Source: git
Version: 1:2.40.0-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: fixed -1 1:2.40.1-1

Hi,

The following vulnerabilities were published for git, while fixed in
unstable already (thus adding along as well the fixed version), it
will affect bookworm, and good if they are fixed before the bookworm
release.

CVE-2023-25652[0]:
| By feeding specially crafted input to `git apply --reject`, a
| path outside the working tree can be overwritten with partially
| controlled contents (corresponding to the rejected hunk(s) from
| the given patch).

CVE-2023-25815[1]:
| When Git is compiled with runtime prefix support and runs without
| translated messages, it still used the gettext machinery to
| display messages, which subsequently potentially looked for
| translated messages in unexpected places. This allowed for
| malicious placement of crafted messages.

CVE-2023-29007[2]:
| When renaming or deleting a section from a configuration file,
| certain malicious configuration values may be misinterpreted as
| the beginning of a new configuration section, leading to arbitrary
| configuration injection.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-25652
    https://www.cve.org/CVERecord?id=CVE-2023-25652
[1] https://security-tracker.debian.org/tracker/CVE-2023-25815
    https://www.cve.org/CVERecord?id=CVE-2023-25815
[2] https://security-tracker.debian.org/tracker/CVE-2023-29007
    https://www.cve.org/CVERecord?id=CVE-2023-29007
[3] https://lore.kernel.org/lkml/xmqqa5yv3n93.fsf@gitster.g/

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to