Bug 31497 - ruby-git new security issues CVE-2022-46648, CVE-2022-47318
Summary: ruby-git new security issues CVE-2022-46648, CVE-2022-47318
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2023-02-01 17:54 CET by David Walser
Modified: 2023-03-18 23:18 CET (History)
7 users (show)

See Also:
Source RPM: ruby-git-1.6.0-1.1.mga8.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2023-02-01 17:54:51 CET
Debian-LTS has issued an advisory on January 31:
https://www.debian.org/lts/security/2023/dla-3303

The issues are fixed upstream in 1.13.0.

Mageia 8 is also affected.
David Walser 2023-02-01 17:55:04 CET

Status comment: (none) => Fixed upstream in 1.13.0
Whiteboard: (none) => MGA8TOO

Comment 1 David Walser 2023-02-01 18:35:19 CET
Fedora has issued an advisory for this on January 30:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4KPFLSZPUM7APWVBRM5DCAY5OUVQBF4K/

Severity: normal => major

Comment 2 Marja Van Waes 2023-02-04 22:23:48 CET
Assigning to all packagers collectively, because there is no registered maintainer for this packages.

CC'ing pterjan, who was the last one to push it.

Assignee: bugsquad => pkg-bugs
CC: (none) => marja11, pterjan

Comment 3 Nicolas Salguero 2023-03-13 13:19:34 CET
Suggested advisory:
========================

The updated packages fix security vulnerabilities:

ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. (CVE-2022-46648, CVE-2022-47318)

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47318
https://www.debian.org/lts/security/2023/dla-3303
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4KPFLSZPUM7APWVBRM5DCAY5OUVQBF4K/
========================

Updated packages in core/updates_testing:
========================
ruby-git-1.6.0-1.2.mga8
ruby-git-doc-1.6.0-1.2.mga8

from SRPM:
ruby-git-1.6.0-1.2.mga8.src.rpm

Status comment: Fixed upstream in 1.13.0 => (none)
Whiteboard: MGA8TOO => (none)
CC: (none) => nicolas.salguero
Assignee: pkg-bugs => qa-bugs
Source RPM: ruby-git-1.12.0-1.mga9.src.rpm => ruby-git-1.6.0-1.1.mga8.src.rpm
Version: Cauldron => 8
Status: NEW => ASSIGNED

Comment 4 Len Lawrence 2023-03-15 11:15:59 CET
mageia8, x86_64

Ruby git was already installed.

Had a look at the CVEs but could not figure out how to reproduce the vulnerability and lacking any familiarity with GitHub or git had to make do with a single call to Gif.init to create a local repository in an empty directory.

$ ruby -W0 -rgit -e "Git.init"
That worked.  Emptied the directory afterwards and updated the packages.

Running the same command produced the same result.
It created a new folder .git in the current directory with contents:
.git
├── branches
├── config
├── description
├── HEAD
├── hooks
│   ├── applypatch-msg.sample
│   ├── commit-msg.sample
│   ├── fsmonitor-watchman.sample
│   ├── post-update.sample
│   ├── pre-applypatch.sample
│   ├── pre-commit.sample
│   ├── pre-merge-commit.sample
│   ├── prepare-commit-msg.sample
│   ├── pre-push.sample
│   ├── pre-rebase.sample
│   ├── pre-receive.sample
│   ├── push-to-checkout.sample
│   └── update.sample
├── info
│   └── exclude
├── objects
│   ├── info
│   └── pack
└── refs
    ├── heads
    └── tags

9 directories, 17 files

Giving this an OK for 64-bits but feel free to extend the test if you have some knowledge of git.

Whiteboard: (none) => MGA8-64-OK
CC: (none) => tarazed25

Comment 5 Thomas Andrews 2023-03-15 18:58:09 CET
Validating. Advisory in comment 3.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Dave Hodgins 2023-03-16 04:36:20 CET

Keywords: (none) => advisory
CC: (none) => davidwhodgins

Comment 6 Mageia Robot 2023-03-18 23:18:20 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2023-0097.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.