{"id":"ALSA-2022:7129","summary":"Moderate: git-lfs security and bug fix update","details":"Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.\n\nSecurity Fix(es):\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)\n* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)\n* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)\n* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)\n* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* git-lfs needs to be rebuild with golang 1.17.7-1 or above","modified":"2026-01-30T02:05:18.101323Z","published":"2022-10-25T00:00:00Z","related":["CVE-2020-28851","CVE-2020-28852","CVE-2022-1705","CVE-2022-27664","CVE-2022-30630","CVE-2022-30632","CVE-2022-30635","CVE-2022-32148","CVE-2022-32189"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:7129"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-28851"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-28852"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1705"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27664"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30630"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30632"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30635"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32148"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32189"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1913333"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1913338"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2107371"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2107374"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2107383"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2107386"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2107388"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2113814"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2124669"},{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2022-7129.html"}],"affected":[{"package":{"name":"git-lfs","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/git-lfs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.13.3-3.el8_6"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:7129.json"}}],"schema_version":"1.7.3"}