git: CVE-2023-25652 CVE-2023-25815 CVE-2023-29007

Related Vulnerabilities: CVE-2023-25652   CVE-2023-25815   CVE-2023-29007  

Debian Bug report logs - #1034835
git: CVE-2023-25652 CVE-2023-25815 CVE-2023-29007

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Tue, 25 Apr 2023 18:39:02 UTC

Severity: grave

Tags: security, upstream

Found in version git/1:2.40.0-1

Fixed in version git/1:2.40.1-1

Done: Salvatore Bonaccorso <carnil@debian.org>

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Jonathan Nieder <jrnieder@gmail.com>:
Bug#1034835; Package src:git. (Tue, 25 Apr 2023 18:39:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Jonathan Nieder <jrnieder@gmail.com>. (Tue, 25 Apr 2023 18:39:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: git: CVE-2023-25652 CVE-2023-25815 CVE-2023-29007
Date: Tue, 25 Apr 2023 20:36:37 +0200
Source: git
Version: 1:2.40.0-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Control: fixed -1 1:2.40.1-1

Hi,

The following vulnerabilities were published for git, while fixed in
unstable already (thus adding along as well the fixed version), it
will affect bookworm, and good if they are fixed before the bookworm
release.

CVE-2023-25652[0]:
| By feeding specially crafted input to `git apply --reject`, a
| path outside the working tree can be overwritten with partially
| controlled contents (corresponding to the rejected hunk(s) from
| the given patch).

CVE-2023-25815[1]:
| When Git is compiled with runtime prefix support and runs without
| translated messages, it still used the gettext machinery to
| display messages, which subsequently potentially looked for
| translated messages in unexpected places. This allowed for
| malicious placement of crafted messages.

CVE-2023-29007[2]:
| When renaming or deleting a section from a configuration file,
| certain malicious configuration values may be misinterpreted as
| the beginning of a new configuration section, leading to arbitrary
| configuration injection.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-25652
    https://www.cve.org/CVERecord?id=CVE-2023-25652
[1] https://security-tracker.debian.org/tracker/CVE-2023-25815
    https://www.cve.org/CVERecord?id=CVE-2023-25815
[2] https://security-tracker.debian.org/tracker/CVE-2023-29007
    https://www.cve.org/CVERecord?id=CVE-2023-29007
[3] https://lore.kernel.org/lkml/xmqqa5yv3n93.fsf@gitster.g/

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Marked as fixed in versions git/1:2.40.1-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to submit@bugs.debian.org. (Tue, 25 Apr 2023 18:39:04 GMT) (full text, mbox, link).


Marked Bug as done Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Tue, 25 Apr 2023 18:48:06 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Tue, 25 Apr 2023 18:48:07 GMT) (full text, mbox, link).


Message sent on to Salvatore Bonaccorso <carnil@debian.org>:
Bug#1034835. (Tue, 25 Apr 2023 18:48:09 GMT) (full text, mbox, link).


Message #14 received at 1034835-submitter@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: control@bugs.debian.org
Cc: 1034835-submitter@bugs.debian.org
Subject: closing 1034835
Date: Tue, 25 Apr 2023 20:46:36 +0200
close 1034835 1:2.40.1-1
thanks




Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Apr 26 13:11:46 2023; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.