{"id":60159,"date":"2024-11-06T23:22:02","date_gmt":"2024-11-06T20:22:02","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/182532\/glsa-202411-05.txt"},"modified":"2024-11-06T23:22:02","modified_gmt":"2024-11-06T20:22:02","slug":"gentoo-linux-security-advisory-202411-05","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/gentoo-linux-security-advisory-202411-05\/","title":{"rendered":"Gentoo Linux Security Advisory 202411-05"},"content":{"rendered":"<p>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<br \/>Gentoo Linux Security Advisory GLSA 202411-05<br \/>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<br \/>https:\/\/security.gentoo.org\/<br \/>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<\/p>\n<p>Severity: High<br \/>Title: libgit2: Multiple Vulnerabilities<br \/>Date: November 06, 2024<br \/>Bugs: #891525, #923971<br \/>ID: 202411-05<\/p>\n<p>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<\/p>\n<p>Synopsis<br \/>========<\/p>\n<p>Multiple vulnerabilities have been discovered in libgit2, the worst of<br \/>which could lead to arbitrary code execution.<\/p>\n<p>Background<br \/>==========<\/p>\n<p>libgit2 is a portable, pure C implementation of the Git core methods<br \/>provided as a re-entrant linkable library with a solid API, allowing you<br \/>to write native speed custom Git applications in any language that<br \/>supports C bindings.<\/p>\n<p>Affected packages<br \/>=================<\/p>\n<p>Package Vulnerable Unaffected<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;- &#8212;&#8212;&#8212;&#8212; &#8212;&#8212;&#8212;&#8212;<br \/>dev-libs\/libgit2 &lt; 1.7.2 &gt;= 1.7.2<\/p>\n<p>Description<br \/>===========<\/p>\n<p>Multiple vulnerabilities have been discovered in libgit2. Please review<br \/>the CVE identifiers referenced below for details.<\/p>\n<p>Impact<br \/>======<\/p>\n<p>Please review the referenced CVE identifiers for details.<\/p>\n<p>Workaround<br \/>==========<\/p>\n<p>There is no known workaround at this time.<\/p>\n<p>Resolution<br \/>==========<\/p>\n<p>All libgit2 users should upgrade to the latest version:<\/p>\n<p># emerge &#8211;sync<br \/># emerge &#8211;ask &#8211;oneshot &#8211;verbose &#8220;&gt;=dev-libs\/libgit2-1.7.2&#8221;<\/p>\n<p>References<br \/>==========<\/p>\n<p>[ 1 ] CVE-2023-22742<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-22742<\/p>\n<p>Availability<br \/>============<\/p>\n<p>This GLSA and any updates to it are available for viewing at<br \/>the Gentoo Security Website:<\/p>\n<p>https:\/\/security.gentoo.org\/glsa\/202411-05<\/p>\n<p>Concerns?<br \/>=========<\/p>\n<p>Security is a primary focus of Gentoo Linux and ensuring the<br \/>confidentiality and security of our users&#8217; machines is of utmost<br \/>importance to us. Any security concerns should be addressed to<br \/>security@gentoo.org or alternatively, you may file a bug at<br \/>https:\/\/bugs.gentoo.org.<\/p>\n<p>License<br \/>=======<\/p>\n<p>Copyright 2024 Gentoo Foundation, Inc; referenced text<br \/>belongs to its owner(s).<\/p>\n<p>The contents of this document are licensed under the<br \/>Creative Commons &#8211; Attribution \/ Share Alike license.<\/p>\n<p>https:\/\/creativecommons.org\/licenses\/by-sa\/2.5<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;Gentoo Linux Security Advisory GLSA 202411-05&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-60159","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/60159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=60159"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/60159\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=60159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=60159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=60159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}