Browse Source
* maint-2.30: (23 commits) Git 2.30.9 gettext: avoid using gettext if the locale dir is not present apply --reject: overwrite existing `.rej` symlink if it exists http.c: clear the 'finished' member once we are done with it clone.c: avoid "exceeds maximum object size" error with GCC v12.x range-diff: use ssize_t for parsed "len" in read_patches() range-diff: handle unterminated lines in read_patches() range-diff: drop useless "offset" variable from read_patches() t5604: GETTEXT_POISON fix, conclusion t5604: GETTEXT_POISON fix, part 1 t5619: GETTEXT_POISON fix t0003: GETTEXT_POISON fix, conclusion t0003: GETTEXT_POISON fix, part 1 t0033: GETTEXT_POISON fix http: support CURLOPT_PROTOCOLS_STR http: prefer CURLOPT_SEEKFUNCTION to CURLOPT_IOCTLFUNCTION http-push: prefer CURLOPT_UPLOAD to CURLOPT_PUT ci: install python on ubuntu ci: use the same version of p4 on both Linux and macOS ci: remove the pipe after "p4 -V" to catch errors github-actions: run gcc-8 on ubuntu-20.04 image ...main
Johannes Schindelin
2 years ago
21 changed files with 291 additions and 104 deletions
@ -0,0 +1,43 @@
@@ -0,0 +1,43 @@
|
||||
Git v2.30.9 Release Notes |
||||
========================= |
||||
|
||||
This release addresses the security issues CVE-2023-25652, |
||||
CVE-2023-25815, and CVE-2023-29007. |
||||
|
||||
|
||||
Fixes since v2.30.8 |
||||
------------------- |
||||
|
||||
* CVE-2023-25652: |
||||
|
||||
By feeding specially crafted input to `git apply --reject`, a |
||||
path outside the working tree can be overwritten with partially |
||||
controlled contents (corresponding to the rejected hunk(s) from |
||||
the given patch). |
||||
|
||||
* CVE-2023-25815: |
||||
|
||||
When Git is compiled with runtime prefix support and runs without |
||||
translated messages, it still used the gettext machinery to |
||||
display messages, which subsequently potentially looked for |
||||
translated messages in unexpected places. This allowed for |
||||
malicious placement of crafted messages. |
||||
|
||||
* CVE-2023-29007: |
||||
|
||||
When renaming or deleting a section from a configuration file, |
||||
certain malicious configuration values may be misinterpreted as |
||||
the beginning of a new configuration section, leading to arbitrary |
||||
configuration injection. |
||||
|
||||
Credit for finding CVE-2023-25652 goes to Ry0taK, and the fix was |
||||
developed by Taylor Blau, Junio C Hamano and Johannes Schindelin, |
||||
with the help of Linus Torvalds. |
||||
|
||||
Credit for finding CVE-2023-25815 goes to Maxime Escourbiac and |
||||
Yassine BENGANA of Michelin, and the fix was developed by Johannes |
||||
Schindelin. |
||||
|
||||
Credit for finding CVE-2023-29007 goes to André Baptista and Vítor Pinho |
||||
of Ethiack, and the fix was developed by Taylor Blau, and Johannes |
||||
Schindelin, with help from Jeff King, and Patrick Steinhardt. |
Loading…
Reference in new issue