[CLSA-2023:1677095961] git: Fix of 6 CVEs
Type:
security
Severity:
Critical
Release date:
2023-02-22
Description:
- CVE-2022-41903: fix out-of-bounds write caused by integer overflow - CVE-2021-40330: forbid newlines in host and path - CVE-2022-39260: reject too long command line strings - CVE-2021-23521: implement size checks for .gitattributes - CVE-2023-22490: prevent arbitrary path exfiltration when using non-local transports - CVE-2023-23946: prevent git-apply from writing behind newly created symbolic links
Updated packages:
  • git-2.27.0-1.el8.tuxcare.els1.x86_64.rpm
    sha:442246939906e6ecebd869ab6f41e168ca44cc21
  • git-all-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:6e8f5352f276c6c9123b1f0cb6a774bde747f222
  • git-core-2.27.0-1.el8.tuxcare.els1.x86_64.rpm
    sha:0c832d4e3ed7ded81faf8e34a16e6a6b8c81c90b
  • git-core-doc-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:7b0e2f809965d670470e900ef19ef963129ed987
  • git-credential-libsecret-2.27.0-1.el8.tuxcare.els1.x86_64.rpm
    sha:a98200ee0f97bef682fb6b5cf8028da491ad5ec1
  • git-daemon-2.27.0-1.el8.tuxcare.els1.x86_64.rpm
    sha:5cc1b1b6368ef7922af677b7c9f07e8a66e74f86
  • git-email-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:5e04eb484b4f16e5e8c46b248493379993467d40
  • git-gui-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:37f4f633a2f401864f01dbafa8487ca1950f5df0
  • git-instaweb-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:d73907fd42720fdae1ffb592a48b0cc70b6bdc46
  • git-subtree-2.27.0-1.el8.tuxcare.els1.x86_64.rpm
    sha:deb348359a7efd359af6fadb254c9782bebf0c9e
  • git-svn-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:f99534b9d48c60a8c869b53ac8e47b699bbc6dad
  • gitk-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:7bf520ce21cb30af481382824636de4daa9657ec
  • gitweb-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:f0575ced499ffdcd776f0301b23a95ee4deab219
  • perl-Git-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:f7372af3fd3c6d1dcd339ddd5ff93686fff7b238
  • perl-Git-SVN-2.27.0-1.el8.tuxcare.els1.noarch.rpm
    sha:5bf05a5775793d7028eac7bdb28a264993b52450
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.