Files
poky/meta/recipes-devtools
Hitendra Prajapati 967c2d4145 git: fix CVE-2023-29007
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8,
2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted
`.gitmodules` file with submodule URLs that are longer than 1024 characters can used
to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`. This bug
can be used to inject arbitrary configuration into a user's `$GIT_DIR/config` when
attempting to remove the configuration section associated with that submodule. When the
attacker injects configuration values which specify executables to run (such as
`core.pager`, `core.editor`, `core.sshCommand`, etc.) this can lead to a remote code
execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8,
2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running
`git submodule deinit` on untrusted repositories or without prior inspection of any
submodule sections in `$GIT_DIR/config`.

References:
https://nvd.nist.gov/vuln/detail/CVE-2023-29007

Upstream patches:
528290f8c6
29198213c9
a5bb10fd5e
e91cfe6085
3bb3d6bac5

(From OE-Core rev: db4c152441aebe4c04a7bb7aceb88d8941a6576b)

Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2023-05-25 05:49:25 -10:00
..
2020-09-17 12:51:24 +01:00
2020-02-03 13:03:31 +00:00
2021-05-20 12:36:42 +01:00
2021-12-08 20:28:01 +00:00
2022-06-24 23:57:45 +01:00
2023-05-25 05:49:25 -10:00
2022-03-31 21:09:33 +01:00
2023-05-16 06:18:21 -10:00
2020-09-10 19:07:40 +01:00
2021-10-23 23:14:17 +01:00
2020-03-08 08:21:11 +00:00
2020-05-22 16:23:23 +01:00
2021-01-09 09:17:17 +00:00
2021-06-03 16:30:56 +01:00
2023-05-03 04:09:42 -10:00
2022-12-23 23:05:44 +00:00
2022-09-23 16:22:59 +01:00
2021-03-18 21:20:24 +00:00