Slackware: 2023-018-01: git Security Update | LinuxSecurity.com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  git (SSA:2023-018-01)

New git packages are available for Slackware 14.0, 14.1, 14.2, 15.0,
and -current to fix security issues.


Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/git-2.35.6-i586-1_slack15.0.txz:  Upgraded.
  This release fixes two security issues:
  * CVE-2022-41903:
  git log has the ability to display commits using an arbitrary
  format with its --format specifiers. This functionality is also
  exposed to git archive via the export-subst gitattribute.
  When processing the padding operators (e.g., %<(, %<|(, %>(,
  %>>(, or %><( ), an integer overflow can occur in
  pretty.c::format_and_pad_commit() where a size_t is improperly
  stored as an int, and then added as an offset to a subsequent
  memcpy() call.
  This overflow can be triggered directly by a user running a
  command which invokes the commit formatting machinery (e.g., git
  log --format=...). It may also be triggered indirectly through
  git archive via the export-subst mechanism, which expands format
  specifiers inside of files within the repository during a git
  archive.
  This integer overflow can result in arbitrary heap writes, which
  may result in remote code execution.
  * CVE-2022-23521:
  gitattributes are a mechanism to allow defining attributes for
  paths. These attributes can be defined by adding a `.gitattributes`
  file to the repository, which contains a set of file patterns and
  the attributes that should be set for paths matching this pattern.
  When parsing gitattributes, multiple integer overflows can occur
  when there is a huge number of path patterns, a huge number of
  attributes for a single pattern, or when the declared attribute
  names are huge.
  These overflows can be triggered via a crafted `.gitattributes` file
  that may be part of the commit history. Git silently splits lines
  longer than 2KB when parsing gitattributes from a file, but not when
  parsing them from the index. Consequentially, the failure mode
  depends on whether the file exists in the working tree, the index or
  both.
  This integer overflow can result in arbitrary heap reads and writes,
  which may result in remote code execution.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-41903
    https://www.cve.org/CVERecord?id=CVE-2022-23521
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on https://slackware.com for
additional mirror sites near you.

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/git-2.30.7-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/git-2.30.7-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/git-2.30.7-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/git-2.30.7-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/git-2.30.7-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/git-2.30.7-x86_64-1_slack14.2.txz

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/git-2.35.6-i586-1_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/git-2.35.6-x86_64-1_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/git-2.39.1-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/d/git-2.39.1-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 14.0 package:
bcc7ecde446d93a6b702a50714ce8454  git-2.30.7-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
78031fa6e500d807ae791d7b89334d5f  git-2.30.7-x86_64-1_slack14.0.txz

Slackware 14.1 package:
42f23eccc37d1f08653f211a13d754b7  git-2.30.7-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
1fde1ddb395538c8ca20ae4c9e4d106a  git-2.30.7-x86_64-1_slack14.1.txz

Slackware 14.2 package:
edeebf5c549252366ff25bef9309b46e  git-2.30.7-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
e7f3419bf28d7b06a9223012b218fd71  git-2.30.7-x86_64-1_slack14.2.txz

Slackware 15.0 package:
efa0367e8418a761d88d3bf3d7b757b5  git-2.35.6-i586-1_slack15.0.txz

Slackware x86_64 15.0 package:
40f8a8697f10c572d967531290a5a336  git-2.35.6-x86_64-1_slack15.0.txz

Slackware -current package:
fac030a2fd27f0d87221f3720103feb3  d/git-2.39.1-i586-1.txz

Slackware x86_64 -current package:
8e95c6e5445cbd45644af9dcab99d7e9  d/git-2.39.1-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg git-2.35.6-i586-1_slack15.0.txz


+-----+

Slackware: 2023-018-01: git Security Update

January 18, 2023
New git packages are available for Slackware 14.0, 14.1, 14.2, 15.0, and -current to fix security issues

Summary

Here are the details from the Slackware 15.0 ChangeLog: patches/packages/git-2.35.6-i586-1_slack15.0.txz: Upgraded. This release fixes two security issues: * CVE-2022-41903: git log has the ability to display commits using an arbitrary format with its --format specifiers. This functionality is also exposed to git archive via the export-subst gitattribute. When processing the padding operators (e.g., %<(, %<|(, %>(, %>>(, or %><( ), an integer overflow can occur in pretty.c::format_and_pad_commit() where a size_t is improperly stored as an int, and then added as an offset to a subsequent memcpy() call. This overflow can be triggered directly by a user running a command which invokes the commit formatting machinery (e.g., git log --format=...). It may also be triggered indirectly through git archive via the export-subst mechanism, which expands format specifiers inside of files within the repository during a git archive. This integer overflow can result in arbitrary heap writes, which may result in remote code execution. * CVE-2022-23521: gitattributes are a mechanism to allow defining attributes for paths. These attributes can be defined by adding a `.gitattributes` file to the repository, which contains a set of file patterns and the attributes that should be set for paths matching this pattern. When parsing gitattributes, multiple integer overflows can occur when there is a huge number of path patterns, a huge number of attributes for a single pattern, or when the declared attribute names are huge. These overflows can be triggered via a crafted `.gitattributes` file that may be part of the commit history. Git silently splits lines longer than 2KB when parsing gitattributes from a file, but not when parsing them from the index. Consequentially, the failure mode depends on whether the file exists in the working tree, the index or both. This integer overflow can result in arbitrary heap reads and writes, which may result in remote code execution. For more information, see: https://www.cve.org/CVERecord?id=CVE-2022-41903 https://www.cve.org/CVERecord?id=CVE-2022-23521 (* Security fix *)

Where Find New Packages

Thanks to the friendly folks at the OSU Open Source Lab (https://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on https://slackware.com for additional mirror sites near you.
Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/git-2.30.7-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/git-2.30.7-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/git-2.30.7-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/git-2.30.7-x86_64-1_slack14.1.txz
Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/git-2.30.7-i586-1_slack14.2.txz
Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/git-2.30.7-x86_64-1_slack14.2.txz
Updated package for Slackware 15.0: ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/git-2.35.6-i586-1_slack15.0.txz
Updated package for Slackware x86_64 15.0: ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/git-2.35.6-x86_64-1_slack15.0.txz
Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/git-2.39.1-i586-1.txz
Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/d/git-2.39.1-x86_64-1.txz

MD5 Signatures

Slackware 14.0 package: bcc7ecde446d93a6b702a50714ce8454 git-2.30.7-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: 78031fa6e500d807ae791d7b89334d5f git-2.30.7-x86_64-1_slack14.0.txz
Slackware 14.1 package: 42f23eccc37d1f08653f211a13d754b7 git-2.30.7-i486-1_slack14.1.txz
Slackware x86_64 14.1 package: 1fde1ddb395538c8ca20ae4c9e4d106a git-2.30.7-x86_64-1_slack14.1.txz
Slackware 14.2 package: edeebf5c549252366ff25bef9309b46e git-2.30.7-i586-1_slack14.2.txz
Slackware x86_64 14.2 package: e7f3419bf28d7b06a9223012b218fd71 git-2.30.7-x86_64-1_slack14.2.txz
Slackware 15.0 package: efa0367e8418a761d88d3bf3d7b757b5 git-2.35.6-i586-1_slack15.0.txz
Slackware x86_64 15.0 package: 40f8a8697f10c572d967531290a5a336 git-2.35.6-x86_64-1_slack15.0.txz
Slackware -current package: fac030a2fd27f0d87221f3720103feb3 d/git-2.39.1-i586-1.txz
Slackware x86_64 -current package: 8e95c6e5445cbd45644af9dcab99d7e9 d/git-2.39.1-x86_64-1.txz

Severity
[slackware-security] git (SSA:2023-018-01)
New git packages are available for Slackware 14.0, 14.1, 14.2, 15.0, and -current to fix security issues.

Installation Instructions

Installation instructions: Upgrade the package as root: # upgradepkg git-2.35.6-i586-1_slack15.0.txz

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.