Git 输入验证错误漏洞

admin 2024-01-14 19:37:36 YS 来源:ZONE.CI 全球网 0 阅读模式
> Git 输入验证错误漏洞

Git 输入验证错误漏洞

CNNVD-ID编号 CNNVD-202004-803 CVE编号 CVE-2020-5260
发布时间 2020-04-14 更新时间 2020-05-25
漏洞类型 输入验证错误 漏洞来源 N/A
危险等级 高危 威胁类型 远程
厂商 N/A

漏洞介绍

Git是一套免费、开源的分布式版本控制系统。

Git中存在输入验证错误漏洞。攻击者可借助特制URL利用该漏洞获取私人证书。以下产品及版本受到影响:Git 2.17.3及之前版本、2.18.2及之前版本、2.19.3及之前版本、2.20.2及之前版本、2.21.1及之前版本、2.22.2及之前版本、2.23.1及之前版本、2.24.1及之前版本、2.25.2及之前版本、2.26.0及之前版本。

漏洞补丁

目前厂商已发布升级了Git 输入验证错误漏洞的补丁,Git 输入验证错误漏洞的补丁获取链接:

参考网址

来源:GENTOO

链接:https://security.gentoo.org/glsa/202004-13

来源:UBUNTU

链接:https://usn.ubuntu.com/4329-1/

来源:MISC

链接:https://github.com/git/git/commit/9a6bbee8006c24b46a85d29e7b38cfa79e9ab21b

来源:MLIST

链接:http://www.openwall.com/lists/oss-security/2020/04/20/1

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/7TVS5UG6JD3MYIGSBKMIOS6AF7CR5IPI/

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/PN3FUOXKX3AXTULYV53ACABER2W2FSOU/

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html

来源:MLIST

链接:http://www.openwall.com/lists/oss-security/2020/04/15/5

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00027.html

来源:MLIST

链接:http://www.openwall.com/lists/oss-security/2020/04/15/6

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2020/04/msg00010.html

来源:CONFIRM

链接:https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q

来源:MISC

链接:https://packetstormsecurity.com/files/157250/Git-Credential-Helper-Protocol-Newline-Injection.html

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/MOCTR2SEHCPSCOVUQJAGFPGKFMI2VE6V/

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/XPCEOIFLLEF24L6GLVJVFZX4CREDEHDF/

来源:MISC

链接:https://lore.kernel.org/git/[email protected]/

来源:CONFIRM

链接:https://support.apple.com/kb/HT211141

来源:DEBIAN

链接:https://www.debian.org/security/2020/dsa-4657

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/74Q7WVJ6FKLIN62VS2JD2XCNWK5TNKOW/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1312/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1336/

来源:access.redhat.com

链接:https://access.redhat.com/security/cve/cve-2020-5260

来源:www.nsfocus.net

链接:http://www.nsfocus.net/vulndb/46448

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/157231/Ubuntu-Security-Notice-USN-4329-1.html

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2020-5260

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/157250/Git-Credential-Helper-Protocol-Newline-Injection.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/157333/Red-Hat-Security-Advisory-2020-1513-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1807/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/157373/Gentoo-Linux-Security-Advisory-202004-13.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1393/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1461/

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202004-803

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0