-
-
Notifications
You must be signed in to change notification settings - Fork 311
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
gix-path release #1582
gix-path release #1582
Conversation
@EliahKagan I jumped the gun and published the advisory before adding comments, so I am adding the comment here instead. |
Thanks! Seeing this, I have edited the "Affected versions" in the advisory metadata to change it from |
I've opened rustsec/advisory-db#2071 to create the corresponding RUSTSEC advisory. |
The GitHub Advisory Database global advisory for CVE-2024-45405 has been released. I've updated the PR rustsec/advisory-db#2071 (already updated with the CVE number) to include a reference to it. I've also opened github/advisory-database#4768 to fix the rendering/linkifying of a commit hash that is intended to be a hyperlink, which rendered as intended automatically in the repo-local GHSA but not in the global GHSA. (This would not render automatically in a RUSTSEC advisory either, but I anticipated that when submitting it, so nothing further has to be done in that PR for this rendering issue.) |
Unfortunately there were some problems revising the global CVE-2024-45405 advisory and the published version is now substantially broken. Merging github/advisory-database#4768 has, along with the one change I made there, also brought in a number of incorrect changes to parts of the advisory not edited in that PR. I have verified using this tool that there really is nothing in the PR itself that corresponds to these other changes. Applied changes, including the breakages, took effect on the published global advisory in github/advisory-database@58f1bbf. (Those changes also include adding a reference to the RUSTSEC advisory.) This appears to be due to different parsing or rendering rules applying before and after a PR is merged, and I have no idea how that happens, but it is something I've seen before in github/advisory-database#3290. However, in that older PR on an older advisory, a member of the GitHub security curation team was visibly involved in reviewing the advisory, and was therefore available to fix the problem. I don't know how to go about fixing it in this case. Presumably a manual PR with some syntax could fix it, but:
The undesirable changes include adding backslashes and newlines to code blocks. This includes commands in the PoC section. As they currently appear in the global advisory, those commands will fail to trigger the vulnerability even when it is present and all other steps have been followed correctly. The risk is low, since the vulnerability is itself low risk as described in the "Impact" section, but this could lead to unjustified confidence that a patched version is in use. For example, though this is not the only breakage, these are the commands that "Ren" should run, as still correctly shown in the repo-local advisory: $d = "$HOME\303\251e\AppData\Local\Programs\Git\etc"
mkdir $d
git config --file $d\gitconfig core.sshCommand calc.exe
icacls $HOME\303 /grant 'Renée:(RX)' /T This is what they have become in the global advisory since github/advisory-database#4768 was merged: $d = \"$HOME\\303\\251e\\AppData\\Local\\Programs\\Git\\etc\"
mkdir $d
git config --file $d\\gitconfig core.sshCommand calc.exe
icacls $HOME\\303 /grant 'Renée:(RX)' /T So the global advisory should be fixed in some way, but I don't know how. Edit: I've opened github/advisory-database#4777 for this. |
This comment was marked as duplicate.
This comment was marked as duplicate.
The formatting and content problems that had arisen in the the global CVE-2024-45405 advisory have been completely fixed (github/advisory-database#4777). |
In preparation for advisory.