Lucene search

K
slackwareSlackware Linux ProjectSSA-2023-018-01
HistoryJan 18, 2023 - 6:22 a.m.

[slackware-security] git

2023-01-1806:22:27
Slackware Linux Project
www.slackware.com
18

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.013 Low

EPSS

Percentile

85.5%

New git packages are available for Slackware 14.0, 14.1, 14.2, 15.0,
and -current to fix security issues.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/git-2.35.6-i586-1_slack15.0.txz: Upgraded.
This release fixes two security issues:

  • CVE-2022-41903:
    git log has the ability to display commits using an arbitrary
    format with its --format specifiers. This functionality is also
    exposed to git archive via the export-subst gitattribute.
    When processing the padding operators (e.g., %<(, %<|(, %>(,
    %>>(, or %><( ), an integer overflow can occur in
    pretty.c::format_and_pad_commit() where a size_t is improperly
    stored as an int, and then added as an offset to a subsequent
    memcpy() call.
    This overflow can be triggered directly by a user running a
    command which invokes the commit formatting machinery (e.g., git
    log --format=…). It may also be triggered indirectly through
    git archive via the export-subst mechanism, which expands format
    specifiers inside of files within the repository during a git
    archive.
    This integer overflow can result in arbitrary heap writes, which
    may result in remote code execution.
  • CVE-2022-23521:
    gitattributes are a mechanism to allow defining attributes for
    paths. These attributes can be defined by adding a .gitattributes
    file to the repository, which contains a set of file patterns and
    the attributes that should be set for paths matching this pattern.
    When parsing gitattributes, multiple integer overflows can occur
    when there is a huge number of path patterns, a huge number of
    attributes for a single pattern, or when the declared attribute
    names are huge.
    These overflows can be triggered via a crafted .gitattributes file
    that may be part of the commit history. Git silently splits lines
    longer than 2KB when parsing gitattributes from a file, but not when
    parsing them from the index. Consequentially, the failure mode
    depends on whether the file exists in the working tree, the index or
    both.
    This integer overflow can result in arbitrary heap reads and writes,
    which may result in remote code execution.
    For more information, see:
    https://vulners.com/cve/CVE-2022-41903
    https://vulners.com/cve/CVE-2022-23521
    (* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/git-2.30.7-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/git-2.30.7-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/git-2.30.7-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/git-2.30.7-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/git-2.30.7-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/git-2.30.7-x86_64-1_slack14.2.txz

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/git-2.35.6-i586-1_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/git-2.35.6-x86_64-1_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/git-2.39.1-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/d/git-2.39.1-x86_64-1.txz

MD5 signatures:

Slackware 14.0 package:
bcc7ecde446d93a6b702a50714ce8454 git-2.30.7-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
78031fa6e500d807ae791d7b89334d5f git-2.30.7-x86_64-1_slack14.0.txz

Slackware 14.1 package:
42f23eccc37d1f08653f211a13d754b7 git-2.30.7-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
1fde1ddb395538c8ca20ae4c9e4d106a git-2.30.7-x86_64-1_slack14.1.txz

Slackware 14.2 package:
edeebf5c549252366ff25bef9309b46e git-2.30.7-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
e7f3419bf28d7b06a9223012b218fd71 git-2.30.7-x86_64-1_slack14.2.txz

Slackware 15.0 package:
efa0367e8418a761d88d3bf3d7b757b5 git-2.35.6-i586-1_slack15.0.txz

Slackware x86_64 15.0 package:
40f8a8697f10c572d967531290a5a336 git-2.35.6-x86_64-1_slack15.0.txz

Slackware -current package:
fac030a2fd27f0d87221f3720103feb3 d/git-2.39.1-i586-1.txz

Slackware x86_64 -current package:
8e95c6e5445cbd45644af9dcab99d7e9 d/git-2.39.1-x86_64-1.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg git-2.35.6-i586-1_slack15.0.txz

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.013 Low

EPSS

Percentile

85.5%