9a8df622267511d2d8d31f6c9c088c485eb0d0e7a4888bb581
Size: 60.79 kB - git-subtree-2.18.4-2.el8.x86_64.rpm
MD5: a406a90621265ff99d970d72ae5f7256
SHA-256: d11f54e8dd63d3ff965ed2105b248988d1e509e99b4d4b71aac5341b6bb3d234
Size: 68.77 kB - git-svn-2.18.4-2.el8.x86_64.rpm
MD5: 6c022822f6bb7957f548df39bd2505a8
SHA-256: 17c4cbbc0d11b6423d4db944731e4378dd75e7be5440fdf8f50abca02e43ef9d
Size: 755.82 kB - gitk-2.18.4-2.el8.noarch.rpm
MD5: 47dd6f70be4c3eee04c76ce2e961f309
SHA-256: 5c6b3a0cc8be914688684c253754de61b502b3967134b4e97a00bd2e557550c1
Size: 199.66 kB - gitweb-2.18.4-2.el8.noarch.rpm
MD5: f21897967ee73d7b4a98023e881de439
SHA-256: 69f4667dd6a61f7ec32605299626dca85582ce0c477e0f99df404426ca5168ab
Size: 164.10 kB - perl-Git-2.18.4-2.el8.noarch.rpm
MD5: 667de998fcc1fb6a5456ce4096801be7
SHA-256: a73e47abeac8debf0f45375cbe7d8a14cb9eee97e02653b49502f0956fe8d385
Size: 76.20 kB - perl-Git-SVN-2.18.4-2.el8.noarch.rpm
MD5: 681c37a3103d733f92510240e86252ae
SHA-256: f1431221f7a3874014f938d678737f8a273f40cca2b0c9e51f6fdf313a56d2d8
Size: 93.25 kB