[ALSA-2023:2357] Moderate: git-lfs security and bug fix update
Release date:
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880) * golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) * golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715) * golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717) * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 git-lfs-3.2.0-1.el9.aarch64.rpm ad6985fd22b3b920488b2142ef36f286be684d31cdc4f54f606b2bf4637a05ee
ppc64le git-lfs-3.2.0-1.el9.ppc64le.rpm f8167aea78ff8a24af94a71adaaaa56fa38d215a6628bb58aafbd4eb43fb91e1
s390x git-lfs-3.2.0-1.el9.s390x.rpm ec6eb30dfbf59001df5542c184a72b2f474cc289cd3041e6e5f4df108ac01a35
x86_64 git-lfs-3.2.0-1.el9.x86_64.rpm 205862ee3ae4dd4841ca235399bf6c73f486bde572254598b3943d1aeaa88da7
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.