Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-11462

Опубликовано: 21 июл. 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-11462: git security update (IMPORTANT)

[2.47.3-1]

  • update to 2.47.3
  • Resolves: RHEL-102449, RHEL-102463, RHEL-102675, RHEL-102681

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

git

2.47.3-1.el9_6

git-all

2.47.3-1.el9_6

git-core

2.47.3-1.el9_6

git-core-doc

2.47.3-1.el9_6

git-credential-libsecret

2.47.3-1.el9_6

git-daemon

2.47.3-1.el9_6

git-email

2.47.3-1.el9_6

git-gui

2.47.3-1.el9_6

git-instaweb

2.47.3-1.el9_6

git-subtree

2.47.3-1.el9_6

git-svn

2.47.3-1.el9_6

gitk

2.47.3-1.el9_6

gitweb

2.47.3-1.el9_6

perl-Git

2.47.3-1.el9_6

perl-Git-SVN

2.47.3-1.el9_6

Oracle Linux x86_64

git

2.47.3-1.el9_6

git-all

2.47.3-1.el9_6

git-core

2.47.3-1.el9_6

git-core-doc

2.47.3-1.el9_6

git-credential-libsecret

2.47.3-1.el9_6

git-daemon

2.47.3-1.el9_6

git-email

2.47.3-1.el9_6

git-gui

2.47.3-1.el9_6

git-instaweb

2.47.3-1.el9_6

git-subtree

2.47.3-1.el9_6

git-svn

2.47.3-1.el9_6

gitk

2.47.3-1.el9_6

gitweb

2.47.3-1.el9_6

perl-Git

2.47.3-1.el9_6

perl-Git-SVN

2.47.3-1.el9_6

Связанные уязвимости

rocky
11 дней назад

Important: git security update

oracle-oval
19 дней назад

ELSA-2025-11534: git security update (IMPORTANT)

oracle-oval
19 дней назад

ELSA-2025-11533: git security update (IMPORTANT)

CVSS3: 8
fstec
около 1 месяца назад

Уязвимость распределенной системы контроля версий Git средства разработки программного обеспечения Microsoft Visual Studio, позволяющая нарушителю выполнить произвольный код

CVSS3: 8
ubuntu
около 1 месяца назад

Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.