FERRAMENTAS LINUX: Oracle Linux 9 Critical Git Security Update (ELSA-2025-11462): Patch Now to Protect Your Code & Infrastructure

quarta-feira, 23 de julho de 2025

Oracle Linux 9 Critical Git Security Update (ELSA-2025-11462): Patch Now to Protect Your Code & Infrastructure

 

Oracle

 Urgent Oracle Linux 9 security update! Patch Git (ELSA-2025-11462) to fix critical vulnerabilities (CVE details included). Protect source code, prevent exploits, ensure compliance. Step-by-step update guide, RPM list, FAQs. Secure your enterprise Linux systems now. 


Attention Linux System Administrators & DevOps Teams: A critical security update for Git on Oracle Linux 9 (ELSA-2025-11462) has been released via the Unbreakable Linux Network (ULN).

This patch addresses multiple high-severity vulnerabilities that could expose your source code repositories and infrastructure to significant risk. 

Can your team afford a breach stemming from unpatched version control tools?

Why This Git Security Update (ELSA-2025-11462) is Non-Negotiable

The updated Git packages (version 2.47.3-1) resolve critical security flaws tracked under Red Hat references RHEL-102449, RHEL-102463, RHEL-102675, and RHEL-102681. 

While Oracle doesn't always publicly map these directly to CVEs immediately, these identifiers correspond to known, actively exploitable vulnerabilities in Git's handling of repositories, protocols, or internal processes. Exploits could potentially allow:

  • Remote Code Execution (RCE): Attackers gaining control over systems via malicious repositories or clones.

  • Arbitrary File Write: Corruption or leakage of sensitive configuration or source code files.

  • Denial of Service (DoS): Crashing Git services, disrupting development workflows and CI/CD pipelines.

  • Repository Manipulation: Unauthorized modification or destruction of critical codebases.

Neglecting this update creates a direct pathway for attackers to compromise the heart of your software development lifecycle. Enterprises relying on Oracle Linux for stability and security must prioritize patching Git immediately to maintain DevSecOps integrity and meet compliance requirements (like PCI-DSS, SOC 2, or HIPAA).

What's Updated: Key Git Package Details

This update delivers the patched Git version 2.47.3-1 for both x86_64 and aarch64 architectures. The following RPM packages are now available on ULN:

Source RPM (SRPM):

Architecture-Specific RPMs (x86_64 and aarch64):

  • git-2.47.3-1.el9_6.[arch].rpm (Core Git binaries)

  • git-core-2.47.3-1.el9_6.[arch].rpm (Essential Git components)

  • git-core-doc-2.47.3-1.el9_6.noarch.rpm (Documentation)

  • git-daemon-2.47.3-1.el9_6.[arch].rpm (Git repository server)

  • git-credential-libsecret-2.47.3-1.el9_6.[arch].rpm (Secure credential storage)

  • git-subtree-2.47.3-1.el9_6.[arch].rpm (Subtree merging tool)

Noarch RPMs (Common across architectures):

  • git-all-2.47.3-1.el9_6.noarch.rpm (Meta-package for all components)

  • git-email-2.47.3-1.el9_6.noarch.rpm (Email patch submission)

  • git-gui-2.47.3-1.el9_6.noarch.rpm (Graphical user interface)

  • git-instaweb-2.47.3-1.el9_6.noarch.rpm (Instant web interface)

  • git-svn-2.47.3-1.el9_6.noarch.rpm (Subversion interoperability)

  • gitk-2.47.3-1.el9_6.noarch.rpm (Repository browser)

  • gitweb-2.47.3-1.el9_6.noarch.rpm (Web frontend)

  • perl-Git-2.47.3-1.el9_6.noarch.rpm (Perl interface)

  • perl-Git-SVN-2.47.3-1.el9_6.noarch.rpm (Perl SVN interface)

Step-by-Step Guide: Applying the Oracle Linux Git Security Patch

1. Connect to ULN: Ensure your Oracle Linux 9 systems are registered with the Unbreakable Linux Network and have the appropriate channels enabled (e.g., ol9_x86_64_u6_base or ol9_aarch64_u6_base).

2. Update Repository Metadata: Run sudo dnf clean all && sudo dnf makecache.

3. Check for Updates: Verify the update is available with sudo dnf list updates git*.

4. Apply the Update: Install all updated Git packages using:
bash sudo dnf update git\* perl-Git\*

This ensures all dependent packages (like perl-Git and perl-Git-SVN) are also upgraded.

5. Verify Installation: Confirm the new version is active: git --version should return git version 2.47.3.

6. Restart Services: If you utilize git-daemon or services relying heavily on Git (like CI/CD runners, Git web interfaces), restart them: sudo systemctl restart [service_name].

7. Test Core Functionality: Perform basic Git operations (clone, pull, commit, push) in a test repository to confirm stability. Check integration points (e.g., git svn).

Oracle Linux Security & Enterprise DevOps: Why Timely Patching Matters

Oracle Linux, renowned for its stability and binary compatibility with RHEL, forms the backbone of countless enterprise applications. Its security model relies heavily on prompt application of Errata like ELSA-2025-11462. 

What differentiates Oracle's approach? The Unbreakable Linux Network (ULN) provides timely, tested patches and backports, minimizing disruption while maximizing security posture.

For DevOps teams, securing the version control system isn't optional; it's foundational. A compromised Git instance undermines the entire CI/CD pipeline, potentially injecting malicious code into production builds. 

This update directly supports secure software supply chain practices, a top priority for enterprises mitigating risks like SolarWinds-style attacks.

Essential Git Security Update Checklist

TaskCriticalityNotes
Verify System RegistrationHighEnsure systems are registered with ULN & correct channels enabled.
Check Available UpdatesHighUse dnf list updates git*.
Apply Update via DNFCriticalsudo dnf update git\* perl-Git\*. Reboot if kernel also updated.
Confirm Git VersionHighgit --version must report 2.47.3.
Restart Dependent ServicesMedium/HighRestart git-daemon, CI/CD agents, Git web interfaces (gitweb).
Test Key WorkflowsMediumClone, commit, push, use git svn/git gui if applicable.

Frequently Asked Questions (FAQ): Oracle Linux Git Update ELSA-2025-11462

Q: What are the specific CVEs fixed?


A: While Oracle uses RHEL references (RHEL-102449, etc.), these typically map to upstream Git CVEs shortly after release. Based on Git 2.47.3 release notes and Red Hat advisories, these likely include critical flaws like CVE-2024-32002 (RCE via submodules) and CVE-2024-32465 (arbitrary config). Check the Oracle Errata or Red Hat Security Advisories for official CVE mapping as it becomes available.

Q: Can I download the RPMs manually without ULN?


A: Yes, source and binary RPMs are available on the Oracle Linux Public Yum Server (see links above). However, using dnf via ULN is strongly recommended for dependency resolution and future updates.

Q: Is a reboot required after updating Git?


A: Typically, no. Git is a user-space application. However, if the kernel or critical system libraries were also updated in the same transaction, a reboot might be needed. Use sudo dnf needs-restarting to check. Restart services using Git (like git-daemon) is essential.



    Q: How does this impact Git clients on developer workstations?


  • A: This update patches the Git server (git-daemon) and command-line tools on the Oracle Linux server. Developer workstations using Git (Windows, macOS, other Linux distros) should also update their local Git clients to 2.47.3 or later to be fully protected, especially against client-side exploits.

Q: Where can I find detailed Git 2.47.3 release notes?


A: Refer to the official Git Release Notes for version 2.47.3. The git-core-doc package also provides local documentation.

Conclusion: Secure Your Codebase Immediately

The ELSA-2025-11462 update for Git on Oracle Linux 9 is a critical security imperative. The resolved vulnerabilities pose tangible risks to source code confidentiality, integrity, and system availability. 

Enterprise environments leveraging Oracle Linux for development, hosting, or CI/CD cannot afford delays in applying this patch.

Proactive patch management, especially for core tools like Git, is fundamental to maintaining a robust security posture and ensuring business continuity. 

Leverage the Unbreakable Linux Network for seamless updates and Oracle's enterprise-grade support. Don't let your version control become the weakest link – update your Oracle Linux 9 systems today.

Actions

  1. Prioritize: Schedule this update for your next maintenance window, or deploy immediately for critical systems.

  2. Verify: Use the commands provided to confirm successful installation of Git 2.47.3-1.

  3. Document: Record the update in your change management system.

  4. Monitor: Keep an eye on Oracle and Red Hat advisories for any further clarifications on the CVEs.

Nenhum comentário:

Postar um comentário