CVE-2023-25652
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
25/04/2023
Last modified:
26/06/2024
Description
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (corresponding to the rejected hunk(s) from the given patch). A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid using `git apply` with `--reject` when applying patches from an untrusted source. Use `git apply --stat` to inspect a patch before applying; avoid applying one that create a conflict where a link corresponding to the `*.rej` file exists.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:* | 2.30.9 (excluding) | |
cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:* | 2.31.0 (including) | 2.31.8 (excluding) |
cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:* | 2.32.0 (including) | 2.32.7 (excluding) |
cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:* | 2.33.0 (including) | 2.33.8 (excluding) |
cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:* | 2.34.0 (including) | 2.34.8 (excluding) |
cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:* | 2.35.0 (including) | 2.35.8 (excluding) |
cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:* | 2.36.0 (including) | 2.36.6 (excluding) |
cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:* | 2.37.0 (including) | 2.37.7 (excluding) |
cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:* | 2.38.0 (including) | 2.38.5 (excluding) |
cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:* | 2.39.0 (including) | 2.39.3 (excluding) |
cpe:2.3:a:git-scm:git:2.40.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2023/04/25/2
- https://github.com/git/git/commit/18e2b1cfc80990719275d7b08e6e50f3e8cbc902
- https://github.com/git/git/commit/668f2d53613ac8fd373926ebe219f2c29112d93e
- https://github.com/git/git/security/advisories/GHSA-2hvf-7c8p-28fx
- https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BSXOGVVBJLYX26IAYX6PJSYQB36BREWH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/
- https://security.gentoo.org/glsa/202312-15