[RHSA-2022:7129] git-lfs security and bug fix update
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)
golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)
golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- git-lfs needs to be rebuild with golang 1.17.7-1 or above
Package | Affected Version |
---|---|
pkg:rpm/redhat/git-lfs?arch=x86_64&distro=redhat-8.6 | < 2.13.3-3.el8_6 |
pkg:rpm/redhat/git-lfs?arch=s390x&distro=redhat-8.6 | < 2.13.3-3.el8_6 |
pkg:rpm/redhat/git-lfs?arch=ppc64le&distro=redhat-8.6 | < 2.13.3-3.el8_6 |
pkg:rpm/redhat/git-lfs?arch=aarch64&distro=redhat-8.6 | < 2.13.3-3.el8_6 |
- ID
- RHSA-2022:7129
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2022:7129
- Published
-
2022-10-25T00:00:00
(23 months ago) - Modified
-
2022-10-25T00:00:00
(23 months ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1635
- ALAS-2023-1731
- ALAS-2023-1825
- ALAS2-2022-1846
- ALAS2-2022-1847
- ALAS2-2022-1851
- ALAS2-2022-1858
- ALAS2-2022-1859
- ALAS2-2022-1860
- ALAS2-2022-1861
- ALAS2-2022-1862
- ALAS2-2022-1863
- ALAS2-2022-1864
- ALAS2-2022-1865
- ALAS2-2023-2238
- ALPINE:CVE-2022-1705
- ALPINE:CVE-2022-27664
- ALPINE:CVE-2022-30630
- ALPINE:CVE-2022-30632
- ALPINE:CVE-2022-30635
- ALPINE:CVE-2022-32148
- ALPINE:CVE-2022-32189
- ALSA-2022:5775
- ALSA-2022:5799
- ALSA-2022:7129
- ALSA-2022:7519
- ALSA-2022:7529
- ALSA-2022:7548
- ALSA-2022:7648
- ALSA-2022:7950
- ALSA-2022:7954
- ALSA-2022:8057
- ALSA-2022:8098
- ALSA-2022:8250
- ALSA-2023:2167
- ALSA-2023:2177
- ALSA-2023:2193
- ALSA-2023:2204
- ALSA-2023:2236
- ALSA-2023:2357
- ALSA-2023:2758
- ALSA-2023:2780
- ALSA-2023:2784
- ALSA-2023:2785
- ALSA-2023:2802
- ALSA-2024:0121
- ALSA-2024:2180
- ELSA-2022-20693
- ELSA-2022-20694
- ELSA-2022-23681
- ELSA-2022-24267
- ELSA-2022-5775
- ELSA-2022-5799
- ELSA-2022-7129
- ELSA-2022-7519
- ELSA-2022-7529
- ELSA-2022-7548
- ELSA-2022-7648
- ELSA-2022-7950
- ELSA-2022-7954
- ELSA-2022-8057
- ELSA-2022-8250
- ELSA-2023-18908
- ELSA-2023-2167
- ELSA-2023-2177
- ELSA-2023-2204
- ELSA-2023-2357
- ELSA-2023-2758
- ELSA-2023-2780
- ELSA-2023-2784
- ELSA-2023-2785
- ELSA-2023-2802
- ELSA-2024-0121
- ELSA-2024-2180
- FEDORA-2022-1f829990f0
- FEDORA-2022-30c5ed5625
- FEDORA-2022-45097317b4
- FEDORA-2022-67ec8c61d0
- FREEBSD:6FEA7103-2EA4-11ED-B403-3DAE8AC60D3E
- FREEBSD:7F8D5435-125A-11ED-9A69-10C37B4AC2EA
- FREEBSD:A4F2416C-02A0-11ED-B817-10C37B4AC2EA
- GLSA-202208-02
- GLSA-202209-26
- GO-2022-0520
- GO-2022-0522
- GO-2022-0525
- GO-2022-0526
- GO-2022-0527
- GO-2022-0537
- GO-2022-0969
- MS:CVE-2022-1705
- MS:CVE-2022-27664
- MS:CVE-2022-30630
- MS:CVE-2022-30632
- MS:CVE-2022-30635
- MS:CVE-2022-32148
- MS:CVE-2022-32189
- RHSA-2022:5775
- RHSA-2022:5799
- RHSA-2022:7519
- RHSA-2022:7529
- RHSA-2022:7548
- RHSA-2022:7648
- RHSA-2022:7950
- RHSA-2022:7954
- RHSA-2022:8057
- RHSA-2022:8098
- RHSA-2022:8250
- RHSA-2023:0328
- RHSA-2023:0446
- RHSA-2023:2167
- RHSA-2023:2177
- RHSA-2023:2193
- RHSA-2023:2204
- RHSA-2023:2236
- RHSA-2023:2357
- RHSA-2023:2758
- RHSA-2023:2780
- RHSA-2023:2784
- RHSA-2023:2785
- RHSA-2023:2802
- RHSA-2024:0121
- RHSA-2024:2180
- RLSA-2022:5775
- RLSA-2022:7129
- RLSA-2022:7519
- RLSA-2022:7529
- RLSA-2022:7548
- RLSA-2022:7648
- RLSA-2022:7950
- RLSA-2022:8057
- RLSA-2022:8098
- RLSA-2022:8250
- SUSE-SU-2022:2671-1
- SUSE-SU-2022:2672-1
- SUSE-SU-2022:3325-1
- SUSE-SU-2022:3326-1
- SUSE-SU-2023:2183-1
- SUSE-SU-2023:2185-1
- SUSE-SU-2023:2187-1
- SUSE-SU-2023:2312-1
- SUSE-SU-2023:2575-1
- SUSE-SU-2023:2578-1
- SUSE-SU-2023:2579-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0196-1
- USN-5873-1
- USN-6038-1
- USN-6038-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/git-lfs?arch=x86_64&distro=redhat-8.6 | redhat | git-lfs | < 2.13.3-3.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/git-lfs?arch=s390x&distro=redhat-8.6 | redhat | git-lfs | < 2.13.3-3.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/git-lfs?arch=ppc64le&distro=redhat-8.6 | redhat | git-lfs | < 2.13.3-3.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/git-lfs?arch=aarch64&distro=redhat-8.6 | redhat | git-lfs | < 2.13.3-3.el8_6 | redhat-8.6 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |