git-1.8.3.1-25.el7

エラータID: AXSA:2023-5487:04

Release date: 
Wednesday, May 24, 2023 - 00:21
Subject: 
git-1.8.3.1-25.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.

Security Fix(es):

* git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (CVE-2023-25652)
* git: arbitrary configuration injection when renaming or deleting a section from a configuration file (CVE-2023-29007)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2023-25652
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (corresponding to the rejected hunk(s) from the given patch). A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid using `git apply` with `--reject` when applying patches from an untrusted source. Use `git apply --stat` to inspect a patch before applying; avoid applying one that create a conflict where a link corresponding to the `*.rej` file exists.
CVE-2023-29007
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`. This bug can be used to inject arbitrary configuration into a user's `$GIT_DIR/config` when attempting to remove the configuration section associated with that submodule. When the attacker injects configuration values which specify executables to run (such as `core.pager`, `core.editor`, `core.sshCommand`, etc.) this can lead to a remote code execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running `git submodule deinit` on untrusted repositories or without prior inspection of any submodule sections in `$GIT_DIR/config`.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. git-1.8.3.1-25.el7.src.rpm
    MD5: 5017e967b396369f55ab2362036b1af8
    SHA-256: 3ae6209a2c6b15e8a6122c865c404eb356355e4175e646311cbbf883b01f247c
    Size: 4.40 MB

Asianux Server 7 for x86_64
  1. git-1.8.3.1-25.el7.x86_64.rpm
    MD5: 55936c4a62c3a8abd5ee1a5a78394e91
    SHA-256: a5ff359bf4a36130a2d5cd2840747c4fb2787dcad077fcf048c439c89f7f2762
    Size: 4.40 MB
  2. perl-Git-1.8.3.1-25.el7.noarch.rpm
    MD5: 117f988d5821f5bf60d6c99a321c5f28
    SHA-256: 893a0e88a3b5cf5223d74d22cbdcb6a6cf43f207cf6b8fafd077ae19c887fa49
    Size: 55.17 kB