Security
Headlines
HeadlinesLatestCVEs

Headline

Gentoo Linux Security Advisory 202411-05

Gentoo Linux Security Advisory 202411-5 - Multiple vulnerabilities have been discovered in libgit2, the worst of which could lead to arbitrary code execution. Versions greater than or equal to 1.7.2 are affected.

Packet Storm
#vulnerability#web#mac#linux#git

Gentoo Linux Security Advisory GLSA 202411-05


                                       https://security.gentoo.org/  

Severity: High
Title: libgit2: Multiple Vulnerabilities
Date: November 06, 2024
Bugs: #891525, #923971
ID: 202411-05


Synopsis

Multiple vulnerabilities have been discovered in libgit2, the worst of
which could lead to arbitrary code execution.

Background

libgit2 is a portable, pure C implementation of the Git core methods
provided as a re-entrant linkable library with a solid API, allowing you
to write native speed custom Git applications in any language that
supports C bindings.

Affected packages

Package Vulnerable Unaffected


dev-libs/libgit2 < 1.7.2 >= 1.7.2

Description

Multiple vulnerabilities have been discovered in libgit2. Please review
the CVE identifiers referenced below for details.

Impact

Please review the referenced CVE identifiers for details.

Workaround

There is no known workaround at this time.

Resolution

All libgit2 users should upgrade to the latest version:

emerge --sync

emerge --ask --oneshot --verbose “>=dev-libs/libgit2-1.7.2”

References

[ 1 ] CVE-2023-22742
https://nvd.nist.gov/vuln/detail/CVE-2023-22742

Availability

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202411-05

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or alternatively, you may file a bug at
https://bugs.gentoo.org.

License

Copyright 2024 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

Related news

Ubuntu Security Notice USN-6678-1

Ubuntu Security Notice 6678-1 - It was discovered that libgit2 mishandled equivalent filenames on NTFS partitions. If a user or automated system were tricked into cloning a specially crafted repository, an attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. It was discovered that libgit2 did not perform certificate checking by default. An attacker could possibly use this issue to perform a machine-in-the-middle attack. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.

CVE-2023-22742: Merge pull request #6450 from libgit2/1.5_ssh · libgit2/libgit2@42e5db9

libgit2 is a cross-platform, linkable library implementation of Git. When using an SSH remote with the optional libssh2 backend, libgit2 does not perform certificate checking by default. Prior versions of libgit2 require the caller to set the `certificate_check` field of libgit2's `git_remote_callbacks` structure - if a certificate check callback is not set, libgit2 does not perform any certificate checking. This means that by default - without configuring a certificate check callback, clients will not perform validation on the server SSH keys and may be subject to a man-in-the-middle attack. Users are encouraged to upgrade to v1.4.5 or v1.5.1. Users unable to upgrade should ensure that all relevant certificates are manually checked.

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution