git %28SSA%3A2023-018-01%29
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] git (SSA:2023-018-01)
Date: Tue, 17 Jan 2023 22:22:27 -0800 (PST)





-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] git (SSA:2023-018-01)

New git packages are available for Slackware 14.0, 14.1, 14.2, 15.0,
and -current to fix security issues.


Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/git-2.35.6-i586-1_slack15.0.txz: Upgraded.
This release fixes two security issues:
* CVE-2022-41903:
git log has the ability to display commits using an arbitrary
format with its --format specifiers. This functionality is also
exposed to git archive via the export-subst gitattribute.
When processing the padding operators (e.g., %<(, %<|(, %>(,
%>>(, or %><( ), an integer overflow can occur in
pretty.c::format_and_pad_commit() where a size_t is improperly
stored as an int, and then added as an offset to a subsequent
memcpy() call.
This overflow can be triggered directly by a user running a
command which invokes the commit formatting machinery (e.g., git
log --format=...). It may also be triggered indirectly through
git archive via the export-subst mechanism, which expands format
specifiers inside of files within the repository during a git
archive.
This integer overflow can result in arbitrary heap writes, which
may result in remote code execution.
* CVE-2022-23521:
gitattributes are a mechanism to allow defining attributes for
paths. These attributes can be defined by adding a `.gitattributes`
file to the repository, which contains a set of file patterns and
the attributes that should be set for paths matching this pattern.
When parsing gitattributes, multiple integer overflows can occur
when there is a huge number of path patterns, a huge number of
attributes for a single pattern, or when the declared attribute
names are huge.
These overflows can be triggered via a crafted `.gitattributes` file
that may be part of the commit history. Git silently splits lines
longer than 2KB when parsing gitattributes from a file, but not when
parsing them from the index. Consequentially, the failure mode
depends on whether the file exists in the working tree, the index or
both.
This integer overflow can result in arbitrary heap reads and writes,
which may result in remote code execution.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2022-41903
https://www.cve.org/CVERecord?id=CVE-2022-23521
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/git-2.30.7-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/git-2.30.7-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/git-2.30.7-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/git-2.30.7-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/git-2.30.7-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/git-2.30.7-x86_64-1_slack14.2.txz

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/git-2.35.6-i586-1_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/git-2.35.6-x86_64-1_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/git-2.39.1-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/d/git-2.39.1-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 14.0 package:
bcc7ecde446d93a6b702a50714ce8454 git-2.30.7-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
78031fa6e500d807ae791d7b89334d5f git-2.30.7-x86_64-1_slack14.0.txz

Slackware 14.1 package:
42f23eccc37d1f08653f211a13d754b7 git-2.30.7-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
1fde1ddb395538c8ca20ae4c9e4d106a git-2.30.7-x86_64-1_slack14.1.txz

Slackware 14.2 package:
edeebf5c549252366ff25bef9309b46e git-2.30.7-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
e7f3419bf28d7b06a9223012b218fd71 git-2.30.7-x86_64-1_slack14.2.txz

Slackware 15.0 package:
efa0367e8418a761d88d3bf3d7b757b5 git-2.35.6-i586-1_slack15.0.txz

Slackware x86_64 15.0 package:
40f8a8697f10c572d967531290a5a336 git-2.35.6-x86_64-1_slack15.0.txz

Slackware -current package:
fac030a2fd27f0d87221f3720103feb3 d/git-2.39.1-i586-1.txz

Slackware x86_64 -current package:
8e95c6e5445cbd45644af9dcab99d7e9 d/git-2.39.1-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg git-2.35.6-i586-1_slack15.0.txz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----

iEYEARECAAYFAmPHjyoACgkQakRjwEAQIjNblwCdGF0LPkLJHRDt1y1juWw9VPsv
9/EAn0Zuq2Gp/tTHNF9p6Z07OSFvfwE0
=MonD
-----END PGP SIGNATURE-----