Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-0845

Опубликовано: 30 янв. 2025
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2025-0845: git-lfs security update (IMPORTANT)

[3.4.1-4]

  • Backport CVE-2024-53263 fixes
  • Resolves: RHEL-73931

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

git-lfs

3.4.1-4.el8_10

Oracle Linux x86_64

git-lfs

3.4.1-4.el8_10

Связанные CVE

Связанные уязвимости

ubuntu
10 месяцев назад

Git LFS is a Git extension for versioning large files. When Git LFS requests credentials from Git for a remote host, it passes portions of the host's URL to the `git-credential(1)` command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user's Git credentials. This problem exists in all previous versions and is patched in v3.6.1. All users should upgrade to v3.6.1. There are no workarounds known at this time.

CVSS3: 8.1
redhat
10 месяцев назад

Git LFS is a Git extension for versioning large files. When Git LFS requests credentials from Git for a remote host, it passes portions of the host's URL to the `git-credential(1)` command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user's Git credentials. This problem exists in all previous versions and is patched in v3.6.1. All users should upgrade to v3.6.1. There are no workarounds known at this time.

nvd
10 месяцев назад

Git LFS is a Git extension for versioning large files. When Git LFS requests credentials from Git for a remote host, it passes portions of the host's URL to the `git-credential(1)` command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user's Git credentials. This problem exists in all previous versions and is patched in v3.6.1. All users should upgrade to v3.6.1. There are no workarounds known at this time.

msrc
9 месяцев назад

Git LFS permits exfiltration of credentials via crafted HTTP URLs

debian
10 месяцев назад

Git LFS is a Git extension for versioning large files. When Git LFS re ...