[Bug 1991636] [NEW] [FFe]Update to libgit2 1.3.2
Simon Chopin
1991636 at bugs.launchpad.net
Tue Oct 4 08:17:39 UTC 2022
Public bug reported:
1.3.1 and 1.3.2 are bugfix releases that basically catch up to git on
some security behaviour. Here's the upstream changelog for those
versions (note that the embedded zlib is removed when repacking):
v1.3.2
------
🔒 This is a security release with multiple changes.
* This provides compatibility with git's changes to address CVE
2022-29187. As a follow up to [CVE
2022-24765](https://github.blog/2022-04-12-git-security-vulnerability-
announced/), now not only is the working directory of a non-bare
repository examined for its ownership, but the `.git` directory and the
`.git` file (if present) are also examined for their ownership.
* A fix for compatibility with git's (new) behavior for CVE 2022-24765
allows users on POSIX systems to access a git repository that is owned
by them when they are running in `sudo`.
* A fix for further compatibility with git's (existing) behavior for CVE
2022-24765 allows users on Windows to access a git repository that is
owned by the Administrator when running with escalated privileges (using
`runas Administrator`).
* The bundled zlib is updated to v1.2.12, as prior versions had memory
corruption bugs. It is not known that there is a security vulnerability
in libgit2 based on these bugs, but we are updating to be cautious.
All users of the v1.3 release line are recommended to upgrade.
v1.3.1
------
🔒 This is a security release to provide compatibility with git's changes
to address [CVE 2022-24765](https://github.blog/2022-04-12-git-security-
vulnerability-announced/).
**libgit2 is not directly affected** by this vulnerability, because
libgit2 does not directly invoke any executable. But we are providing
these changes as a security release for any users that use libgit2 for
repository discovery and then _also_ use git on that repository. In this
release, we will now validate that the user opening the repository is
the same user that owns the on-disk repository. This is to match git's
behavior.
In addition, we are providing several correctness fixes where invalid
input can lead to a crash. These may prevent possible denial of service
attacks. At this time there are not known exploits to these issues.
Full list of changes:
* Validate repository directory ownership (v1.3) by @ethomson in
https://github.com/libgit2/libgit2/pull/6268
All users of the v1.3 release line are recommended to upgrade.
** Affects: libgit2 (Ubuntu)
Importance: High
Assignee: Simon Chopin (schopin)
Status: Confirmed
** Tags: patch
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to libgit2 in Ubuntu.
https://bugs.launchpad.net/bugs/1991636
Title:
[FFe]Update to libgit2 1.3.2
Status in libgit2 package in Ubuntu:
Confirmed
Bug description:
1.3.1 and 1.3.2 are bugfix releases that basically catch up to git on
some security behaviour. Here's the upstream changelog for those
versions (note that the embedded zlib is removed when repacking):
v1.3.2
------
🔒 This is a security release with multiple changes.
* This provides compatibility with git's changes to address CVE
2022-29187. As a follow up to [CVE
2022-24765](https://github.blog/2022-04-12-git-security-vulnerability-
announced/), now not only is the working directory of a non-bare
repository examined for its ownership, but the `.git` directory and
the `.git` file (if present) are also examined for their ownership.
* A fix for compatibility with git's (new) behavior for CVE 2022-24765
allows users on POSIX systems to access a git repository that is owned
by them when they are running in `sudo`.
* A fix for further compatibility with git's (existing) behavior for
CVE 2022-24765 allows users on Windows to access a git repository that
is owned by the Administrator when running with escalated privileges
(using `runas Administrator`).
* The bundled zlib is updated to v1.2.12, as prior versions had memory
corruption bugs. It is not known that there is a security
vulnerability in libgit2 based on these bugs, but we are updating to
be cautious.
All users of the v1.3 release line are recommended to upgrade.
v1.3.1
------
🔒 This is a security release to provide compatibility with git's
changes to address [CVE
2022-24765](https://github.blog/2022-04-12-git-security-vulnerability-
announced/).
**libgit2 is not directly affected** by this vulnerability, because
libgit2 does not directly invoke any executable. But we are providing
these changes as a security release for any users that use libgit2 for
repository discovery and then _also_ use git on that repository. In
this release, we will now validate that the user opening the
repository is the same user that owns the on-disk repository. This is
to match git's behavior.
In addition, we are providing several correctness fixes where invalid
input can lead to a crash. These may prevent possible denial of
service attacks. At this time there are not known exploits to these
issues.
Full list of changes:
* Validate repository directory ownership (v1.3) by @ethomson in
https://github.com/libgit2/libgit2/pull/6268
All users of the v1.3 release line are recommended to upgrade.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libgit2/+bug/1991636/+subscriptions
More information about the foundations-bugs
mailing list