[CLSA-2023:1677095411] git: Fix of 6 CVEs
Type:
security
Severity:
Critical
Release date:
2023-02-22
Description:
- CVE-2022-41903: fix out-of-bounds write caused by integer overflow - CVE-2021-40330: forbid newlines in host and path - CVE-2022-39260: reject too long command line strings - CVE-2021-23521: implement size checks for .gitattributes - CVE-2023-22490: prevent arbitrary path exfiltration when using non-local transports - CVE-2023-23946: prevent git-apply from writing behind newly created symbolic links
Updated packages:
  • git-2.27.0-1.el8.tuxcare.els1.x86_64.rpm
    sha:1d397cc915918b8ae657ba3b1e4f14b2bd628efb
  • git-all-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:189b51e4cda85b631dfe7e9d3c68d68143ec3714
  • git-core-2.27.0-1.el8.tuxcare.els1.x86_64.rpm
    sha:5c1e4ad0b60ebd70d337753e2d5f6f18fc76aa59
  • git-core-doc-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:aa6305dabcb11838a55c38716b9e18c7c5d49e32
  • git-credential-libsecret-2.27.0-1.el8.tuxcare.els1.x86_64.rpm
    sha:6291dd8f2b339b6d269b957363606e53121e7ad2
  • git-daemon-2.27.0-1.el8.tuxcare.els1.x86_64.rpm
    sha:5c060a2dff46fc3089e887c35ccb7f58c8089f56
  • git-email-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:367931d12903be3db46a4427787a241828701ebb
  • git-gui-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:e7385ace25d44a045a566524699b72c2ae6a45bd
  • git-instaweb-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:9e3564512522ffc88227c563e8bc7787b20ba840
  • git-subtree-2.27.0-1.el8.tuxcare.els1.x86_64.rpm
    sha:0709f9331f8ac9047f4439b9f0c1040b296a5818
  • git-svn-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:85483f5be293b4dd20d1d3dd3c131ff6f7c4bdab
  • gitk-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:d5b8bf235567f08f74bd9cf9386f4bd12d4a8cf7
  • gitweb-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:7e130caf5eaeda48862ff6b6b796dc1b9c5254f0
  • perl-Git-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:82fae96934dbb50860343d3570b2c64fd63cb7c9
  • perl-Git-SVN-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:10c4b01b8d6238b2f0c7bbc1bf7717b471e8984c
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.