Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-25815 (GCVE-0-2023-25815)
Vulnerability from cvelistv5 – Published: 2023-04-25 19:51 – Updated: 2025-11-04 16:09| Vendor | Product | Version | |
|---|---|---|---|
| git-for-windows | git |
Affected:
< 2.40.1
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:09:59.699Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8"
},
{
"name": "https://github.com/msys2/MINGW-packages/pull/10461",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/msys2/MINGW-packages/pull/10461"
},
{
"name": "https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack"
},
{
"name": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1"
},
{
"name": "https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2023/04/25/2"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202312-15"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00009.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "git",
"vendor": "git-for-windows",
"versions": [
{
"status": "affected",
"version": "\u003c 2.40.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function\u0027s implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\\mingw64\\share\\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\\` (and since `C:\\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1.\n\nThis vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It does require local write access by the attacker, though, which makes this attack vector less likely. Version 2.40.1 contains a patch for this issue. Some workarounds are available. Do not work on a Windows machine with shared accounts, or alternatively create a `C:\\mingw64` folder and leave it empty. Users who have administrative rights may remove the permission to create folders in `C:\\`."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-134",
"description": "CWE-134: Use of Externally-Controlled Format String",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-26T10:05:59.527Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8"
},
{
"name": "https://github.com/msys2/MINGW-packages/pull/10461",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/msys2/MINGW-packages/pull/10461"
},
{
"name": "https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack",
"tags": [
"x_refsource_MISC"
],
"url": "https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack"
},
{
"name": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1"
},
{
"name": "https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html",
"tags": [
"x_refsource_MISC"
],
"url": "https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/04/25/2"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/"
},
{
"url": "https://security.gentoo.org/glsa/202312-15"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html"
}
],
"source": {
"advisory": "GHSA-9w66-8mq8-5vm8",
"discovery": "UNKNOWN"
},
"title": "Git looks for localized messages in the wrong place"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2023-25815",
"datePublished": "2023-04-25T19:51:38.433Z",
"dateReserved": "2023-02-15T16:34:48.773Z",
"dateUpdated": "2025-11-04T16:09:59.699Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2023-25815",
"date": "2026-05-19",
"epss": "0.00099",
"percentile": "0.27025"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:git_for_windows_project:git_for_windows:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.40.1\", \"matchCriteriaId\": \"E740B447-D96A-40C3-AFA9-9B058379E04D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function\u0027s implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\\\\mingw64\\\\share\\\\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\\\\` (and since `C:\\\\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1.\\n\\nThis vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It does require local write access by the attacker, though, which makes this attack vector less likely. Version 2.40.1 contains a patch for this issue. Some workarounds are available. Do not work on a Windows machine with shared accounts, or alternatively create a `C:\\\\mingw64` folder and leave it empty. Users who have administrative rights may remove the permission to create folders in `C:\\\\`.\"}, {\"lang\": \"es\", \"value\": \"En Git para Windows, la versi\\u00f3n de Git para Windows, no se env\\u00edan mensajes localizados con el instalador. Como consecuencia, se espera que Git no localice ning\\u00fan mensaje y omita la inicializaci\\u00f3n de gettext. Sin embargo, debido a un cambio en los paquetes MINGW, la inicializaci\\u00f3n impl\\u00edcita de la funci\\u00f3n `gettext()` ya no usa el prefijo de tiempo de ejecuci\\u00f3n sino que usa la ruta codificada `C:\\\\mingw64\\\\share\\\\locale` para buscar mensajes localizados. Y dado que cualquier usuario autenticado tiene permiso para crear carpetas en `C:\\\\` (y dado que `C:\\\\mingw64` normalmente no existe), es posible que los usuarios con pocos privilegios coloquen mensajes falsos en esa ubicaci\\u00f3n donde `git .exe` los recoger\\u00e1 en la versi\\u00f3n 2.40.1. Esta vulnerabilidad es relativamente dif\\u00edcil de explotar y requiere ingenier\\u00eda social. Por ejemplo, un mensaje leg\\u00edtimo al final de un clon podr\\u00eda modificarse maliciosamente para pedirle al usuario que dirija su navegador web a un sitio web malicioso, y el usuario podr\\u00eda pensar que el mensaje proviene de Git y es leg\\u00edtimo. Sin embargo, requiere acceso de escritura local por parte del atacante, lo que hace que este vector de ataque sea menos probable. La versi\\u00f3n 2.40.1 contiene un parche para este problema. Algunas soluciones est\\u00e1n disponibles. No trabaje en una m\\u00e1quina Windows con cuentas compartidas o, alternativamente, cree una carpeta `C:\\\\mingw64` y d\\u00e9jela vac\\u00eda. Los usuarios que tienen derechos administrativos pueden eliminar el permiso para crear carpetas en `C:\\\\`.\"}]",
"id": "CVE-2023-25815",
"lastModified": "2024-11-21T07:50:15.313",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L\", \"baseScore\": 3.3, \"baseSeverity\": \"LOW\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 2.5}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N\", \"baseScore\": 2.2, \"baseSeverity\": \"LOW\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 1.4}]}",
"published": "2023-04-25T20:15:09.997",
"references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2023/04/25/2\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Product\"]}, {\"url\": \"https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://github.com/msys2/MINGW-packages/pull/10461\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Product\"]}, {\"url\": \"https://security.gentoo.org/glsa/202312-15\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/04/25/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\"]}, {\"url\": \"https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://github.com/msys2/MINGW-packages/pull/10461\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\"]}, {\"url\": \"https://security.gentoo.org/glsa/202312-15\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}, {\"lang\": \"en\", \"value\": \"CWE-134\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-134\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-25815\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2023-04-25T20:15:09.997\",\"lastModified\":\"2025-11-04T17:15:35.647\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function\u0027s implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\\\\mingw64\\\\share\\\\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\\\\` (and since `C:\\\\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1.\\n\\nThis vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It does require local write access by the attacker, though, which makes this attack vector less likely. Version 2.40.1 contains a patch for this issue. Some workarounds are available. Do not work on a Windows machine with shared accounts, or alternatively create a `C:\\\\mingw64` folder and leave it empty. Users who have administrative rights may remove the permission to create folders in `C:\\\\`.\"},{\"lang\":\"es\",\"value\":\"En Git para Windows, la versi\u00f3n de Git para Windows, no se env\u00edan mensajes localizados con el instalador. Como consecuencia, se espera que Git no localice ning\u00fan mensaje y omita la inicializaci\u00f3n de gettext. Sin embargo, debido a un cambio en los paquetes MINGW, la inicializaci\u00f3n impl\u00edcita de la funci\u00f3n `gettext()` ya no usa el prefijo de tiempo de ejecuci\u00f3n sino que usa la ruta codificada `C:\\\\mingw64\\\\share\\\\locale` para buscar mensajes localizados. Y dado que cualquier usuario autenticado tiene permiso para crear carpetas en `C:\\\\` (y dado que `C:\\\\mingw64` normalmente no existe), es posible que los usuarios con pocos privilegios coloquen mensajes falsos en esa ubicaci\u00f3n donde `git .exe` los recoger\u00e1 en la versi\u00f3n 2.40.1. Esta vulnerabilidad es relativamente dif\u00edcil de explotar y requiere ingenier\u00eda social. Por ejemplo, un mensaje leg\u00edtimo al final de un clon podr\u00eda modificarse maliciosamente para pedirle al usuario que dirija su navegador web a un sitio web malicioso, y el usuario podr\u00eda pensar que el mensaje proviene de Git y es leg\u00edtimo. Sin embargo, requiere acceso de escritura local por parte del atacante, lo que hace que este vector de ataque sea menos probable. La versi\u00f3n 2.40.1 contiene un parche para este problema. Algunas soluciones est\u00e1n disponibles. No trabaje en una m\u00e1quina Windows con cuentas compartidas o, alternativamente, cree una carpeta `C:\\\\mingw64` y d\u00e9jela vac\u00eda. Los usuarios que tienen derechos administrativos pueden eliminar el permiso para crear carpetas en `C:\\\\`.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L\",\"baseScore\":3.3,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":0.8,\"impactScore\":2.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N\",\"baseScore\":2.2,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"},{\"lang\":\"en\",\"value\":\"CWE-134\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-134\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:git_for_windows_project:git_for_windows:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.40.1\",\"matchCriteriaId\":\"E740B447-D96A-40C3-AFA9-9B058379E04D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2023/04/25/2\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Product\"]},{\"url\":\"https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/msys2/MINGW-packages/pull/10461\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Product\"]},{\"url\":\"https://security.gentoo.org/glsa/202312-15\",\"source\":\"security-advisories@github.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/04/25/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/msys2/MINGW-packages/pull/10461\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/09/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"https://security.gentoo.org/glsa/202312-15\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTFR-2023-AVI-0465
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Microsoft. Elles permettent à un attaquant de provoquer une usurpation d'identité, une atteinte à la confidentialité des données, un déni de service, une exécution de code à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 13 | ||
| Microsoft | N/A | NuGet 6.4.1 | ||
| Microsoft | N/A | Microsoft Power Apps | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.0 | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.2 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.5 | ||
| Microsoft | N/A | Dynamics 365 pour Finance and Operations | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.6 | ||
| Microsoft | N/A | NuGet 6.2.3 | ||
| Microsoft | N/A | YARP 2.0 | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 23 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | ||
| Microsoft | N/A | NuGet 6.5.0 | ||
| Microsoft | N/A | Visual Studio Code | ||
| Microsoft | N/A | Microsoft Visual Studio 2013 Update 5 | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour systèmes 32 bits | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour 64 bits Systems | ||
| Microsoft | N/A | NuGet 6.6.0 | ||
| Microsoft | N/A | NuGet 6.3.2 | ||
| Microsoft | N/A | Microsoft Visual Studio 2015 Update 3 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.4 | ||
| Microsoft | N/A | NuGet 6.0.4 | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 12 | ||
| Microsoft | N/A | Sysinternals Suite |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 13",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "NuGet 6.4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Power Apps",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Dynamics 365 pour Finance and Operations",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "NuGet 6.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "YARP 2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "NuGet 6.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Visual Studio Code",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2013 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour 64 bits Systems",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "NuGet 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "NuGet 6.3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2015 Update 3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "NuGet 6.0.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 12",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Sysinternals Suite",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-24895",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24895"
},
{
"name": "CVE-2023-27910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27910"
},
{
"name": "CVE-2023-33144",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33144"
},
{
"name": "CVE-2023-33135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33135"
},
{
"name": "CVE-2023-25815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25815"
},
{
"name": "CVE-2023-33131",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33131"
},
{
"name": "CVE-2023-24897",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24897"
},
{
"name": "CVE-2023-24936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24936"
},
{
"name": "CVE-2023-29011",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29011"
},
{
"name": "CVE-2023-29012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29012"
},
{
"name": "CVE-2023-29007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29007"
},
{
"name": "CVE-2023-33128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33128"
},
{
"name": "CVE-2023-33141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33141"
},
{
"name": "CVE-2023-32031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32031"
},
{
"name": "CVE-2023-29337",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29337"
},
{
"name": "CVE-2023-33133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33133"
},
{
"name": "CVE-2023-27911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27911"
},
{
"name": "CVE-2023-33146",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33146"
},
{
"name": "CVE-2023-32032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32032"
},
{
"name": "CVE-2023-27909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27909"
},
{
"name": "CVE-2023-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33139"
},
{
"name": "CVE-2023-29331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29331"
},
{
"name": "CVE-2023-25652",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25652"
},
{
"name": "CVE-2023-29353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29353"
},
{
"name": "CVE-2023-28310",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28310"
},
{
"name": "CVE-2023-32029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32029"
},
{
"name": "CVE-2023-24896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24896"
},
{
"name": "CVE-2023-32024",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32024"
},
{
"name": "CVE-2023-33126",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33126"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24895 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24895"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-28310 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28310"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-32029 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32029"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29331 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29331"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29011 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29011"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-27911 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27911"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33131 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33131"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29353 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29353"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24896 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24896"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-32032 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32032"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33135 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33135"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29012 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29012"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33139 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33139"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-27910 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27910"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24897 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24897"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29337 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29337"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33146 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33146"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-25815 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-25815"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33128 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33128"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33126 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33126"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-32024 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32024"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33141 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33141"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29007 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29007"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-25652 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-25652"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-27909 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27909"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33144 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33144"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33133 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33133"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24936 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24936"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-32031 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32031"
}
],
"reference": "CERTFR-2023-AVI-0465",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-06-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Microsoft\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une usurpation d\u0027identit\u00e9, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, un d\u00e9ni de service, une ex\u00e9cution de code \u00e0\ndistance et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2023-AVI-0465
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Microsoft. Elles permettent à un attaquant de provoquer une usurpation d'identité, une atteinte à la confidentialité des données, un déni de service, une exécution de code à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 13 | ||
| Microsoft | N/A | NuGet 6.4.1 | ||
| Microsoft | N/A | Microsoft Power Apps | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.0 | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.2 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.5 | ||
| Microsoft | N/A | Dynamics 365 pour Finance and Operations | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.6 | ||
| Microsoft | N/A | NuGet 6.2.3 | ||
| Microsoft | N/A | YARP 2.0 | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 23 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | ||
| Microsoft | N/A | NuGet 6.5.0 | ||
| Microsoft | N/A | Visual Studio Code | ||
| Microsoft | N/A | Microsoft Visual Studio 2013 Update 5 | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour systèmes 32 bits | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour 64 bits Systems | ||
| Microsoft | N/A | NuGet 6.6.0 | ||
| Microsoft | N/A | NuGet 6.3.2 | ||
| Microsoft | N/A | Microsoft Visual Studio 2015 Update 3 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.4 | ||
| Microsoft | N/A | NuGet 6.0.4 | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 12 | ||
| Microsoft | N/A | Sysinternals Suite |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 13",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "NuGet 6.4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Power Apps",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Dynamics 365 pour Finance and Operations",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "NuGet 6.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "YARP 2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "NuGet 6.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Visual Studio Code",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2013 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour 64 bits Systems",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "NuGet 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "NuGet 6.3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2015 Update 3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "NuGet 6.0.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 12",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Sysinternals Suite",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-24895",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24895"
},
{
"name": "CVE-2023-27910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27910"
},
{
"name": "CVE-2023-33144",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33144"
},
{
"name": "CVE-2023-33135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33135"
},
{
"name": "CVE-2023-25815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25815"
},
{
"name": "CVE-2023-33131",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33131"
},
{
"name": "CVE-2023-24897",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24897"
},
{
"name": "CVE-2023-24936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24936"
},
{
"name": "CVE-2023-29011",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29011"
},
{
"name": "CVE-2023-29012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29012"
},
{
"name": "CVE-2023-29007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29007"
},
{
"name": "CVE-2023-33128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33128"
},
{
"name": "CVE-2023-33141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33141"
},
{
"name": "CVE-2023-32031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32031"
},
{
"name": "CVE-2023-29337",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29337"
},
{
"name": "CVE-2023-33133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33133"
},
{
"name": "CVE-2023-27911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27911"
},
{
"name": "CVE-2023-33146",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33146"
},
{
"name": "CVE-2023-32032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32032"
},
{
"name": "CVE-2023-27909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27909"
},
{
"name": "CVE-2023-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33139"
},
{
"name": "CVE-2023-29331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29331"
},
{
"name": "CVE-2023-25652",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25652"
},
{
"name": "CVE-2023-29353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29353"
},
{
"name": "CVE-2023-28310",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28310"
},
{
"name": "CVE-2023-32029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32029"
},
{
"name": "CVE-2023-24896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24896"
},
{
"name": "CVE-2023-32024",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32024"
},
{
"name": "CVE-2023-33126",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33126"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24895 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24895"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-28310 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28310"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-32029 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32029"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29331 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29331"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29011 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29011"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-27911 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27911"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33131 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33131"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29353 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29353"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24896 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24896"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-32032 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32032"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33135 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33135"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29012 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29012"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33139 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33139"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-27910 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27910"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24897 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24897"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29337 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29337"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33146 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33146"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-25815 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-25815"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33128 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33128"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33126 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33126"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-32024 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32024"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33141 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33141"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29007 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29007"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-25652 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-25652"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-27909 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27909"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33144 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33144"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33133 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33133"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24936 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24936"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-32031 du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32031"
}
],
"reference": "CERTFR-2023-AVI-0465",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-06-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Microsoft\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une usurpation d\u0027identit\u00e9, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, un d\u00e9ni de service, une ex\u00e9cution de code \u00e0\ndistance et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 13 juin 2023",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
alsa-2023:3245
Vulnerability from osv_almalinux
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Security Fix(es):
- git: by feeding specially crafted input to
git apply --reject, a path outside the working tree can be overwritten with partially controlled contents (CVE-2023-25652) - git: arbitrary configuration injection when renaming or deleting a section from a configuration file (CVE-2023-29007)
- git: data exfiltration with maliciously crafted repository (CVE-2023-22490)
- git: git apply: a path outside the working tree can be overwritten with crafted input (CVE-2023-23946)
- git: malicious placement of crafted messages when git was compiled with runtime prefix (CVE-2023-25815)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "git"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el9_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "git-all"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el9_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "git-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el9_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "git-core-doc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el9_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "git-credential-libsecret"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el9_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "git-daemon"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el9_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "git-email"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el9_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "git-gui"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el9_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "git-instaweb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el9_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "git-subtree"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el9_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "git-svn"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el9_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "gitk"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el9_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "gitweb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el9_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "perl-Git"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el9_2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "perl-Git-SVN"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el9_2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.\n\nSecurity Fix(es):\n\n* git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (CVE-2023-25652)\n* git: arbitrary configuration injection when renaming or deleting a section from a configuration file (CVE-2023-29007)\n* git: data exfiltration with maliciously crafted repository (CVE-2023-22490)\n* git: git apply: a path outside the working tree can be overwritten with crafted input (CVE-2023-23946)\n* git: malicious placement of crafted messages when git was compiled with runtime prefix (CVE-2023-25815)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2023:3245",
"modified": "2023-05-23T09:20:56Z",
"published": "2023-05-22T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2023:3245"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-22490"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-23946"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-25652"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-25815"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-29007"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2168160"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2168161"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2188333"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2188337"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2188338"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2023-3245.html"
}
],
"related": [
"CVE-2023-25652",
"CVE-2023-29007",
"CVE-2023-22490",
"CVE-2023-23946",
"CVE-2023-25815"
],
"summary": "Important: git security update"
}
alsa-2023:3246
Vulnerability from osv_almalinux
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Security Fix(es):
- git: by feeding specially crafted input to
git apply --reject, a path outside the working tree can be overwritten with partially controlled contents (CVE-2023-25652) - git: arbitrary configuration injection when renaming or deleting a section from a configuration file (CVE-2023-29007)
- git: data exfiltration with maliciously crafted repository (CVE-2023-22490)
- git: git apply: a path outside the working tree can be overwritten with crafted input (CVE-2023-23946)
- git: malicious placement of crafted messages when git was compiled with runtime prefix (CVE-2023-25815)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "git"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el8_8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "git-all"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el8_8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "git-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el8_8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "git-core-doc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el8_8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "git-credential-libsecret"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el8_8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "git-daemon"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el8_8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "git-email"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el8_8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "git-gui"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el8_8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "git-instaweb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el8_8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "git-subtree"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el8_8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "git-svn"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el8_8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gitk"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el8_8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gitweb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el8_8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "perl-Git"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el8_8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "perl-Git-SVN"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.39.3-1.el8_8"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.\n\nSecurity Fix(es):\n\n* git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (CVE-2023-25652)\n* git: arbitrary configuration injection when renaming or deleting a section from a configuration file (CVE-2023-29007)\n* git: data exfiltration with maliciously crafted repository (CVE-2023-22490)\n* git: git apply: a path outside the working tree can be overwritten with crafted input (CVE-2023-23946)\n* git: malicious placement of crafted messages when git was compiled with runtime prefix (CVE-2023-25815)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2023:3246",
"modified": "2023-05-23T09:30:23Z",
"published": "2023-05-22T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2023:3246"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-22490"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-23946"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-25652"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-25815"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-29007"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2168160"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2168161"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2188333"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2188337"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2188338"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2023-3246.html"
}
],
"related": [
"CVE-2023-25652",
"CVE-2023-29007",
"CVE-2023-22490",
"CVE-2023-23946",
"CVE-2023-25815"
],
"summary": "Important: git security update"
}
BDU:2023-06650
Vulnerability from fstec - Published: 13.06.2023{
"CVSS 2.0": "AV:L/AC:H/Au:S/C:N/I:P/A:P",
"CVSS 3.0": "AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "TO708",
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": "TO708 \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Visual Studio 2019 16.11.30",
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., Novell Inc., Microsoft Corp, Fedora Project, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\", Linus Torvalds, Junio Hamano",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "6 (Red Hat Enterprise Linux), 7 (Red Hat Enterprise Linux), 12 SP3 (Suse Linux Enterprise Desktop), 12 SP4 (Suse Linux Enterprise Desktop), 12 SP2 (SUSE Linux Enterprise Server for SAP Applications), 12 SP3 (SUSE Linux Enterprise Server for SAP Applications), 12 SP3 (Suse Linux Enterprise Server), 12 SP4 (Suse Linux Enterprise Server), 8 (Red Hat Enterprise Linux), 12 SP2-ESPOS (Suse Linux Enterprise Server), 12-LTSS (Suse Linux Enterprise Server), 12 SP1 (SUSE Linux Enterprise Server for SAP Applications), 15 (SUSE Linux Enterprise Server for SAP Applications), 12 SP1-LTSS (Suse Linux Enterprise Server), 12 SP2-LTSS (Suse Linux Enterprise Server), 12 SP3-LTSS (Suse Linux Enterprise Server), 12 SP3-BCL (Suse Linux Enterprise Server), 12 SP3-ESPOS (Suse Linux Enterprise Server), 12 SP2 (Suse Linux Enterprise Server), 15-LTSS (Suse Linux Enterprise Server), 12 SP1 (Suse Linux Enterprise Desktop), 12 SP1 (Suse Linux Enterprise Server), 12 (SUSE Linux Enterprise Server for SAP Applications), 12 (Suse Linux Enterprise Desktop), 12 SP4-ESPOS (Suse Linux Enterprise Server), 15 SP1-BCL (Suse Linux Enterprise Server), 15 SP1 (Suse Linux Enterprise Server), 12 (Suse Linux Enterprise Server), 8.1 Update Services for SAP Solutions (Red Hat Enterprise Linux), 8.4 Extended Update Support (Red Hat Enterprise Linux), 17.0 (Microsoft Visual Studio 2022), 15 SP2 (Suse Linux Enterprise Server), 36 (Fedora), 15 SP2 (Suse Linux Enterprise Desktop), 15 (Suse Linux Enterprise Server), 15 SP2-BCL (Suse Linux Enterprise Server), 9 (Red Hat Enterprise Linux), 15 SP1 (Suse Linux Enterprise Desktop), 15 (Suse Linux Enterprise Desktop), 17.2 (Microsoft Visual Studio 2022), 37 (Fedora), 8.6 Extended Update Support (Red Hat Enterprise Linux), 17.4 (Microsoft Visual Studio 2022), 9.0 Extended Update Support (Red Hat Enterprise Linux), 8.2 Advanced Update Support (Red Hat Enterprise Linux), 38 (Fedora), 17.6 (Microsoft Visual Studio 2022), \u0434\u043e 2.8 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), \u0434\u043e 2.40.1 (Git), \u043e\u0442 15.0 \u0434\u043e 15.8 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Microsoft Visual Studio 2017), \u043e\u0442 16.0 \u0434\u043e 16.10 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Microsoft Visual Studio 2019)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Git \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.40.1 \u0438\u043b\u0438 \u0432\u044b\u0448\u0435\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439: \n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Microsoft Corp.:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-22743\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2023-25815\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2023-25815.html\n\n\u0414\u043b\u044f Fedora:\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f git \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 1:2.40.1-1",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "13.06.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "11.01.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "13.10.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-06650",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-25815",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Suse Linux Enterprise Desktop, SUSE Linux Enterprise Server for SAP Applications, Suse Linux Enterprise Server, Microsoft Visual Studio 2022, Fedora, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), Git, Microsoft Visual Studio 2017, Microsoft Visual Studio 2019",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 6 , Red Hat Inc. Red Hat Enterprise Linux 7 , Novell Inc. Suse Linux Enterprise Desktop 12 SP3 , Novell Inc. Suse Linux Enterprise Desktop 12 SP4 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP2 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP3 , Novell Inc. Suse Linux Enterprise Server 12 SP3 , Novell Inc. Suse Linux Enterprise Server 12 SP4 , Red Hat Inc. Red Hat Enterprise Linux 8 , Novell Inc. Suse Linux Enterprise Server 12 SP2-ESPOS , Novell Inc. Suse Linux Enterprise Server 12-LTSS , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP1 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 , Novell Inc. Suse Linux Enterprise Server 12 SP1-LTSS , Novell Inc. Suse Linux Enterprise Server 12 SP2-LTSS , Novell Inc. Suse Linux Enterprise Server 12 SP3-LTSS , Novell Inc. Suse Linux Enterprise Server 12 SP3-BCL , Novell Inc. Suse Linux Enterprise Server 12 SP3-ESPOS , Novell Inc. Suse Linux Enterprise Server 12 SP2 , Novell Inc. Suse Linux Enterprise Server 15-LTSS , Novell Inc. Suse Linux Enterprise Desktop 12 SP1 , Novell Inc. Suse Linux Enterprise Server 12 SP1 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 , Novell Inc. Suse Linux Enterprise Desktop 12 , Novell Inc. Suse Linux Enterprise Server 12 SP4-ESPOS , Novell Inc. Suse Linux Enterprise Server 15 SP1-BCL , Novell Inc. Suse Linux Enterprise Server 15 SP1 , Novell Inc. Suse Linux Enterprise Server 12 , Red Hat Inc. Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions , Red Hat Inc. Red Hat Enterprise Linux 8.4 Extended Update Support , Novell Inc. Suse Linux Enterprise Server 15 SP2 , Fedora Project Fedora 36 , Novell Inc. Suse Linux Enterprise Desktop 15 SP2 , Novell Inc. Suse Linux Enterprise Server 15 , Novell Inc. Suse Linux Enterprise Server 15 SP2-BCL , Red Hat Inc. Red Hat Enterprise Linux 9 , Novell Inc. Suse Linux Enterprise Desktop 15 SP1 , Novell Inc. Suse Linux Enterprise Desktop 15 , Fedora Project Fedora 37 , Red Hat Inc. Red Hat Enterprise Linux 8.6 Extended Update Support , Red Hat Inc. Red Hat Enterprise Linux 9.0 Extended Update Support , Red Hat Inc. Red Hat Enterprise Linux 8.2 Advanced Update Support , Fedora Project Fedora 38 , \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.8 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 gettext() \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0432\u0435\u0440\u0441\u0438\u0439 Git \u0434\u043b\u044f Windows, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0440\u0430\u0437\u043c\u0435\u0449\u0430\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0432\u0435\u0440\u043d\u043e\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0438\u043c\u0435\u043d\u0438 \u043f\u0443\u0442\u0438 \u043a \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0443 \u0441 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c (\u00ab\u041e\u0431\u0445\u043e\u0434 \u043f\u0443\u0442\u0438\u00bb) (CWE-22)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 gettext() \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0432\u0435\u0440\u0441\u0438\u0439 Git \u0434\u043b\u044f Windows \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0432\u0435\u0440\u043d\u044b\u043c \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435\u043c \u0438\u043c\u0435\u043d\u0438 \u043f\u0443\u0442\u0438 \u043a \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0443 \u0441 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0440\u0430\u0437\u043c\u0435\u0449\u0430\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-25815\nhttps://www.suse.com/security/cve/CVE-2023-25815.html\nhttps://access.redhat.com/security/cve/cve-2023-25815\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.8/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-22",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 2,4)\n\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 3,3)"
}
FKIE_CVE-2023-25815
Vulnerability from fkie_nvd - Published: 2023-04-25 20:15 - Updated: 2025-11-04 17:152.2 (Low) - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | http://www.openwall.com/lists/oss-security/2023/04/25/2 | Mailing List, Third Party Advisory | |
| security-advisories@github.com | https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack | Product | |
| security-advisories@github.com | https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1 | Release Notes | |
| security-advisories@github.com | https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8 | Vendor Advisory | |
| security-advisories@github.com | https://github.com/msys2/MINGW-packages/pull/10461 | Issue Tracking, Patch | |
| security-advisories@github.com | https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html | ||
| security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/ | Mailing List, Third Party Advisory | |
| security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/ | ||
| security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/ | Mailing List, Third Party Advisory | |
| security-advisories@github.com | https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html | Product | |
| security-advisories@github.com | https://security.gentoo.org/glsa/202312-15 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2023/04/25/2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack | Product | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1 | Release Notes | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/msys2/MINGW-packages/pull/10461 | Issue Tracking, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/09/msg00009.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/ | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/ | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html | Product | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202312-15 |
| Vendor | Product | Version | |
|---|---|---|---|
| git_for_windows_project | git_for_windows | * | |
| fedoraproject | fedora | 37 | |
| fedoraproject | fedora | 38 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:git_for_windows_project:git_for_windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E740B447-D96A-40C3-AFA9-9B058379E04D",
"versionEndExcluding": "2.40.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function\u0027s implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\\mingw64\\share\\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\\` (and since `C:\\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1.\n\nThis vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It does require local write access by the attacker, though, which makes this attack vector less likely. Version 2.40.1 contains a patch for this issue. Some workarounds are available. Do not work on a Windows machine with shared accounts, or alternatively create a `C:\\mingw64` folder and leave it empty. Users who have administrative rights may remove the permission to create folders in `C:\\`."
},
{
"lang": "es",
"value": "En Git para Windows, la versi\u00f3n de Git para Windows, no se env\u00edan mensajes localizados con el instalador. Como consecuencia, se espera que Git no localice ning\u00fan mensaje y omita la inicializaci\u00f3n de gettext. Sin embargo, debido a un cambio en los paquetes MINGW, la inicializaci\u00f3n impl\u00edcita de la funci\u00f3n `gettext()` ya no usa el prefijo de tiempo de ejecuci\u00f3n sino que usa la ruta codificada `C:\\mingw64\\share\\locale` para buscar mensajes localizados. Y dado que cualquier usuario autenticado tiene permiso para crear carpetas en `C:\\` (y dado que `C:\\mingw64` normalmente no existe), es posible que los usuarios con pocos privilegios coloquen mensajes falsos en esa ubicaci\u00f3n donde `git .exe` los recoger\u00e1 en la versi\u00f3n 2.40.1. Esta vulnerabilidad es relativamente dif\u00edcil de explotar y requiere ingenier\u00eda social. Por ejemplo, un mensaje leg\u00edtimo al final de un clon podr\u00eda modificarse maliciosamente para pedirle al usuario que dirija su navegador web a un sitio web malicioso, y el usuario podr\u00eda pensar que el mensaje proviene de Git y es leg\u00edtimo. Sin embargo, requiere acceso de escritura local por parte del atacante, lo que hace que este vector de ataque sea menos probable. La versi\u00f3n 2.40.1 contiene un parche para este problema. Algunas soluciones est\u00e1n disponibles. No trabaje en una m\u00e1quina Windows con cuentas compartidas o, alternativamente, cree una carpeta `C:\\mingw64` y d\u00e9jela vac\u00eda. Los usuarios que tienen derechos administrativos pueden eliminar el permiso para crear carpetas en `C:\\`."
}
],
"id": "CVE-2023-25815",
"lastModified": "2025-11-04T17:15:35.647",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 2.5,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.2,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-04-25T20:15:09.997",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/04/25/2"
},
{
"source": "security-advisories@github.com",
"tags": [
"Product"
],
"url": "https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/msys2/MINGW-packages/pull/10461"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Product"
],
"url": "https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html"
},
{
"source": "security-advisories@github.com",
"url": "https://security.gentoo.org/glsa/202312-15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/04/25/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/msys2/MINGW-packages/pull/10461"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/202312-15"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
},
{
"lang": "en",
"value": "CWE-134"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-134"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2023-25815
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-25815",
"id": "GSD-2023-25815"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-25815"
],
"details": "In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function\u0027s implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\\mingw64\\share\\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\\` (and since `C:\\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1.\n\nThis vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It does require local write access by the attacker, though, which makes this attack vector less likely. Version 2.40.1 contains a patch for this issue. Some workarounds are available. Do not work on a Windows machine with shared accounts, or alternatively create a `C:\\mingw64` folder and leave it empty. Users who have administrative rights may remove the permission to create folders in `C:\\`.",
"id": "GSD-2023-25815",
"modified": "2023-12-13T01:20:40.806585Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2023-25815",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "git",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "\u003c 2.40.1"
}
]
}
}
]
},
"vendor_name": "git-for-windows"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function\u0027s implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\\mingw64\\share\\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\\` (and since `C:\\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1.\n\nThis vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It does require local write access by the attacker, though, which makes this attack vector less likely. Version 2.40.1 contains a patch for this issue. Some workarounds are available. Do not work on a Windows machine with shared accounts, or alternatively create a `C:\\mingw64` folder and leave it empty. Users who have administrative rights may remove the permission to create folders in `C:\\`."
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-22",
"lang": "eng",
"value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
}
]
},
{
"description": [
{
"cweId": "CWE-134",
"lang": "eng",
"value": "CWE-134: Use of Externally-Controlled Format String"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8",
"refsource": "MISC",
"url": "https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8"
},
{
"name": "https://github.com/msys2/MINGW-packages/pull/10461",
"refsource": "MISC",
"url": "https://github.com/msys2/MINGW-packages/pull/10461"
},
{
"name": "https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack",
"refsource": "MISC",
"url": "https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack"
},
{
"name": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1",
"refsource": "MISC",
"url": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1"
},
{
"name": "https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html",
"refsource": "MISC",
"url": "https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html"
},
{
"name": "http://www.openwall.com/lists/oss-security/2023/04/25/2",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2023/04/25/2"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/"
},
{
"name": "https://security.gentoo.org/glsa/202312-15",
"refsource": "MISC",
"url": "https://security.gentoo.org/glsa/202312-15"
}
]
},
"source": {
"advisory": "GHSA-9w66-8mq8-5vm8",
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:git_for_windows_project:git_for_windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E740B447-D96A-40C3-AFA9-9B058379E04D",
"versionEndExcluding": "2.40.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function\u0027s implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\\mingw64\\share\\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\\` (and since `C:\\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1.\n\nThis vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It does require local write access by the attacker, though, which makes this attack vector less likely. Version 2.40.1 contains a patch for this issue. Some workarounds are available. Do not work on a Windows machine with shared accounts, or alternatively create a `C:\\mingw64` folder and leave it empty. Users who have administrative rights may remove the permission to create folders in `C:\\`."
}
],
"id": "CVE-2023-25815",
"lastModified": "2023-12-27T10:15:38.557",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.2,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 2.5,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2023-04-25T20:15:09.997",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/04/25/2"
},
{
"source": "security-advisories@github.com",
"tags": [
"Product"
],
"url": "https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/msys2/MINGW-packages/pull/10461"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Product"
],
"url": "https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html"
},
{
"source": "security-advisories@github.com",
"url": "https://security.gentoo.org/glsa/202312-15"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-134"
},
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-134"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
}
}
}
}
OPENSUSE-SU-2024:12889-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:git-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-arch-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-arch-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-arch-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-arch-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-core-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-core-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-core-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-core-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-cvs-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-cvs-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-cvs-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-cvs-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-daemon-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-daemon-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-daemon-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-daemon-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-doc-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-doc-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-doc-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-doc-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-email-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-email-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-email-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-email-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-gui-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-gui-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-gui-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-gui-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-p4-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-p4-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-p4-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-p4-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-svn-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-svn-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-svn-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-svn-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-web-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-web-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-web-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-web-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gitk-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gitk-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gitk-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gitk-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:perl-Git-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:perl-Git-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:perl-Git-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:perl-Git-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:git-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-arch-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-arch-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-arch-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-arch-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-core-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-core-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-core-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-core-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-cvs-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-cvs-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-cvs-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-cvs-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-daemon-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-daemon-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-daemon-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-daemon-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-doc-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-doc-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-doc-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-doc-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-email-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-email-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-email-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-email-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-gui-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-gui-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-gui-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-gui-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-p4-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-p4-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-p4-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-p4-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-svn-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-svn-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-svn-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-svn-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-web-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-web-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-web-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-web-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gitk-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gitk-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gitk-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gitk-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:perl-Git-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:perl-Git-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:perl-Git-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:perl-Git-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:git-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-arch-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-arch-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-arch-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-arch-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-core-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-core-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-core-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-core-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-cvs-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-cvs-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-cvs-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-cvs-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-daemon-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-daemon-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-daemon-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-daemon-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-doc-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-doc-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-doc-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-doc-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-email-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-email-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-email-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-email-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-gui-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-gui-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-gui-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-gui-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-p4-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-p4-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-p4-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-p4-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-svn-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-svn-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-svn-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-svn-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-web-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-web-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-web-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:git-web-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gitk-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gitk-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gitk-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gitk-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:perl-Git-2.40.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:perl-Git-2.40.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:perl-Git-2.40.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:perl-Git-2.40.1-1.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2023-25652/ | self |
| https://www.suse.com/security/cve/CVE-2023-25815/ | self |
| https://www.suse.com/security/cve/CVE-2023-29007/ | self |
| https://www.suse.com/security/cve/CVE-2023-25652 | external |
| https://bugzilla.suse.com/1210686 | external |
| https://www.suse.com/security/cve/CVE-2023-25815 | external |
| https://bugzilla.suse.com/1210686 | external |
| https://www.suse.com/security/cve/CVE-2023-29007 | external |
| https://bugzilla.suse.com/1210686 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "git-2.40.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the git-2.40.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12889",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12889-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-25652 page",
"url": "https://www.suse.com/security/cve/CVE-2023-25652/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-25815 page",
"url": "https://www.suse.com/security/cve/CVE-2023-25815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-29007 page",
"url": "https://www.suse.com/security/cve/CVE-2023-29007/"
}
],
"title": "git-2.40.1-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12889-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "git-2.40.1-1.1.aarch64",
"product": {
"name": "git-2.40.1-1.1.aarch64",
"product_id": "git-2.40.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "git-arch-2.40.1-1.1.aarch64",
"product": {
"name": "git-arch-2.40.1-1.1.aarch64",
"product_id": "git-arch-2.40.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "git-core-2.40.1-1.1.aarch64",
"product": {
"name": "git-core-2.40.1-1.1.aarch64",
"product_id": "git-core-2.40.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "git-credential-gnome-keyring-2.40.1-1.1.aarch64",
"product": {
"name": "git-credential-gnome-keyring-2.40.1-1.1.aarch64",
"product_id": "git-credential-gnome-keyring-2.40.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "git-credential-libsecret-2.40.1-1.1.aarch64",
"product": {
"name": "git-credential-libsecret-2.40.1-1.1.aarch64",
"product_id": "git-credential-libsecret-2.40.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "git-cvs-2.40.1-1.1.aarch64",
"product": {
"name": "git-cvs-2.40.1-1.1.aarch64",
"product_id": "git-cvs-2.40.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "git-daemon-2.40.1-1.1.aarch64",
"product": {
"name": "git-daemon-2.40.1-1.1.aarch64",
"product_id": "git-daemon-2.40.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "git-doc-2.40.1-1.1.aarch64",
"product": {
"name": "git-doc-2.40.1-1.1.aarch64",
"product_id": "git-doc-2.40.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "git-email-2.40.1-1.1.aarch64",
"product": {
"name": "git-email-2.40.1-1.1.aarch64",
"product_id": "git-email-2.40.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "git-gui-2.40.1-1.1.aarch64",
"product": {
"name": "git-gui-2.40.1-1.1.aarch64",
"product_id": "git-gui-2.40.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "git-p4-2.40.1-1.1.aarch64",
"product": {
"name": "git-p4-2.40.1-1.1.aarch64",
"product_id": "git-p4-2.40.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "git-svn-2.40.1-1.1.aarch64",
"product": {
"name": "git-svn-2.40.1-1.1.aarch64",
"product_id": "git-svn-2.40.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "git-web-2.40.1-1.1.aarch64",
"product": {
"name": "git-web-2.40.1-1.1.aarch64",
"product_id": "git-web-2.40.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "gitk-2.40.1-1.1.aarch64",
"product": {
"name": "gitk-2.40.1-1.1.aarch64",
"product_id": "gitk-2.40.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "perl-Git-2.40.1-1.1.aarch64",
"product": {
"name": "perl-Git-2.40.1-1.1.aarch64",
"product_id": "perl-Git-2.40.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "git-2.40.1-1.1.ppc64le",
"product": {
"name": "git-2.40.1-1.1.ppc64le",
"product_id": "git-2.40.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "git-arch-2.40.1-1.1.ppc64le",
"product": {
"name": "git-arch-2.40.1-1.1.ppc64le",
"product_id": "git-arch-2.40.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "git-core-2.40.1-1.1.ppc64le",
"product": {
"name": "git-core-2.40.1-1.1.ppc64le",
"product_id": "git-core-2.40.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "git-credential-gnome-keyring-2.40.1-1.1.ppc64le",
"product": {
"name": "git-credential-gnome-keyring-2.40.1-1.1.ppc64le",
"product_id": "git-credential-gnome-keyring-2.40.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "git-credential-libsecret-2.40.1-1.1.ppc64le",
"product": {
"name": "git-credential-libsecret-2.40.1-1.1.ppc64le",
"product_id": "git-credential-libsecret-2.40.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "git-cvs-2.40.1-1.1.ppc64le",
"product": {
"name": "git-cvs-2.40.1-1.1.ppc64le",
"product_id": "git-cvs-2.40.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "git-daemon-2.40.1-1.1.ppc64le",
"product": {
"name": "git-daemon-2.40.1-1.1.ppc64le",
"product_id": "git-daemon-2.40.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "git-doc-2.40.1-1.1.ppc64le",
"product": {
"name": "git-doc-2.40.1-1.1.ppc64le",
"product_id": "git-doc-2.40.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "git-email-2.40.1-1.1.ppc64le",
"product": {
"name": "git-email-2.40.1-1.1.ppc64le",
"product_id": "git-email-2.40.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "git-gui-2.40.1-1.1.ppc64le",
"product": {
"name": "git-gui-2.40.1-1.1.ppc64le",
"product_id": "git-gui-2.40.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "git-p4-2.40.1-1.1.ppc64le",
"product": {
"name": "git-p4-2.40.1-1.1.ppc64le",
"product_id": "git-p4-2.40.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "git-svn-2.40.1-1.1.ppc64le",
"product": {
"name": "git-svn-2.40.1-1.1.ppc64le",
"product_id": "git-svn-2.40.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "git-web-2.40.1-1.1.ppc64le",
"product": {
"name": "git-web-2.40.1-1.1.ppc64le",
"product_id": "git-web-2.40.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gitk-2.40.1-1.1.ppc64le",
"product": {
"name": "gitk-2.40.1-1.1.ppc64le",
"product_id": "gitk-2.40.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-Git-2.40.1-1.1.ppc64le",
"product": {
"name": "perl-Git-2.40.1-1.1.ppc64le",
"product_id": "perl-Git-2.40.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "git-2.40.1-1.1.s390x",
"product": {
"name": "git-2.40.1-1.1.s390x",
"product_id": "git-2.40.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "git-arch-2.40.1-1.1.s390x",
"product": {
"name": "git-arch-2.40.1-1.1.s390x",
"product_id": "git-arch-2.40.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "git-core-2.40.1-1.1.s390x",
"product": {
"name": "git-core-2.40.1-1.1.s390x",
"product_id": "git-core-2.40.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "git-credential-gnome-keyring-2.40.1-1.1.s390x",
"product": {
"name": "git-credential-gnome-keyring-2.40.1-1.1.s390x",
"product_id": "git-credential-gnome-keyring-2.40.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "git-credential-libsecret-2.40.1-1.1.s390x",
"product": {
"name": "git-credential-libsecret-2.40.1-1.1.s390x",
"product_id": "git-credential-libsecret-2.40.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "git-cvs-2.40.1-1.1.s390x",
"product": {
"name": "git-cvs-2.40.1-1.1.s390x",
"product_id": "git-cvs-2.40.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "git-daemon-2.40.1-1.1.s390x",
"product": {
"name": "git-daemon-2.40.1-1.1.s390x",
"product_id": "git-daemon-2.40.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "git-doc-2.40.1-1.1.s390x",
"product": {
"name": "git-doc-2.40.1-1.1.s390x",
"product_id": "git-doc-2.40.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "git-email-2.40.1-1.1.s390x",
"product": {
"name": "git-email-2.40.1-1.1.s390x",
"product_id": "git-email-2.40.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "git-gui-2.40.1-1.1.s390x",
"product": {
"name": "git-gui-2.40.1-1.1.s390x",
"product_id": "git-gui-2.40.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "git-p4-2.40.1-1.1.s390x",
"product": {
"name": "git-p4-2.40.1-1.1.s390x",
"product_id": "git-p4-2.40.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "git-svn-2.40.1-1.1.s390x",
"product": {
"name": "git-svn-2.40.1-1.1.s390x",
"product_id": "git-svn-2.40.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "git-web-2.40.1-1.1.s390x",
"product": {
"name": "git-web-2.40.1-1.1.s390x",
"product_id": "git-web-2.40.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "gitk-2.40.1-1.1.s390x",
"product": {
"name": "gitk-2.40.1-1.1.s390x",
"product_id": "gitk-2.40.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-Git-2.40.1-1.1.s390x",
"product": {
"name": "perl-Git-2.40.1-1.1.s390x",
"product_id": "perl-Git-2.40.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "git-2.40.1-1.1.x86_64",
"product": {
"name": "git-2.40.1-1.1.x86_64",
"product_id": "git-2.40.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "git-arch-2.40.1-1.1.x86_64",
"product": {
"name": "git-arch-2.40.1-1.1.x86_64",
"product_id": "git-arch-2.40.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "git-core-2.40.1-1.1.x86_64",
"product": {
"name": "git-core-2.40.1-1.1.x86_64",
"product_id": "git-core-2.40.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "git-credential-gnome-keyring-2.40.1-1.1.x86_64",
"product": {
"name": "git-credential-gnome-keyring-2.40.1-1.1.x86_64",
"product_id": "git-credential-gnome-keyring-2.40.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "git-credential-libsecret-2.40.1-1.1.x86_64",
"product": {
"name": "git-credential-libsecret-2.40.1-1.1.x86_64",
"product_id": "git-credential-libsecret-2.40.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "git-cvs-2.40.1-1.1.x86_64",
"product": {
"name": "git-cvs-2.40.1-1.1.x86_64",
"product_id": "git-cvs-2.40.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "git-daemon-2.40.1-1.1.x86_64",
"product": {
"name": "git-daemon-2.40.1-1.1.x86_64",
"product_id": "git-daemon-2.40.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "git-doc-2.40.1-1.1.x86_64",
"product": {
"name": "git-doc-2.40.1-1.1.x86_64",
"product_id": "git-doc-2.40.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "git-email-2.40.1-1.1.x86_64",
"product": {
"name": "git-email-2.40.1-1.1.x86_64",
"product_id": "git-email-2.40.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "git-gui-2.40.1-1.1.x86_64",
"product": {
"name": "git-gui-2.40.1-1.1.x86_64",
"product_id": "git-gui-2.40.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "git-p4-2.40.1-1.1.x86_64",
"product": {
"name": "git-p4-2.40.1-1.1.x86_64",
"product_id": "git-p4-2.40.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "git-svn-2.40.1-1.1.x86_64",
"product": {
"name": "git-svn-2.40.1-1.1.x86_64",
"product_id": "git-svn-2.40.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "git-web-2.40.1-1.1.x86_64",
"product": {
"name": "git-web-2.40.1-1.1.x86_64",
"product_id": "git-web-2.40.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "gitk-2.40.1-1.1.x86_64",
"product": {
"name": "gitk-2.40.1-1.1.x86_64",
"product_id": "gitk-2.40.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-Git-2.40.1-1.1.x86_64",
"product": {
"name": "perl-Git-2.40.1-1.1.x86_64",
"product_id": "perl-Git-2.40.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "git-2.40.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-2.40.1-1.1.aarch64"
},
"product_reference": "git-2.40.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-2.40.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-2.40.1-1.1.ppc64le"
},
"product_reference": "git-2.40.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-2.40.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-2.40.1-1.1.s390x"
},
"product_reference": "git-2.40.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-2.40.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-2.40.1-1.1.x86_64"
},
"product_reference": "git-2.40.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-arch-2.40.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-arch-2.40.1-1.1.aarch64"
},
"product_reference": "git-arch-2.40.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-arch-2.40.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-arch-2.40.1-1.1.ppc64le"
},
"product_reference": "git-arch-2.40.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-arch-2.40.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-arch-2.40.1-1.1.s390x"
},
"product_reference": "git-arch-2.40.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-arch-2.40.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-arch-2.40.1-1.1.x86_64"
},
"product_reference": "git-arch-2.40.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-core-2.40.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-core-2.40.1-1.1.aarch64"
},
"product_reference": "git-core-2.40.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-core-2.40.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-core-2.40.1-1.1.ppc64le"
},
"product_reference": "git-core-2.40.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-core-2.40.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-core-2.40.1-1.1.s390x"
},
"product_reference": "git-core-2.40.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-core-2.40.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-core-2.40.1-1.1.x86_64"
},
"product_reference": "git-core-2.40.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-credential-gnome-keyring-2.40.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.aarch64"
},
"product_reference": "git-credential-gnome-keyring-2.40.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-credential-gnome-keyring-2.40.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.ppc64le"
},
"product_reference": "git-credential-gnome-keyring-2.40.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-credential-gnome-keyring-2.40.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.s390x"
},
"product_reference": "git-credential-gnome-keyring-2.40.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-credential-gnome-keyring-2.40.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.x86_64"
},
"product_reference": "git-credential-gnome-keyring-2.40.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-credential-libsecret-2.40.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.aarch64"
},
"product_reference": "git-credential-libsecret-2.40.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-credential-libsecret-2.40.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.ppc64le"
},
"product_reference": "git-credential-libsecret-2.40.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-credential-libsecret-2.40.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.s390x"
},
"product_reference": "git-credential-libsecret-2.40.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-credential-libsecret-2.40.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.x86_64"
},
"product_reference": "git-credential-libsecret-2.40.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-cvs-2.40.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-cvs-2.40.1-1.1.aarch64"
},
"product_reference": "git-cvs-2.40.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-cvs-2.40.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-cvs-2.40.1-1.1.ppc64le"
},
"product_reference": "git-cvs-2.40.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-cvs-2.40.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-cvs-2.40.1-1.1.s390x"
},
"product_reference": "git-cvs-2.40.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-cvs-2.40.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-cvs-2.40.1-1.1.x86_64"
},
"product_reference": "git-cvs-2.40.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-daemon-2.40.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-daemon-2.40.1-1.1.aarch64"
},
"product_reference": "git-daemon-2.40.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-daemon-2.40.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-daemon-2.40.1-1.1.ppc64le"
},
"product_reference": "git-daemon-2.40.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-daemon-2.40.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-daemon-2.40.1-1.1.s390x"
},
"product_reference": "git-daemon-2.40.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-daemon-2.40.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-daemon-2.40.1-1.1.x86_64"
},
"product_reference": "git-daemon-2.40.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-doc-2.40.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-doc-2.40.1-1.1.aarch64"
},
"product_reference": "git-doc-2.40.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-doc-2.40.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-doc-2.40.1-1.1.ppc64le"
},
"product_reference": "git-doc-2.40.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-doc-2.40.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-doc-2.40.1-1.1.s390x"
},
"product_reference": "git-doc-2.40.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-doc-2.40.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-doc-2.40.1-1.1.x86_64"
},
"product_reference": "git-doc-2.40.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-email-2.40.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-email-2.40.1-1.1.aarch64"
},
"product_reference": "git-email-2.40.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-email-2.40.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-email-2.40.1-1.1.ppc64le"
},
"product_reference": "git-email-2.40.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-email-2.40.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-email-2.40.1-1.1.s390x"
},
"product_reference": "git-email-2.40.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-email-2.40.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-email-2.40.1-1.1.x86_64"
},
"product_reference": "git-email-2.40.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-gui-2.40.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-gui-2.40.1-1.1.aarch64"
},
"product_reference": "git-gui-2.40.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-gui-2.40.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-gui-2.40.1-1.1.ppc64le"
},
"product_reference": "git-gui-2.40.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-gui-2.40.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-gui-2.40.1-1.1.s390x"
},
"product_reference": "git-gui-2.40.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-gui-2.40.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-gui-2.40.1-1.1.x86_64"
},
"product_reference": "git-gui-2.40.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-p4-2.40.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-p4-2.40.1-1.1.aarch64"
},
"product_reference": "git-p4-2.40.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-p4-2.40.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-p4-2.40.1-1.1.ppc64le"
},
"product_reference": "git-p4-2.40.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-p4-2.40.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-p4-2.40.1-1.1.s390x"
},
"product_reference": "git-p4-2.40.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-p4-2.40.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-p4-2.40.1-1.1.x86_64"
},
"product_reference": "git-p4-2.40.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-svn-2.40.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-svn-2.40.1-1.1.aarch64"
},
"product_reference": "git-svn-2.40.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-svn-2.40.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-svn-2.40.1-1.1.ppc64le"
},
"product_reference": "git-svn-2.40.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-svn-2.40.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-svn-2.40.1-1.1.s390x"
},
"product_reference": "git-svn-2.40.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-svn-2.40.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-svn-2.40.1-1.1.x86_64"
},
"product_reference": "git-svn-2.40.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-web-2.40.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-web-2.40.1-1.1.aarch64"
},
"product_reference": "git-web-2.40.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-web-2.40.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-web-2.40.1-1.1.ppc64le"
},
"product_reference": "git-web-2.40.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-web-2.40.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-web-2.40.1-1.1.s390x"
},
"product_reference": "git-web-2.40.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-web-2.40.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-web-2.40.1-1.1.x86_64"
},
"product_reference": "git-web-2.40.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gitk-2.40.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gitk-2.40.1-1.1.aarch64"
},
"product_reference": "gitk-2.40.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gitk-2.40.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gitk-2.40.1-1.1.ppc64le"
},
"product_reference": "gitk-2.40.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gitk-2.40.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gitk-2.40.1-1.1.s390x"
},
"product_reference": "gitk-2.40.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gitk-2.40.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gitk-2.40.1-1.1.x86_64"
},
"product_reference": "gitk-2.40.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Git-2.40.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-Git-2.40.1-1.1.aarch64"
},
"product_reference": "perl-Git-2.40.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Git-2.40.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-Git-2.40.1-1.1.ppc64le"
},
"product_reference": "perl-Git-2.40.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Git-2.40.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-Git-2.40.1-1.1.s390x"
},
"product_reference": "perl-Git-2.40.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Git-2.40.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-Git-2.40.1-1.1.x86_64"
},
"product_reference": "perl-Git-2.40.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-25652",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-25652"
}
],
"notes": [
{
"category": "general",
"text": "Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (corresponding to the rejected hunk(s) from the given patch). A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid using `git apply` with `--reject` when applying patches from an untrusted source. Use `git apply --stat` to inspect a patch before applying; avoid applying one that create a conflict where a link corresponding to the `*.rej` file exists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-25652",
"url": "https://www.suse.com/security/cve/CVE-2023-25652"
},
{
"category": "external",
"summary": "SUSE Bug 1210686 for CVE-2023-25652",
"url": "https://bugzilla.suse.com/1210686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-25652"
},
{
"cve": "CVE-2023-25815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-25815"
}
],
"notes": [
{
"category": "general",
"text": "In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function\u0027s implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\\mingw64\\share\\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\\` (and since `C:\\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1.\n\nThis vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It does require local write access by the attacker, though, which makes this attack vector less likely. Version 2.40.1 contains a patch for this issue. Some workarounds are available. Do not work on a Windows machine with shared accounts, or alternatively create a `C:\\mingw64` folder and leave it empty. Users who have administrative rights may remove the permission to create folders in `C:\\`.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-25815",
"url": "https://www.suse.com/security/cve/CVE-2023-25815"
},
{
"category": "external",
"summary": "SUSE Bug 1210686 for CVE-2023-25815",
"url": "https://bugzilla.suse.com/1210686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-25815"
},
{
"cve": "CVE-2023-29007",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-29007"
}
],
"notes": [
{
"category": "general",
"text": "Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`. This bug can be used to inject arbitrary configuration into a user\u0027s `$GIT_DIR/config` when attempting to remove the configuration section associated with that submodule. When the attacker injects configuration values which specify executables to run (such as `core.pager`, `core.editor`, `core.sshCommand`, etc.) this can lead to a remote code execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running `git submodule deinit` on untrusted repositories or without prior inspection of any submodule sections in `$GIT_DIR/config`.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-29007",
"url": "https://www.suse.com/security/cve/CVE-2023-29007"
},
{
"category": "external",
"summary": "SUSE Bug 1210686 for CVE-2023-29007",
"url": "https://bugzilla.suse.com/1210686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-arch-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-core-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-gnome-keyring-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-credential-libsecret-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-cvs-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-daemon-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-doc-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-email-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-gui-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-p4-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-svn-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:git-web-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:gitk-2.40.1-1.1.x86_64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.aarch64",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.ppc64le",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.s390x",
"openSUSE Tumbleweed:perl-Git-2.40.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-29007"
}
]
}
RHSA-2023:3192
Vulnerability from csaf_redhat - Published: 2023-05-17 15:23 - Updated: 2026-02-25 17:31A vulnerability was found in Git. This security flaw occurs when feeding specially crafted input to `git apply --reject`; a path outside the working tree can be overwritten with partially controlled contents corresponding to the rejected hunk(s) from the given patch.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-all-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-core-doc-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-email-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-gui-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:gitk-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:gitweb-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:perl-Git-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:perl-Git-SVN-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
A vulnerability was found in Git. This security flaw occurs when Git compiles with runtime prefix support and runs without translated messages, and it still uses the gettext machinery to display messages, which subsequently looks for translated messages in unexpected places. This flaw allows the malicious placement of crafted messages.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-all-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-core-doc-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-email-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-gui-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:gitk-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:gitweb-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:perl-Git-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:perl-Git-SVN-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
A vulnerability was found in Git. This security flaw occurs when renaming or deleting a section from a configuration file, where certain malicious configuration values may be misinterpreted as the beginning of a new configuration section. This flaw leads to arbitrary configuration injection.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-all-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-core-doc-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-email-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-gui-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:gitk-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:gitweb-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:perl-Git-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.1.0.Z.E4S:perl-Git-SVN-0:2.18.4-3.el8_1.noarch | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2023:3192 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2188333 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2188337 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2188338 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2023-25652 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2188333 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-25652 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-25652 | external |
| https://access.redhat.com/security/cve/CVE-2023-25815 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2188337 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-25815 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-25815 | external |
| https://access.redhat.com/security/cve/CVE-2023-29007 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2188338 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-29007 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-29007 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for git is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.\n\nSecurity Fix(es):\n\n* git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (CVE-2023-25652)\n\n* git: arbitrary configuration injection when renaming or deleting a section from a configuration file (CVE-2023-29007)\n\n* git: malicious placement of crafted messages when git was compiled with runtime prefix (CVE-2023-25815)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:3192",
"url": "https://access.redhat.com/errata/RHSA-2023:3192"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2188333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188333"
},
{
"category": "external",
"summary": "2188337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188337"
},
{
"category": "external",
"summary": "2188338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188338"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3192.json"
}
],
"title": "Red Hat Security Advisory: git security update",
"tracking": {
"current_release_date": "2026-02-25T17:31:02+00:00",
"generator": {
"date": "2026-02-25T17:31:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2023:3192",
"initial_release_date": "2023-05-17T15:23:52+00:00",
"revision_history": [
{
"date": "2023-05-17T15:23:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-17T15:23:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-25T17:31:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.1::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "git-0:2.18.4-3.el8_1.src",
"product": {
"name": "git-0:2.18.4-3.el8_1.src",
"product_id": "git-0:2.18.4-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git@2.18.4-3.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "git-0:2.18.4-3.el8_1.ppc64le",
"product": {
"name": "git-0:2.18.4-3.el8_1.ppc64le",
"product_id": "git-0:2.18.4-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git@2.18.4-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "git-core-0:2.18.4-3.el8_1.ppc64le",
"product": {
"name": "git-core-0:2.18.4-3.el8_1.ppc64le",
"product_id": "git-core-0:2.18.4-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-core@2.18.4-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "git-daemon-0:2.18.4-3.el8_1.ppc64le",
"product": {
"name": "git-daemon-0:2.18.4-3.el8_1.ppc64le",
"product_id": "git-daemon-0:2.18.4-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-daemon@2.18.4-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "git-instaweb-0:2.18.4-3.el8_1.ppc64le",
"product": {
"name": "git-instaweb-0:2.18.4-3.el8_1.ppc64le",
"product_id": "git-instaweb-0:2.18.4-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-instaweb@2.18.4-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "git-subtree-0:2.18.4-3.el8_1.ppc64le",
"product": {
"name": "git-subtree-0:2.18.4-3.el8_1.ppc64le",
"product_id": "git-subtree-0:2.18.4-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-subtree@2.18.4-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "git-svn-0:2.18.4-3.el8_1.ppc64le",
"product": {
"name": "git-svn-0:2.18.4-3.el8_1.ppc64le",
"product_id": "git-svn-0:2.18.4-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-svn@2.18.4-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "git-debugsource-0:2.18.4-3.el8_1.ppc64le",
"product": {
"name": "git-debugsource-0:2.18.4-3.el8_1.ppc64le",
"product_id": "git-debugsource-0:2.18.4-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-debugsource@2.18.4-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"product": {
"name": "git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"product_id": "git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-core-debuginfo@2.18.4-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"product": {
"name": "git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"product_id": "git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-daemon-debuginfo@2.18.4-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "git-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"product": {
"name": "git-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"product_id": "git-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-debuginfo@2.18.4-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"product": {
"name": "git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"product_id": "git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-svn-debuginfo@2.18.4-3.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "git-0:2.18.4-3.el8_1.x86_64",
"product": {
"name": "git-0:2.18.4-3.el8_1.x86_64",
"product_id": "git-0:2.18.4-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git@2.18.4-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "git-core-0:2.18.4-3.el8_1.x86_64",
"product": {
"name": "git-core-0:2.18.4-3.el8_1.x86_64",
"product_id": "git-core-0:2.18.4-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-core@2.18.4-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "git-daemon-0:2.18.4-3.el8_1.x86_64",
"product": {
"name": "git-daemon-0:2.18.4-3.el8_1.x86_64",
"product_id": "git-daemon-0:2.18.4-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-daemon@2.18.4-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "git-instaweb-0:2.18.4-3.el8_1.x86_64",
"product": {
"name": "git-instaweb-0:2.18.4-3.el8_1.x86_64",
"product_id": "git-instaweb-0:2.18.4-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-instaweb@2.18.4-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "git-subtree-0:2.18.4-3.el8_1.x86_64",
"product": {
"name": "git-subtree-0:2.18.4-3.el8_1.x86_64",
"product_id": "git-subtree-0:2.18.4-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-subtree@2.18.4-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "git-svn-0:2.18.4-3.el8_1.x86_64",
"product": {
"name": "git-svn-0:2.18.4-3.el8_1.x86_64",
"product_id": "git-svn-0:2.18.4-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-svn@2.18.4-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "git-debugsource-0:2.18.4-3.el8_1.x86_64",
"product": {
"name": "git-debugsource-0:2.18.4-3.el8_1.x86_64",
"product_id": "git-debugsource-0:2.18.4-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-debugsource@2.18.4-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "git-core-debuginfo-0:2.18.4-3.el8_1.x86_64",
"product": {
"name": "git-core-debuginfo-0:2.18.4-3.el8_1.x86_64",
"product_id": "git-core-debuginfo-0:2.18.4-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-core-debuginfo@2.18.4-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64",
"product": {
"name": "git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64",
"product_id": "git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-daemon-debuginfo@2.18.4-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "git-debuginfo-0:2.18.4-3.el8_1.x86_64",
"product": {
"name": "git-debuginfo-0:2.18.4-3.el8_1.x86_64",
"product_id": "git-debuginfo-0:2.18.4-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-debuginfo@2.18.4-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64",
"product": {
"name": "git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64",
"product_id": "git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-svn-debuginfo@2.18.4-3.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "git-all-0:2.18.4-3.el8_1.noarch",
"product": {
"name": "git-all-0:2.18.4-3.el8_1.noarch",
"product_id": "git-all-0:2.18.4-3.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-all@2.18.4-3.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "git-core-doc-0:2.18.4-3.el8_1.noarch",
"product": {
"name": "git-core-doc-0:2.18.4-3.el8_1.noarch",
"product_id": "git-core-doc-0:2.18.4-3.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-core-doc@2.18.4-3.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "git-email-0:2.18.4-3.el8_1.noarch",
"product": {
"name": "git-email-0:2.18.4-3.el8_1.noarch",
"product_id": "git-email-0:2.18.4-3.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-email@2.18.4-3.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "git-gui-0:2.18.4-3.el8_1.noarch",
"product": {
"name": "git-gui-0:2.18.4-3.el8_1.noarch",
"product_id": "git-gui-0:2.18.4-3.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-gui@2.18.4-3.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "gitk-0:2.18.4-3.el8_1.noarch",
"product": {
"name": "gitk-0:2.18.4-3.el8_1.noarch",
"product_id": "gitk-0:2.18.4-3.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gitk@2.18.4-3.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "gitweb-0:2.18.4-3.el8_1.noarch",
"product": {
"name": "gitweb-0:2.18.4-3.el8_1.noarch",
"product_id": "gitweb-0:2.18.4-3.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gitweb@2.18.4-3.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Git-0:2.18.4-3.el8_1.noarch",
"product": {
"name": "perl-Git-0:2.18.4-3.el8_1.noarch",
"product_id": "perl-Git-0:2.18.4-3.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Git@2.18.4-3.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Git-SVN-0:2.18.4-3.el8_1.noarch",
"product": {
"name": "perl-Git-SVN-0:2.18.4-3.el8_1.noarch",
"product_id": "perl-Git-SVN-0:2.18.4-3.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Git-SVN@2.18.4-3.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "git-0:2.18.4-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.ppc64le"
},
"product_reference": "git-0:2.18.4-3.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-0:2.18.4-3.el8_1.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.src"
},
"product_reference": "git-0:2.18.4-3.el8_1.src",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-0:2.18.4-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.x86_64"
},
"product_reference": "git-0:2.18.4-3.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-all-0:2.18.4-3.el8_1.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-all-0:2.18.4-3.el8_1.noarch"
},
"product_reference": "git-all-0:2.18.4-3.el8_1.noarch",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-core-0:2.18.4-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.ppc64le"
},
"product_reference": "git-core-0:2.18.4-3.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-core-0:2.18.4-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.x86_64"
},
"product_reference": "git-core-0:2.18.4-3.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le"
},
"product_reference": "git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-core-debuginfo-0:2.18.4-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.x86_64"
},
"product_reference": "git-core-debuginfo-0:2.18.4-3.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-core-doc-0:2.18.4-3.el8_1.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-core-doc-0:2.18.4-3.el8_1.noarch"
},
"product_reference": "git-core-doc-0:2.18.4-3.el8_1.noarch",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-daemon-0:2.18.4-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.ppc64le"
},
"product_reference": "git-daemon-0:2.18.4-3.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-daemon-0:2.18.4-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.x86_64"
},
"product_reference": "git-daemon-0:2.18.4-3.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le"
},
"product_reference": "git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64"
},
"product_reference": "git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-debuginfo-0:2.18.4-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.ppc64le"
},
"product_reference": "git-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-debuginfo-0:2.18.4-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.x86_64"
},
"product_reference": "git-debuginfo-0:2.18.4-3.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-debugsource-0:2.18.4-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.ppc64le"
},
"product_reference": "git-debugsource-0:2.18.4-3.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-debugsource-0:2.18.4-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.x86_64"
},
"product_reference": "git-debugsource-0:2.18.4-3.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-email-0:2.18.4-3.el8_1.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-email-0:2.18.4-3.el8_1.noarch"
},
"product_reference": "git-email-0:2.18.4-3.el8_1.noarch",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-gui-0:2.18.4-3.el8_1.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-gui-0:2.18.4-3.el8_1.noarch"
},
"product_reference": "git-gui-0:2.18.4-3.el8_1.noarch",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-instaweb-0:2.18.4-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.ppc64le"
},
"product_reference": "git-instaweb-0:2.18.4-3.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-instaweb-0:2.18.4-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.x86_64"
},
"product_reference": "git-instaweb-0:2.18.4-3.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-subtree-0:2.18.4-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.ppc64le"
},
"product_reference": "git-subtree-0:2.18.4-3.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-subtree-0:2.18.4-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.x86_64"
},
"product_reference": "git-subtree-0:2.18.4-3.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-svn-0:2.18.4-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.ppc64le"
},
"product_reference": "git-svn-0:2.18.4-3.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-svn-0:2.18.4-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.x86_64"
},
"product_reference": "git-svn-0:2.18.4-3.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le"
},
"product_reference": "git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64"
},
"product_reference": "git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gitk-0:2.18.4-3.el8_1.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:gitk-0:2.18.4-3.el8_1.noarch"
},
"product_reference": "gitk-0:2.18.4-3.el8_1.noarch",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gitweb-0:2.18.4-3.el8_1.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:gitweb-0:2.18.4-3.el8_1.noarch"
},
"product_reference": "gitweb-0:2.18.4-3.el8_1.noarch",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Git-0:2.18.4-3.el8_1.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:perl-Git-0:2.18.4-3.el8_1.noarch"
},
"product_reference": "perl-Git-0:2.18.4-3.el8_1.noarch",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Git-SVN-0:2.18.4-3.el8_1.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:perl-Git-SVN-0:2.18.4-3.el8_1.noarch"
},
"product_reference": "perl-Git-SVN-0:2.18.4-3.el8_1.noarch",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-25652",
"discovery_date": "2023-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2188333"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Git. This security flaw occurs when feeding specially crafted input to `git apply --reject`; a path outside the working tree can be overwritten with partially controlled contents corresponding to the rejected hunk(s) from the given patch.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.src",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-all-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-doc-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-email-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-gui-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:gitk-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:gitweb-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-SVN-0:2.18.4-3.el8_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25652"
},
{
"category": "external",
"summary": "RHBZ#2188333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188333"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25652",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25652"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25652",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25652"
}
],
"release_date": "2023-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-17T15:23:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.src",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-all-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-doc-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-email-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-gui-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:gitk-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:gitweb-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-SVN-0:2.18.4-3.el8_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3192"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.src",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-all-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-doc-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-email-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-gui-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:gitk-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:gitweb-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-SVN-0:2.18.4-3.el8_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents"
},
{
"cve": "CVE-2023-25815",
"discovery_date": "2023-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2188337"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Git. This security flaw occurs when Git compiles with runtime prefix support and runs without translated messages, and it still uses the gettext machinery to display messages, which subsequently looks for translated messages in unexpected places. This flaw allows the malicious placement of crafted messages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "git: malicious placement of crafted messages when git was compiled with runtime prefix",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.src",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-all-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-doc-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-email-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-gui-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:gitk-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:gitweb-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-SVN-0:2.18.4-3.el8_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25815"
},
{
"category": "external",
"summary": "RHBZ#2188337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188337"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25815"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25815",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25815"
}
],
"release_date": "2023-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-17T15:23:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.src",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-all-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-doc-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-email-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-gui-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:gitk-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:gitweb-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-SVN-0:2.18.4-3.el8_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3192"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.2,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.src",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-all-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-doc-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-email-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-gui-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:gitk-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:gitweb-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-SVN-0:2.18.4-3.el8_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "git: malicious placement of crafted messages when git was compiled with runtime prefix"
},
{
"cve": "CVE-2023-29007",
"discovery_date": "2023-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2188338"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Git. This security flaw occurs when renaming or deleting a section from a configuration file, where certain malicious configuration values may be misinterpreted as the beginning of a new configuration section. This flaw leads to arbitrary configuration injection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "git: arbitrary configuration injection when renaming or deleting a section from a configuration file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.src",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-all-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-doc-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-email-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-gui-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:gitk-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:gitweb-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-SVN-0:2.18.4-3.el8_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-29007"
},
{
"category": "external",
"summary": "RHBZ#2188338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-29007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29007"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29007",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29007"
}
],
"release_date": "2023-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-17T15:23:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.src",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-all-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-doc-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-email-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-gui-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:gitk-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:gitweb-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-SVN-0:2.18.4-3.el8_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3192"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.src",
"AppStream-8.1.0.Z.E4S:git-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-all-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-core-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-core-doc-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-daemon-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-debugsource-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-email-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-gui-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-instaweb-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-subtree-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:git-svn-debuginfo-0:2.18.4-3.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:gitk-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:gitweb-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-0:2.18.4-3.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:perl-Git-SVN-0:2.18.4-3.el8_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "git: arbitrary configuration injection when renaming or deleting a section from a configuration file"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.