[RHSA-2023:2357] git-lfs security and bug fix update
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)
golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)
golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/git-lfs?arch=x86_64&distro=redhat-9 | < 3.2.0-1.el9 |
pkg:rpm/redhat/git-lfs?arch=s390x&distro=redhat-9 | < 3.2.0-1.el9 |
pkg:rpm/redhat/git-lfs?arch=ppc64le&distro=redhat-9 | < 3.2.0-1.el9 |
pkg:rpm/redhat/git-lfs?arch=aarch64&distro=redhat-9 | < 3.2.0-1.el9 |
- ID
- RHSA-2023:2357
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2023:2357
- Published
-
2023-05-09T00:00:00
(16 months ago) - Modified
-
2023-05-09T00:00:00
(16 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1635
- ALAS-2023-1731
- ALAS-2023-1825
- ALAS-2023-1848
- ALAS2-2022-1846
- ALAS2-2022-1847
- ALAS2-2022-1851
- ALAS2-2022-1858
- ALAS2-2022-1859
- ALAS2-2022-1860
- ALAS2-2022-1861
- ALAS2-2022-1862
- ALAS2-2022-1863
- ALAS2-2022-1864
- ALAS2-2022-1865
- ALAS2-2022-1887
- ALAS2-2023-1913
- ALAS2-2023-1926
- ALAS2-2023-2015
- ALAS2-2023-2238
- ALPINE:CVE-2022-1705
- ALPINE:CVE-2022-27664
- ALPINE:CVE-2022-2880
- ALPINE:CVE-2022-30630
- ALPINE:CVE-2022-30632
- ALPINE:CVE-2022-30635
- ALPINE:CVE-2022-32148
- ALPINE:CVE-2022-32189
- ALPINE:CVE-2022-41715
- ALPINE:CVE-2022-41717
- ALSA-2022:5775
- ALSA-2022:5799
- ALSA-2022:7129
- ALSA-2022:7519
- ALSA-2022:7529
- ALSA-2022:7548
- ALSA-2022:7648
- ALSA-2022:7950
- ALSA-2022:8057
- ALSA-2022:8098
- ALSA-2022:8250
- ALSA-2023:0328
- ALSA-2023:0446
- ALSA-2023:2167
- ALSA-2023:2177
- ALSA-2023:2193
- ALSA-2023:2204
- ALSA-2023:2222
- ALSA-2023:2236
- ALSA-2023:2253
- ALSA-2023:2282
- ALSA-2023:2283
- ALSA-2023:2357
- ALSA-2023:2367
- ALSA-2023:2758
- ALSA-2023:2780
- ALSA-2023:2784
- ALSA-2023:2785
- ALSA-2023:2802
- ALSA-2023:2866
- ALSA-2023:6420
- ALSA-2024:0121
- ALSA-2024:2180
- ALSA-2024:3254
- ELSA-2022-20693
- ELSA-2022-20694
- ELSA-2022-23681
- ELSA-2022-24267
- ELSA-2022-5775
- ELSA-2022-5799
- ELSA-2022-7129
- ELSA-2022-7519
- ELSA-2022-7529
- ELSA-2022-7548
- ELSA-2022-7648
- ELSA-2022-7950
- ELSA-2022-8057
- ELSA-2022-8250
- ELSA-2023-0328
- ELSA-2023-0446
- ELSA-2023-18908
- ELSA-2023-2167
- ELSA-2023-2177
- ELSA-2023-2204
- ELSA-2023-2222
- ELSA-2023-2253
- ELSA-2023-2282
- ELSA-2023-2283
- ELSA-2023-2357
- ELSA-2023-2367
- ELSA-2023-2592
- ELSA-2023-2758
- ELSA-2023-2780
- ELSA-2023-2784
- ELSA-2023-2785
- ELSA-2023-2802
- ELSA-2023-2866
- ELSA-2023-6420
- ELSA-2024-0121
- ELSA-2024-2180
- ELSA-2024-2988
- ELSA-2024-3254
- FEDORA-2022-0e313cc582
- FEDORA-2022-1f829990f0
- FEDORA-2022-30c5ed5625
- FEDORA-2022-45097317b4
- FEDORA-2022-59a20edab2
- FEDORA-2022-67ec8c61d0
- FEDORA-2023-0c354a3f9a
- FEDORA-2023-0fa7715821
- FEDORA-2023-0fff8bc164
- FEDORA-2023-2663dc67d8
- FEDORA-2023-267503a090
- FEDORA-2023-2df9d60e4c
- FEDORA-2023-322314ad50
- FEDORA-2023-327346caa5
- FEDORA-2023-3baf3f43a0
- FEDORA-2023-3dba09f630
- FEDORA-2023-4e2068ba5d
- FEDORA-2023-5eca6a8326
- FEDORA-2023-62ce942e75
- FEDORA-2023-6550d9323b
- FEDORA-2023-6cfe7492c1
- FEDORA-2023-6d71ff268e
- FEDORA-2023-70eb8ba61e
- FEDORA-2023-74e5545901
- FEDORA-2023-8b700042ac
- FEDORA-2023-8c02aee138
- FEDORA-2023-8ecc0e487e
- FEDORA-2023-946dfaf17f
- FEDORA-2023-a5a5542890
- FEDORA-2023-aa7c75ed4a
- FEDORA-2023-abb47e24d8
- FEDORA-2023-ac4651c9b2
- FEDORA-2023-af2e3d1c18
- FEDORA-2023-c0149844e2
- FEDORA-2023-c9b2182a4e
- FEDORA-2023-ca444fdecf
- FEDORA-2023-cb3a59a3df
- FEDORA-2023-ce2836acfa
- FEDORA-2023-e16469fdec
- FEDORA-2023-e359fd31d2
- FEDORA-2023-e82fd2abcb
- FEDORA-2023-e8c27ba884
- FEDORA-2023-ee472c698c
- FEDORA-2023-f4bd7ab2f7
- FEDORA-2024-ae653fb07b
- FEDORA-2024-b85b97c0e9
- FEDORA-2024-fb32950d11
- FEDORA-2024-fd3545a844
- FREEBSD:6F5192F5-75A7-11ED-83C0-411D43CE7FE4
- FREEBSD:6FEA7103-2EA4-11ED-B403-3DAE8AC60D3E
- FREEBSD:7F8D5435-125A-11ED-9A69-10C37B4AC2EA
- FREEBSD:854C2AFB-4424-11ED-AF97-ADCABF310F9B
- FREEBSD:A4F2416C-02A0-11ED-B817-10C37B4AC2EA
- GLSA-202208-02
- GLSA-202209-26
- GLSA-202311-09
- GO-2022-0520
- GO-2022-0522
- GO-2022-0525
- GO-2022-0526
- GO-2022-0527
- GO-2022-0537
- GO-2022-0969
- GO-2022-1038
- GO-2022-1039
- GO-2022-1144
- MS:CVE-2022-1705
- MS:CVE-2022-27664
- MS:CVE-2022-30630
- MS:CVE-2022-30632
- MS:CVE-2022-30635
- MS:CVE-2022-32148
- MS:CVE-2022-32189
- MS:CVE-2022-41717
- RHSA-2022:5775
- RHSA-2022:5799
- RHSA-2022:7129
- RHSA-2022:7519
- RHSA-2022:7529
- RHSA-2022:7548
- RHSA-2022:7648
- RHSA-2022:7950
- RHSA-2022:8057
- RHSA-2022:8098
- RHSA-2022:8250
- RHSA-2023:0328
- RHSA-2023:0446
- RHSA-2023:2167
- RHSA-2023:2177
- RHSA-2023:2193
- RHSA-2023:2204
- RHSA-2023:2222
- RHSA-2023:2236
- RHSA-2023:2253
- RHSA-2023:2282
- RHSA-2023:2283
- RHSA-2023:2367
- RHSA-2023:2592
- RHSA-2023:2758
- RHSA-2023:2780
- RHSA-2023:2784
- RHSA-2023:2785
- RHSA-2023:2802
- RHSA-2023:2866
- RHSA-2023:6420
- RHSA-2024:0121
- RHSA-2024:2180
- RHSA-2024:2988
- RHSA-2024:3254
- RLSA-2022:5775
- RLSA-2022:7129
- RLSA-2022:7519
- RLSA-2022:7529
- RLSA-2022:7548
- RLSA-2022:7648
- RLSA-2022:7950
- RLSA-2022:8057
- RLSA-2022:8098
- RLSA-2022:8250
- RLSA-2023:0328
- RLSA-2023:0446
- SUSE-SU-2022:2671-1
- SUSE-SU-2022:2672-1
- SUSE-SU-2022:3325-1
- SUSE-SU-2022:3326-1
- SUSE-SU-2022:3668-1
- SUSE-SU-2022:3669-1
- SUSE-SU-2022:4397-1
- SUSE-SU-2022:4398-1
- SUSE-SU-2023:2182-1
- SUSE-SU-2023:2183-1
- SUSE-SU-2023:2185-1
- SUSE-SU-2023:2187-1
- SUSE-SU-2023:2312-1
- SUSE-SU-2023:2575-1
- SUSE-SU-2023:2578-1
- SUSE-SU-2023:2579-1
- SUSE-SU-2023:2598-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0196-1
- SUSE-SU-2024:0486-1
- SUSE-SU-2024:0487-1
- USN-6038-1
- USN-6038-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/git-lfs?arch=x86_64&distro=redhat-9 | redhat | git-lfs | < 3.2.0-1.el9 | redhat-9 | x86_64 | |
Affected | pkg:rpm/redhat/git-lfs?arch=s390x&distro=redhat-9 | redhat | git-lfs | < 3.2.0-1.el9 | redhat-9 | s390x | |
Affected | pkg:rpm/redhat/git-lfs?arch=ppc64le&distro=redhat-9 | redhat | git-lfs | < 3.2.0-1.el9 | redhat-9 | ppc64le | |
Affected | pkg:rpm/redhat/git-lfs?arch=aarch64&distro=redhat-9 | redhat | git-lfs | < 3.2.0-1.el9 | redhat-9 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |