![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.10.2023.0066 |
Categoría: | Mageia Linux Local Security Checks |
Título: | Mageia: Security Advisory (MGASA-2023-0066) |
Resumen: | The remote host is missing an update for the 'git' package(s) announced via the MGASA-2023-0066 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'git' package(s) announced via the MGASA-2023-0066 advisory. Vulnerability Insight: Using a specially-crafted repository, Git can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source $GIT_DIR/objects directory contains symbolic links, the objects directory itself may still be a symbolic link. These two may be combined to include arbitrary files based on known paths on the victim's filesystem within the malicious repository's working copy, allowing for data exfiltration in a similar manner as CVE-2022-39253 (CVE-2023-22490). By feeding a crafted input to 'git apply', a path outside the working tree can be overwritten as the user who is running 'git apply' (CVE-2023-23946). Affected Software/OS: 'git' package(s) on Mageia 8. Solution: Please install the updated package(s). CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:C/A:N |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2023-22490 https://security.gentoo.org/glsa/202312-15 https://github.com/git/git/commit/c867e4fa180bec4750e9b54eb10f459030dbebfd https://github.com/git/git/security/advisories/GHSA-3wp6-j8xr-qw85 https://github.com/git/git/security/advisories/GHSA-gw92-x3fm-3g3q Common Vulnerability Exposure (CVE) ID: CVE-2023-23946 https://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh |
Copyright | Copyright (C) 2023 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |