git-2.43.7-1.el8_10
エラータID: AXSA:2025-10623:09
リリース日:
2025/07/29 Tuesday - 12:06
題名:
git-2.43.7-1.el8_10
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- git には、リモートの攻撃者により、悪意のあるサイトへの
リダイレクトを可能とする脆弱性が存在します。(CVE-2024-50349)
- git には、リモートの攻撃者により、認証情報の漏洩を可能とする
脆弱性が存在します。(CVE-2024-52006)
- git には、リモートの攻撃者により、不正なファイル作成、
切り捨てを可能とする脆弱性が存在します。(CVE-2025-27613)
- git には、リモートの攻撃者により、任意のスクリプトの実行を
可能とする脆弱性が存在します。(CVE-2025-27614)
- git には、リモートの攻撃者により、任意のファイルの作成
または上書きを可能とする脆弱性が存在します。(CVE-2025-46835)
- git には、リモートの攻撃者により、任意のコードの実行を可能
とする脆弱性が存在します。(CVE-2025-48384)
- git には、URI の処理に問題があるため、リモートの攻撃者により、
プロトコルインジェクションを可能とする脆弱性が存在します。
(CVE-2025-48385)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2024-50349
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When Git asks for credentials via a terminal prompt (i.e. without using any credential helper), it prints out the host name for which the user is expected to provide a username and/or a password. At this stage, any URL-encoded parts have been decoded already, and are printed verbatim. This allows attackers to craft URLs that contain ANSI escape sequences that the terminal interpret to confuse users e.g. into providing passwords for trusted Git hosting sites when in fact they are then sent to untrusted sites that are under the attacker's control. This issue has been patch via commits `7725b81` and `c903985` which are included in release versions v2.48.1, v2.47.2, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to upgrade should avoid cloning from untrusted URLs, especially recursive clones.
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When Git asks for credentials via a terminal prompt (i.e. without using any credential helper), it prints out the host name for which the user is expected to provide a username and/or a password. At this stage, any URL-encoded parts have been decoded already, and are printed verbatim. This allows attackers to craft URLs that contain ANSI escape sequences that the terminal interpret to confuse users e.g. into providing passwords for trusted Git hosting sites when in fact they are then sent to untrusted sites that are under the attacker's control. This issue has been patch via commits `7725b81` and `c903985` which are included in release versions v2.48.1, v2.47.2, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to upgrade should avoid cloning from untrusted URLs, especially recursive clones.
CVE-2024-52006
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. Git defines a line-based protocol that is used to exchange information between Git and Git credential helpers. Some ecosystems (most notably, .NET and node.js) interpret single Carriage Return characters as newlines, which renders the protections against CVE-2020-5260 incomplete for credential helpers that treat Carriage Returns in this way. This issue has been addressed in commit `b01b9b8` which is included in release versions v2.48.1, v2.47.2, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to upgrade should avoid cloning from untrusted URLs, especially recursive clones.
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. Git defines a line-based protocol that is used to exchange information between Git and Git credential helpers. Some ecosystems (most notably, .NET and node.js) interpret single Carriage Return characters as newlines, which renders the protections against CVE-2020-5260 incomplete for credential helpers that treat Carriage Returns in this way. This issue has been addressed in commit `b01b9b8` which is included in release versions v2.48.1, v2.47.2, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to upgrade should avoid cloning from untrusted URLs, especially recursive clones.
CVE-2025-27613
Gitk is a Tcl/Tk based Git history browser. Starting with 1.7.0, when a user clones an untrusted repository and runs gitk without additional command arguments, files for which the user has write permission can be created and truncated. The option Support per-file encoding must have been enabled before in Gitk's Preferences. This option is disabled by default. The same happens when Show origin of this line is used in the main window (regardless of whether Support per-file encoding is enabled or not). This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
Gitk is a Tcl/Tk based Git history browser. Starting with 1.7.0, when a user clones an untrusted repository and runs gitk without additional command arguments, files for which the user has write permission can be created and truncated. The option Support per-file encoding must have been enabled before in Gitk's Preferences. This option is disabled by default. The same happens when Show origin of this line is used in the main window (regardless of whether Support per-file encoding is enabled or not). This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
CVE-2025-27614
Gitk is a Tcl/Tk based Git history browser. Starting with 2.41.0, a Git repository can be crafted in such a way that with some social engineering a user who has cloned the repository can be tricked into running any script (e.g., Bourne shell, Perl, Python, ...) supplied by the attacker by invoking gitk filename, where filename has a particular structure. The script is run with the privileges of the user. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.
Gitk is a Tcl/Tk based Git history browser. Starting with 2.41.0, a Git repository can be crafted in such a way that with some social engineering a user who has cloned the repository can be tricked into running any script (e.g., Bourne shell, Perl, Python, ...) supplied by the attacker by invoking gitk filename, where filename has a particular structure. The script is run with the privileges of the user. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.
CVE-2025-46835
Git GUI allows you to use the Git source control management tools via a GUI. When a user clones an untrusted repository and is tricked into editing a file located in a maliciously named directory in the repository, then Git GUI can create and overwrite files for which the user has write permission. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
Git GUI allows you to use the Git source control management tools via a GUI. When a user clones an untrusted repository and is tricked into editing a file located in a maliciously named directory in the repository, then Git GUI can create and overwrite files for which the user has write permission. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
CVE-2025-48384
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
CVE-2025-48385
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When cloning a repository Git knows to optionally fetch a bundle advertised by the remote server, which allows the server-side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection. This protocol injection can cause the client to write the fetched bundle to a location controlled by the adversary. The fetched content is fully controlled by the server, which can in the worst case lead to arbitrary code execution. The use of bundle URIs is not enabled by default and can be controlled by the bundle.heuristic config option. Some cases of the vulnerability require that the adversary is in control of where a repository will be cloned to. This either requires social engineering or a recursive clone with submodules. These cases can thus be avoided by disabling recursive clones. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When cloning a repository Git knows to optionally fetch a bundle advertised by the remote server, which allows the server-side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection. This protocol injection can cause the client to write the fetched bundle to a location controlled by the adversary. The fetched content is fully controlled by the server, which can in the worst case lead to arbitrary code execution. The use of bundle URIs is not enabled by default and can be controlled by the bundle.heuristic config option. Some cases of the vulnerability require that the adversary is in control of where a repository will be cloned to. This either requires social engineering or a recursive clone with submodules. These cases can thus be avoided by disabling recursive clones. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
追加情報:
N/A
ダウンロード:
SRPMS
- git-2.43.7-1.el8_10.src.rpm
MD5: 797bf33ea2202d0e6a1fc783e0563083
SHA-256: ce2c968442f4e9582db666ac040c4fcae236a91a13b1e4212d41f0454b29c8d7
Size: 7.15 MB
Asianux Server 8 for x86_64
- git-2.43.7-1.el8_10.x86_64.rpm
MD5: 19c78320d3bfa98b243dc1ad514a850e
SHA-256: 1ef6c72cf098ce1cb2566b82e415b1a3488cbe7638e2a1d9c49bd88f0d6c4db1
Size: 91.56 kB - git-all-2.43.7-1.el8_10.noarch.rpm
MD5: a1945825c05f5052e593bc60f5b9f624
SHA-256: 9e9cd07df52b3800e99384922fd85bc418fbfe3fdbc5b5c3205a2e9d51cf2e72
Size: 48.38 kB - git-core-2.43.7-1.el8_10.x86_64.rpm
MD5: 77a58cb8b792786f749067a9447afffc
SHA-256: bb73617917b8a8f4565a97272f96588c963c46affba410e2fa182dfd495ee830
Size: 11.09 MB - git-core-doc-2.43.7-1.el8_10.noarch.rpm
MD5: edd6b8b9dee46d11dbf4b9c1208195d7
SHA-256: ac586cb5185c335797b9b537eceb8a74bbb0f4718f608f5bf9caff1d5441daf7
Size: 3.07 MB - git-credential-libsecret-2.43.7-1.el8_10.x86_64.rpm
MD5: e3d72fb1cc9206b111b121aaa1c96a67
SHA-256: 6f570e27ac8767aa07b4bb2a76d38a413543599746fc44a5cb893bdc0a8b8e40
Size: 55.43 kB - git-daemon-2.43.7-1.el8_10.x86_64.rpm
MD5: fbc51c100d4eeee277301c2481b08c4e
SHA-256: 85076b33dbd63f887f097eb06c5e4774ce39a1692b541bd83890a750178e5e6d
Size: 1.05 MB - git-email-2.43.7-1.el8_10.noarch.rpm
MD5: e14fca585a1bb26d9a844843602f75fc
SHA-256: 2df150432f90fd52cac9e510ec3f648b2ace90574e5003d04ed334067636166a
Size: 93.52 kB - git-gui-2.43.7-1.el8_10.noarch.rpm
MD5: cc12eccd6f17b30cea76d48a3e853485
SHA-256: 82085d07eb4f2dac83467e0e897bfe662bc7b835becb10e1a575c0efd9596fb5
Size: 306.42 kB - git-instaweb-2.43.7-1.el8_10.noarch.rpm
MD5: 5e097cb412e21922aa9df75030ff265d
SHA-256: 284a80efc7a9d03ca117e94dc255a5811039154a0ece291d2713259c7bac646c
Size: 63.28 kB - gitk-2.43.7-1.el8_10.noarch.rpm
MD5: 62da4841735df0ee9cfc59d60a07ed06
SHA-256: e5959ed14641002f061012f82e3b148fafb6bdbdf276eaa4d625432f949fa430
Size: 209.61 kB - git-subtree-2.43.7-1.el8_10.x86_64.rpm
MD5: 3be384cbe5e6645b9614e7241012aea1
SHA-256: 09f4181b1d4eb77bf89cf598593631fd1a099cdf97c7f9a9eeb47b1ea7a43024
Size: 72.99 kB - git-svn-2.43.7-1.el8_10.noarch.rpm
MD5: 0c3d281640502c91eea96c56c4eaf4af
SHA-256: 944cd9bdcbd206b73507a19047b1cd680c0c5ef5ed4f65f87c8b9e3e29b7725c
Size: 110.71 kB - gitweb-2.43.7-1.el8_10.noarch.rpm
MD5: c8e5bd538a535bd25f8cd1ed04f7da10
SHA-256: 2707175862e484a49d79a9e740c1281738645dc975241a282126c6db46785b52
Size: 190.13 kB - perl-Git-2.43.7-1.el8_10.noarch.rpm
MD5: b6ef8deedf1284a75d58e762d67be40b
SHA-256: 96b72a356c111b69d4aa6f8b45e3bf1429c3f56b176d93b3d41dda7fc2bc5097
Size: 78.16 kB - perl-Git-SVN-2.43.7-1.el8_10.noarch.rpm
MD5: 908de345efbc9367030ccdadcb6ead3d
SHA-256: f1ef680d83dc3f1d4da828caa6617a2d107b3b85f74ec5c494a512beb078014d
Size: 94.88 kB