Updated git packages fix security vulnerability
Publication date: 06 May 2023Modification date: 06 May 2023
Type: security
Affected Mageia releases : 8
CVE: CVE-2023-25652 , CVE-2023-25815 , CVE-2023-29007
Description
By feeding specially crafted input to 'git apply --reject', a path outside the working tree can be overwritten with partially controlled contents corresponding to the rejected hunk(s) from the given patch. (CVE-2023-25652). When Git is compiled with runtime prefix support and runs without translated messages, it still used the gettext machinery to display messages, which subsequently potentially looked for translated messages in unexpected places. This allowed for malicious placement of crafted messages (CVE-2023-25815). When renaming or deleting a section from a configuration file, certain malicious configuration values may be misinterpreted as the beginning of a new configuration section, leading to arbitrary configuration injection (CVE-2023-29007).
References
- https://bugs.mageia.org/show_bug.cgi?id=31856
- https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.30.9.txt
- https://lore.kernel.org/git/xmqqa5yv3n93.fsf@gitster.g/T/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25652
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25815
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29007
SRPMS
8/core
- git-2.30.9-1.mga8