安全公告详情

NS-SA-2024-0138

2024-11-20 14:49:03

简介

important: curl/git security update

严重级别

important

主题

An update for curl/git is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

curl:
git:


Security Fix(es):
curl: A flaw was found in libcurl, where libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.(CVE-2024-7264)
curl: bugfix
git: A vulnerability was found in Git. This vulnerability can be exploited by an unauthenticated attacker who places a specialized repository on the target's local system. If the victim clones this repository, the attacker can execute arbitrary code.(CVE-2024-32004)
git: A vulnerability was found in Git. This vulnerability allows the malicious manipulation of repositories containing submodules, exploiting a bug that enables the writing of files into the .git/ directory instead of the submodule's intended worktree. This manipulation facilitates the execution of arbitrary code during the cloning process, bypassing user inspection and control.(CVE-2024-32002)
git: A vulnerability was found in Git. This flaw allows an unauthenticated attacker to place a specialized repository on their target's local system. For performance reasons, Git uses hardlinks when cloning a repository located on the same disk. However, if the repo being cloned is owned by a different user, this can introduce a security risk. At any time in the future, the original repo owner could rewrite the hardlinked files in the cloned user's repo.(CVE-2024-32020)
git: A vulnerability was found in Git. This flaw allows an unauthenticated attacker to place a repository on their target's local system that contains symlinks. During the cloning process, Git could be tricked into creating hardlinked arbitrary files into their repository's objects/ directory, impacting availability and integrity.(CVE-2024-32021)
git: A flaw was found in Git in a full copy of a Git repository. A prerequisite for this vulnerability is for an unauthenticated attacker to place a specialized repository on their target's local system. If the victim were to clone this repository, it could result in arbitrary code execution.(CVE-2024-32465)
git: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.09B9.

影响组件

  • curl
  • git

影响产品

  • CGSL MAIN 6.06

更新包

{"fix":[{"product":"CGSL MAIN 6.06","pkgs":[{"binary":["curl-7.61.1-34.0.1.zncgsl6.t9.0.x86_64.rpm","libcurl-7.61.1-34.0.1.zncgsl6.t9.0.x86_64.rpm","libcurl-devel-7.61.1-34.0.1.zncgsl6.t9.0.x86_64.rpm"],"source":"curl-7.61.1-34.0.1.zncgsl6.t9.0.src.rpm"},{"binary":["git-core-2.43.5-1.0.1.zncgsl6.x86_64.rpm"],"source":"git-2.43.5-1.0.1.zncgsl6.src.rpm"}]}]}

CVE

参考