git (1:2.34.1-1ubuntu1.15) jammy-security; urgency=medium * SECURITY REGRESSION: Breakage when using gitk and git gui. (LP: #2116251) - debian/patches/CVE-2025-27613.patch: Added back. - debian/patches/CVE-2025-27613-post1.patch: Change usage of safe_open_command_redirect to safe_open_command in some commands in gitk-git/gitk. - debian/patches/CVE-2025-46835-pre1.patch: Added back. - debian/patches/CVE-2025-46835.patch: Added back. - debian/patches/CVE-2025-46835-post1: Change git_read to safe_open_command in git-gui/git-gui.sh. -- Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com> Wed, 09 Jul 2025 17:16:10 -0230 git (1:2.34.1-1ubuntu1.14) jammy-security; urgency=medium * SECURITY REGRESSION: Revert gitk and git gui fixes pending further investigation. (LP: #2116251) - debian/patches/CVE-2025-27613.patch: Reverted. - debian/patches/CVE-2025-46835-pre1.patch: Reverted. - debian/patches/CVE-2025-46835.patch: Reverted. -- Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com> Wed, 09 Jul 2025 10:08:11 -0230 git (1:2.34.1-1ubuntu1.13) jammy-security; urgency=medium * SECURITY UPDATE: Code execution and file manipulation when cloning malicious repositories. - debian/patches/CVE-2025-27613.patch: Add argument sanitizing and replace command instances with safe versions in gitk-git/gitk. - CVE-2025-27613 * SECURITY UPDATE: File overwrite when editing a file in a malicious directory in an untrusted repository. - debian/patches/CVE-2025-46835-pre1.patch: Remove windows specific code in git-gui/git-gui.sh. - debian/patches/CVE-2025-46835.patch: Add argument sanitizing, replace command instances with safe versions, and wrap instances with list in git-gui/git-gui.sh and other files in git-gui directory. - CVE-2025-46835 * SECURITY UPDATE: Unintentional script execution due to improperly stripped carriage return. - debian/patches/CVE-2025-48384.patch: Add carriage return checks in config.c. - CVE-2025-48384 * SECURITY UPDATE: Buffer overflow. - debian/patches/CVE-2025-48386.patch: Add target_append function and change wcsncat calls to target_append in contrib/credential/wincred/git-credential-wincred.c. - CVE-2025-48386 -- Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com> Thu, 03 Jul 2025 15:27:43 -0230 git (1:2.34.1-1ubuntu1.12) jammy-security; urgency=medium * SECURITY UPDATE: crafted URL susceptibility - debian/patches/CVE-2024-50349-1.patch: sanitize credentials in credential.c, strbuf.c, strbuf.h, t/t0300-credentials.sh. - debian/patches/CVE-2024-50349-2.patch: credential sanitize the user prompt in credential.c, credential.h, t/t0300-credentials.sh, t/t5541-http-push-smart.sh, t/t5550-http-fetch-dumb.sh, t/t5551-http-fetch-smart.sh. - CVE-2024-50349 * SECURITY UPDATE: Git may pass on Carriage Returns - debian/patches/CVE-2024-52006.patch: disallow carriage returns in the protocol by default in credential.c, credential.h, t/t0300-credentials.sh. - CVE-2024-52006 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com> Mon, 13 Jan 2025 17:13:20 -0300 git (1:2.34.1-1ubuntu1.11) jammy-security; urgency=medium * SECURITY UPDATE: Facilitation of arbitrary code execution - debian/patches/CVE-2024-32002.patch: submodule paths must not contains symlinks in builtin/submodule--helper.c. - CVE-2024-32002 * SECURITY UPDATE: Arbitrary code execution - debian/patches/CVE-2024-32004.patch: detect dubious ownership of local repositories in path.c, setup.c, setup.h. - CVE-2024-32004 * SECURITY UPDATE: Overwrite of possible malicious hardlink - debian/patches/CVE-2024-32020.patch: refuse clones of unsafe repositories in builtin/clonse.c, t0033-safe-directory.sh. - CVE-2024-32020 * SECURITY UPDATE: Unauthenticated attacker to place a repository on their target's local system that contains symlinks - debian/patches/CVE-2024-32021.patch: abort when hardlinked source and target file differ in builtin/clone.c - CVE-2024-32021 * SECURITY UPDATE: Arbitrary code execution - debian/patches/CVE-2024-32465.patch: disable lazy-fetching by default in builtin/upload-pack.c, promisor-remote.c - CVE-2024-32465 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com> Mon, 20 May 2024 09:14:17 -0300 git (1:2.34.1-1ubuntu1.10) jammy; urgency=medium * Fix issue where untracked files are not recovered during a stash pop/apply operation when a merge conflict is present. Untracked files are now correctly restored regardless if a conflict is present or not. (LP: #2026319) - d/p/lp-2026319-stash-do-not-return-before-restoring-untracked-files.patch -- Matthew Ruffell <matthew.ruffell@canonical.com> Fri, 07 Jul 2023 14:31:14 +1200 git (1:2.34.1-1ubuntu1.9) jammy-security; urgency=medium * SECURITY UPDATE: Overwriting path - debian/patches/CVE-2023_25652_25815_29007/0022-*.patch: apply --reject overwriting existing .rej symlink if it exists in apply.c, t/t4115-apply-symlink.sh. - CVE-2023-25652 * SECURITY UPDATE: Malicious placement of crafted messages - debian/patches/CVE-2023_25652_25815_29007/0024-*patch: avoid using gettext if the locale dir is not present in gettext.c. - CVE-2023-25815 * SECURITY UPDATE: Arbitrary configuration injection - debian/patches/CVE-2023_25652_25815_29007/0025-*.patch: avoid fixed-sized buffer when renaming/deleting a section in config.c, t/t1300-config.sh. - debian/patches/CVE-2023_25652_25815_29007/0026-*.patch: avoid integer truncation in copy_or_rename_section_in_file() in config.c. - debian/patches/CVE-2023_25652_25815_29007/0027-*.patch: disallow overly-long lines in copy_or_rename_section_in_file in config.c. - CVE-2023-29007 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com> Wed, 26 Apr 2023 06:43:33 -0300 git (1:2.34.1-1ubuntu1.8) jammy-security; urgency=medium * SECURITY UPDATE: Overwritten path and using local clone optimization even when using a non-local transport - debian/patches/CVE_2023-22490_and_23946/0002-*.patch: adjust a mismatch data type in attr.c. - debian/patches/CVE_2023-22490_and_23946/0003-*.patch: demonstrate clone_local() with ambiguous transport in t/t5619-clone-local-ambiguous-transport.sh. - debian/patches/CVE_2023-22490_and_23946/0004-*.patch: delay picking a transport until after get_repo_path() in builtin/clone.c. - debian/patches/CVE_2023-22490_and_23946/0005-*.patch: prevent top-level symlinks without FOLLOW_SYMLINKS in dir-iterator, dir-iterator.h, t/t0066-dir-iterator.sh, t/t5604-clone-reference.sh. - debian/patches/CVE_2023-22490_and_23946/0006-*.patch: fix writing behind newly created symbolic links in apply.c, t/t4115-apply-symlink.sh. - CVE-2023-22490 - CVE-2023-23946 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com> Wed, 08 Feb 2023 10:57:45 -0300 git (1:2.34.1-1ubuntu1.6) jammy-security; urgency=medium * SECURITY UPDATE: Integer overflow - debian/patches/CVE_2022_23521_and_41903/00*.patch: attr.c, attr.h, pretty.c, column.c, utf8.c, utf8.h, t/t4205-log-pretty-formats.sh, t/test-lib.sh, git-compat-util.h, t/t0003-attributes.sh. - CVE-2022-23521 - CVE-2022-41903 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com> Wed, 11 Jan 2023 15:12:27 -0300 git (1:2.34.1-1ubuntu1.5) jammy-security; urgency=medium * SECURITY UPDATE: Unexpected behavior - debian/patches/CVE-2022-39253-*.patch: disallow --local clones with symlinks and additionally changed the protocol.file.allow to be user by default in builtin/clone.c, transport.c, and modified tests in t/t5604-clone-reference.sh, lib-submodule-update.sh, t/t1091-sparse-checkout-builtin.sh, t/t1500-rev-parse.sh, t/t2400-worktree-add.sh, t/t2403-worktree-move.sh, t/t2405-worktree-submodule.sh, t/t3200-branch.sh, t/t3420-rebase-autostash.sh, t/t3426-rebase-submodule.sh, t/t3512-cherry-pick-submodule.sh, t/t3600-rm.sh, t/t3906-stash-submodule.sh, t/t4059-diff-submodule-not-initialized.sh, t/t4060-diff-submodule-option-diff-format.sh, t/t4067-diff-partial-clone.sh, t/t4208-log-magic-pathspec.sh, t/t5510-fetch.sh, t/t5526-fetch-submodules.sh, t/t5545-push-options.sh, t/t5572-pull-submodule.sh, t/t5601-clone.sh, t/t5614-clone-submodules-shallow.sh, t/t5616-partial-clone.sh, t/t5617-clone-submodules-remote.sh, t/t6008-rev-list-submodule.sh, t/t6134-pathspec-in-submodule.sh, t/t7001-mv.sh, t/t7064-wtstatus-pv2.sh, t/t7300-clean.sh, t/t7400-submodule-basic.sh, t/t7403-submodule-sync.sh, t/t7406-submodule-update.sh, t/t7407-submodule-foreach.sh, t/t7408-submodule-reference.sh, t/t7409-submodule-detached-work-tree.sh, t/t7411-submodule-config.sh, t/t7413-submodule-is-active.sh, t/t7414-submodule-mistakes.sh, t/t7415-submodule-names.sh, t/t7416-submodule-dash-url.sh, t/t7417-submodule-path-url.sh, t/t7418-submodule-sparse-gitmodules.sh, t/t7419-submodule-set-branch.sh, t/t7420-submodule-set-url.sh, t/t7421-submodule-summary-add.sh, t/t7506-status-submodule.sh, t/t7507-commit-verbose.sh, t/t7800-difftool.sh, t/t7814-grep-recurse-submodules.sh, t/t9304-fast-import-marks.sh, t/t9350-fast-export.sh, t/t1092-sparse-checkout-compatibility.sh, t/t2080-parallel-checkout-basics.sh, t/t7450-bad-git-dotfiles.sh. - CVE-2022-39253 * SECURITY UPDATE: Arbitrary heap writes - debian/patches/CVE-2022-39260-*.patch: limit size of interactive commands and reject too-long cmdline strings in split cmdline() in shell.c, t/t9850-shell.sh, alias.c. - CVE-2022-39260 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com> Thu, 13 Oct 2022 09:33:36 -0300 # For older changelog entries, run 'apt-get changelog git-man'
Generated by dwww version 1.14 on Tue Aug 26 22:59:53 CEST 2025.