CVE-2023-25652
25.04.2023, 20:15
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (corresponding to the rejected hunk(s) from the given patch). A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid using `git apply` with `--reject` when applying patches from an untrusted source. Use `git apply --stat` to inspect a patch before applying; avoid applying one that create a conflict where a link corresponding to the `*.rej` file exists.
Vendor | Product | Version |
---|---|---|
git-scm | git | 𝑥 < 2.30.9 |
git-scm | git | 2.31.0 ≤ 𝑥 < 2.31.8 |
git-scm | git | 2.32.0 ≤ 𝑥 < 2.32.7 |
git-scm | git | 2.33.0 ≤ 𝑥 < 2.33.8 |
git-scm | git | 2.34.0 ≤ 𝑥 < 2.34.8 |
git-scm | git | 2.35.0 ≤ 𝑥 < 2.35.8 |
git-scm | git | 2.36.0 ≤ 𝑥 < 2.36.6 |
git-scm | git | 2.37.0 ≤ 𝑥 < 2.37.7 |
git-scm | git | 2.38.0 ≤ 𝑥 < 2.38.5 |
git-scm | git | 2.39.0 ≤ 𝑥 < 2.39.3 |
git-scm | git | 2.40.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References