Slackware: 2023-018-01: git Security Update
Summary
Here are the details from the Slackware 15.0 ChangeLog: patches/packages/git-2.35.6-i586-1_slack15.0.txz: Upgraded. This release fixes two security issues: * CVE-2022-41903: git log has the ability to display commits using an arbitrary format with its --format specifiers. This functionality is also exposed to git archive via the export-subst gitattribute. When processing the padding operators (e.g., %<(, %<|(, %>(, %>>(, or %><( ), an integer overflow can occur in pretty.c::format_and_pad_commit() where a size_t is improperly stored as an int, and then added as an offset to a subsequent memcpy() call. This overflow can be triggered directly by a user running a command which invokes the commit formatting machinery (e.g., git log --format=...). It may also be triggered indirectly through git archive via the export-subst mechanism, which expands format specifiers inside of files within the repository during a git archive. This integer overflow can result in arbitrary heap writes, which may result in remote code execution. * CVE-2022-23521: gitattributes are a mechanism to allow defining attributes for paths. These attributes can be defined by adding a `.gitattributes` file to the repository, which contains a set of file patterns and the attributes that should be set for paths matching this pattern. When parsing gitattributes, multiple integer overflows can occur when there is a huge number of path patterns, a huge number of attributes for a single pattern, or when the declared attribute names are huge. These overflows can be triggered via a crafted `.gitattributes` file that may be part of the commit history. Git silently splits lines longer than 2KB when parsing gitattributes from a file, but not when parsing them from the index. Consequentially, the failure mode depends on whether the file exists in the working tree, the index or both. This integer overflow can result in arbitrary heap reads and writes, which may result in remote code execution. For more information, see: https://www.cve.org/CVERecord?id=CVE-2022-41903 https://www.cve.org/CVERecord?id=CVE-2022-23521 (* Security fix *)
Where Find New Packages
Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org/) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://www.slackware.com/ for
additional mirror sites near you.
Updated package for Slackware 14.0:
Updated package for Slackware x86_64 14.0:
Updated package for Slackware 14.1:
Updated package for Slackware x86_64 14.1:
Updated package for Slackware 14.2:
Updated package for Slackware x86_64 14.2:
Updated package for Slackware 15.0:
Updated package for Slackware x86_64 15.0:
Updated package for Slackware -current:
Updated package for Slackware x86_64 -current:
MD5 Signatures
Slackware 14.0 package:
bcc7ecde446d93a6b702a50714ce8454 git-2.30.7-i486-1_slack14.0.txz
Slackware x86_64 14.0 package:
78031fa6e500d807ae791d7b89334d5f git-2.30.7-x86_64-1_slack14.0.txz
Slackware 14.1 package:
42f23eccc37d1f08653f211a13d754b7 git-2.30.7-i486-1_slack14.1.txz
Slackware x86_64 14.1 package:
1fde1ddb395538c8ca20ae4c9e4d106a git-2.30.7-x86_64-1_slack14.1.txz
Slackware 14.2 package:
edeebf5c549252366ff25bef9309b46e git-2.30.7-i586-1_slack14.2.txz
Slackware x86_64 14.2 package:
e7f3419bf28d7b06a9223012b218fd71 git-2.30.7-x86_64-1_slack14.2.txz
Slackware 15.0 package:
efa0367e8418a761d88d3bf3d7b757b5 git-2.35.6-i586-1_slack15.0.txz
Slackware x86_64 15.0 package:
40f8a8697f10c572d967531290a5a336 git-2.35.6-x86_64-1_slack15.0.txz
Slackware -current package:
fac030a2fd27f0d87221f3720103feb3 d/git-2.39.1-i586-1.txz
Slackware x86_64 -current package:
8e95c6e5445cbd45644af9dcab99d7e9 d/git-2.39.1-x86_64-1.txz
Installation Instructions
Installation instructions: Upgrade the package as root: # upgradepkg git-2.35.6-i586-1_slack15.0.txz