git-2.47.3-1.el9_6
エラータID: AXSA:2025-10640:10
リリース日:
2025/07/29 Tuesday - 21:47
題名:
git-2.47.3-1.el9_6
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- git には、リモートの攻撃者により、悪意のあるサイトへの
リダイレクトを可能とする脆弱性が存在します。(CVE-2024-50349)
- git には、リモートの攻撃者により、認証情報の漏洩を可能とする
脆弱性が存在します。(CVE-2024-52006)
- git には、リモートの攻撃者により、不正なファイル作成、
切り捨てを可能とする脆弱性が存在します。(CVE-2025-27613)
- git には、リモートの攻撃者により、任意のスクリプトの実行を
可能とする脆弱性が存在します。(CVE-2025-27614)
- git には、リモートの攻撃者により、任意のファイルの作成
または上書きを可能とする脆弱性が存在します。(CVE-2025-46835)
- git には、リモートの攻撃者により、任意のコードの実行を
可能とする脆弱性が存在します。(CVE-2025-48384)
- git には、URI の処理に問題があるため、リモートの攻撃者により、
プロトコルインジェクションを可能とする脆弱性が存在します。
(CVE-2025-48385)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2024-50349
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When Git asks for credentials via a terminal prompt (i.e. without using any credential helper), it prints out the host name for which the user is expected to provide a username and/or a password. At this stage, any URL-encoded parts have been decoded already, and are printed verbatim. This allows attackers to craft URLs that contain ANSI escape sequences that the terminal interpret to confuse users e.g. into providing passwords for trusted Git hosting sites when in fact they are then sent to untrusted sites that are under the attacker's control. This issue has been patch via commits `7725b81` and `c903985` which are included in release versions v2.48.1, v2.47.2, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to upgrade should avoid cloning from untrusted URLs, especially recursive clones.
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When Git asks for credentials via a terminal prompt (i.e. without using any credential helper), it prints out the host name for which the user is expected to provide a username and/or a password. At this stage, any URL-encoded parts have been decoded already, and are printed verbatim. This allows attackers to craft URLs that contain ANSI escape sequences that the terminal interpret to confuse users e.g. into providing passwords for trusted Git hosting sites when in fact they are then sent to untrusted sites that are under the attacker's control. This issue has been patch via commits `7725b81` and `c903985` which are included in release versions v2.48.1, v2.47.2, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to upgrade should avoid cloning from untrusted URLs, especially recursive clones.
CVE-2024-52006
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. Git defines a line-based protocol that is used to exchange information between Git and Git credential helpers. Some ecosystems (most notably, .NET and node.js) interpret single Carriage Return characters as newlines, which renders the protections against CVE-2020-5260 incomplete for credential helpers that treat Carriage Returns in this way. This issue has been addressed in commit `b01b9b8` which is included in release versions v2.48.1, v2.47.2, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to upgrade should avoid cloning from untrusted URLs, especially recursive clones.
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. Git defines a line-based protocol that is used to exchange information between Git and Git credential helpers. Some ecosystems (most notably, .NET and node.js) interpret single Carriage Return characters as newlines, which renders the protections against CVE-2020-5260 incomplete for credential helpers that treat Carriage Returns in this way. This issue has been addressed in commit `b01b9b8` which is included in release versions v2.48.1, v2.47.2, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to upgrade should avoid cloning from untrusted URLs, especially recursive clones.
CVE-2025-27613
Gitk is a Tcl/Tk based Git history browser. Starting with 1.7.0, when a user clones an untrusted repository and runs gitk without additional command arguments, files for which the user has write permission can be created and truncated. The option Support per-file encoding must have been enabled before in Gitk's Preferences. This option is disabled by default. The same happens when Show origin of this line is used in the main window (regardless of whether Support per-file encoding is enabled or not). This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
Gitk is a Tcl/Tk based Git history browser. Starting with 1.7.0, when a user clones an untrusted repository and runs gitk without additional command arguments, files for which the user has write permission can be created and truncated. The option Support per-file encoding must have been enabled before in Gitk's Preferences. This option is disabled by default. The same happens when Show origin of this line is used in the main window (regardless of whether Support per-file encoding is enabled or not). This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
CVE-2025-27614
Gitk is a Tcl/Tk based Git history browser. Starting with 2.41.0, a Git repository can be crafted in such a way that with some social engineering a user who has cloned the repository can be tricked into running any script (e.g., Bourne shell, Perl, Python, ...) supplied by the attacker by invoking gitk filename, where filename has a particular structure. The script is run with the privileges of the user. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.
Gitk is a Tcl/Tk based Git history browser. Starting with 2.41.0, a Git repository can be crafted in such a way that with some social engineering a user who has cloned the repository can be tricked into running any script (e.g., Bourne shell, Perl, Python, ...) supplied by the attacker by invoking gitk filename, where filename has a particular structure. The script is run with the privileges of the user. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.
CVE-2025-46835
Git GUI allows you to use the Git source control management tools via a GUI. When a user clones an untrusted repository and is tricked into editing a file located in a maliciously named directory in the repository, then Git GUI can create and overwrite files for which the user has write permission. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
Git GUI allows you to use the Git source control management tools via a GUI. When a user clones an untrusted repository and is tricked into editing a file located in a maliciously named directory in the repository, then Git GUI can create and overwrite files for which the user has write permission. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
CVE-2025-48384
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
CVE-2025-48385
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When cloning a repository Git knows to optionally fetch a bundle advertised by the remote server, which allows the server-side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection. This protocol injection can cause the client to write the fetched bundle to a location controlled by the adversary. The fetched content is fully controlled by the server, which can in the worst case lead to arbitrary code execution. The use of bundle URIs is not enabled by default and can be controlled by the bundle.heuristic config option. Some cases of the vulnerability require that the adversary is in control of where a repository will be cloned to. This either requires social engineering or a recursive clone with submodules. These cases can thus be avoided by disabling recursive clones. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When cloning a repository Git knows to optionally fetch a bundle advertised by the remote server, which allows the server-side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection. This protocol injection can cause the client to write the fetched bundle to a location controlled by the adversary. The fetched content is fully controlled by the server, which can in the worst case lead to arbitrary code execution. The use of bundle URIs is not enabled by default and can be controlled by the bundle.heuristic config option. Some cases of the vulnerability require that the adversary is in control of where a repository will be cloned to. This either requires social engineering or a recursive clone with submodules. These cases can thus be avoided by disabling recursive clones. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
追加情報:
N/A
ダウンロード:
SRPMS
- git-2.47.3-1.el9_6.src.rpm
MD5: 571bdfca7808ebc4fe67aead2563d162
SHA-256: cf89a751f75f19833ad412b7b549e13c7a2c1738f6b8653cd9326ea891b63572
Size: 7.35 MB
Asianux Server 9 for x86_64
- git-2.47.3-1.el9_6.x86_64.rpm
MD5: 179bc35b98768dfdca5463d1d0187d11
SHA-256: 8eb2d0a4fde375335b85782d5c0747aa54f596985f1f974a588f855960154bb6
Size: 54.11 kB - git-all-2.47.3-1.el9_6.noarch.rpm
MD5: 4b49ca8453ba1d7474eec498f2c556be
SHA-256: 7d602453c91bbfdfcf4078cdaf0ef14e46c88e6bc5db001790f44da26dd57d45
Size: 7.23 kB - git-core-2.47.3-1.el9_6.x86_64.rpm
MD5: 085464785d8ed092897a89c53c16b179
SHA-256: 11163583d68609adcb6676aaeabb448c27b4183a82f328f8cb6a4303d895f4ab
Size: 4.68 MB - git-core-doc-2.47.3-1.el9_6.noarch.rpm
MD5: 775088e65022a9ddade249e3e4bf7037
SHA-256: 4f0c649eac35b0ca25ca93c448a0830b69720d7b8e093b819bf32c4e89f10dda
Size: 3.05 MB - git-credential-libsecret-2.47.3-1.el9_6.x86_64.rpm
MD5: 1df9097b23922efe3788d31bd0f6ad33
SHA-256: 749419c4dd277c63d81a634de3bceb08b2e7c7e013e492e99d2a0144436848d0
Size: 14.31 kB - git-daemon-2.47.3-1.el9_6.x86_64.rpm
MD5: 9a6916e3f96ba71f4200440b6aaa7a6f
SHA-256: 0574e1ee60de56fbc37cdb588d8446b85660c554dd1d07ac0cd57b0e18f0e29e
Size: 384.73 kB - git-email-2.47.3-1.el9_6.noarch.rpm
MD5: 76925203e8be19d02868008a487692a1
SHA-256: 9e47d0da982042bc0aa4e502be06241cfd5dc3c16ee4ece7c2f67e89c8ea3666
Size: 54.34 kB - git-gui-2.47.3-1.el9_6.noarch.rpm
MD5: 9b2a3d78be52bbdfe1e8a8bb07e722f5
SHA-256: 06c2807705de4934ccb2007f8c606440683522005eed4bb5018844da2dffc5d2
Size: 257.63 kB - git-instaweb-2.47.3-1.el9_6.noarch.rpm
MD5: d00a88bd9d1975479afa3f887a820106
SHA-256: a2ce87bac2484f07f1dec42194b664971e82225c36332d03f6c7c9ea30458ef6
Size: 24.61 kB - gitk-2.47.3-1.el9_6.noarch.rpm
MD5: 68218ebcb8a88a84afe0d1d143414053
SHA-256: 5d38627faaa545a5d7b4b501ff252c733b4caa930c448ccb15ffcd51fb94fa0c
Size: 162.26 kB - git-subtree-2.47.3-1.el9_6.x86_64.rpm
MD5: 03c728a6bbb222b484ab5e45cf299c67
SHA-256: 2117cd26b5520de07a9a72ccea63c61a128a242da6908043c4847c57256c01f8
Size: 33.90 kB - git-svn-2.47.3-1.el9_6.noarch.rpm
MD5: b6fbc48f3dcab3003ed5d6ba66ab06cc
SHA-256: 44853f9c7b6492a27cd29db402d07229a470c1878329ff3c384da47e095554ae
Size: 68.95 kB - gitweb-2.47.3-1.el9_6.noarch.rpm
MD5: 12d890623fc7b69972a5f3e7a7d16ae8
SHA-256: eb68be51974ff58527ad1f658c9fe615134d5cdeb52ff03e32c862eb591c3b30
Size: 147.25 kB - perl-Git-2.47.3-1.el9_6.noarch.rpm
MD5: 68b17d25d92beb37a3dca3532a250edb
SHA-256: 86893cd311afc67861a6cc2699ee1be262b0276584c1de4c546c2d89d1dbf1a0
Size: 36.77 kB - perl-Git-SVN-2.47.3-1.el9_6.noarch.rpm
MD5: 85715a397d9fd983502c388eabdea097
SHA-256: 4b9cf3f68b5ca487422da5fc0d20531db893e53ebf383308f25d8f26ba3694ae
Size: 51.40 kB