Synopsis:          Important: git security update
Advisory ID:       SLSA-2023:3263-1
Issue Date:        2023-05-24
CVE Numbers:       CVE-2023-25652
                   CVE-2023-29007
--

Security Fix(es):

* git: by feeding specially crafted input to `git apply --reject`, a path
outside the working tree can be overwritten with partially controlled
contents (CVE-2023-25652)

* git: arbitrary configuration injection when renaming or deleting a
section from a configuration file (CVE-2023-29007)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
--

SL7
  x86_64
    git-1.8.3.1-25.el7_9.x86_64.rpm
    git-daemon-1.8.3.1-25.el7_9.x86_64.rpm
    git-debuginfo-1.8.3.1-25.el7_9.x86_64.rpm
    git-gnome-keyring-1.8.3.1-25.el7_9.x86_64.rpm
    git-svn-1.8.3.1-25.el7_9.x86_64.rpm
  noarch
    emacs-git-1.8.3.1-25.el7_9.noarch.rpm
    emacs-git-el-1.8.3.1-25.el7_9.noarch.rpm
    git-all-1.8.3.1-25.el7_9.noarch.rpm
    git-bzr-1.8.3.1-25.el7_9.noarch.rpm
    git-cvs-1.8.3.1-25.el7_9.noarch.rpm
    git-email-1.8.3.1-25.el7_9.noarch.rpm
    git-gui-1.8.3.1-25.el7_9.noarch.rpm
    git-hg-1.8.3.1-25.el7_9.noarch.rpm
    git-instaweb-1.8.3.1-25.el7_9.noarch.rpm
    git-p4-1.8.3.1-25.el7_9.noarch.rpm
    gitk-1.8.3.1-25.el7_9.noarch.rpm
    gitweb-1.8.3.1-25.el7_9.noarch.rpm
    perl-Git-1.8.3.1-25.el7_9.noarch.rpm
    perl-Git-SVN-1.8.3.1-25.el7_9.noarch.rpm

- Scientific Linux Development Team

SciLinux: SLSA-2023-3263-1 Important: git on SL7.x x86_64

git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (CVE-2023-25652) * git: arbit...

Summary

Important: git security update



Security Fixes

outside the working tree can be overwritten with partially controlled contents (CVE-2023-25652)
* git: arbitrary configuration injection when renaming or deleting a section from a configuration file (CVE-2023-29007)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE
SL7 x86_64 git-1.8.3.1-25.el7_9.x86_64.rpm git-daemon-1.8.3.1-25.el7_9.x86_64.rpm git-debuginfo-1.8.3.1-25.el7_9.x86_64.rpm git-gnome-keyring-1.8.3.1-25.el7_9.x86_64.rpm git-svn-1.8.3.1-25.el7_9.x86_64.rpm noarch emacs-git-1.8.3.1-25.el7_9.noarch.rpm emacs-git-el-1.8.3.1-25.el7_9.noarch.rpm git-all-1.8.3.1-25.el7_9.noarch.rpm git-bzr-1.8.3.1-25.el7_9.noarch.rpm git-cvs-1.8.3.1-25.el7_9.noarch.rpm git-email-1.8.3.1-25.el7_9.noarch.rpm git-gui-1.8.3.1-25.el7_9.noarch.rpm git-hg-1.8.3.1-25.el7_9.noarch.rpm git-instaweb-1.8.3.1-25.el7_9.noarch.rpm git-p4-1.8.3.1-25.el7_9.noarch.rpm gitk-1.8.3.1-25.el7_9.noarch.rpm gitweb-1.8.3.1-25.el7_9.noarch.rpm perl-Git-1.8.3.1-25.el7_9.noarch.rpm perl-Git-SVN-1.8.3.1-25.el7_9.noarch.rpm
- Scientific Linux Development Team

Severity
Advisory ID: SLSA-2023:3263-1
Issued Date: : 2023-05-24
CVE Numbers: CVE-2023-25652
CVE-2023-29007

Related News