rhsa-2023_3382
Vulnerability from csaf_redhat
Published
2023-05-31 13:13
Modified
2024-11-15 17:17
Summary
Red Hat Security Advisory: git security update
Notes
Topic
An update for git is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Security Fix(es):
* git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (CVE-2023-25652)
* git: arbitrary configuration injection when renaming or deleting a section from a configuration file (CVE-2023-29007)
* git: malicious placement of crafted messages when git was compiled with runtime prefix (CVE-2023-25815)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for git is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.\n\nSecurity Fix(es):\n\n* git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (CVE-2023-25652)\n\n* git: arbitrary configuration injection when renaming or deleting a section from a configuration file (CVE-2023-29007)\n\n* git: malicious placement of crafted messages when git was compiled with runtime prefix (CVE-2023-25815)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:3382", "url": "https://access.redhat.com/errata/RHSA-2023:3382" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2188333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188333" }, { "category": "external", "summary": "2188337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188337" }, { "category": "external", "summary": "2188338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188338" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3382.json" } ], "title": "Red Hat Security Advisory: git security update", "tracking": { "current_release_date": "2024-11-15T17:17:24+00:00", "generator": { "date": "2024-11-15T17:17:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:3382", "initial_release_date": "2023-05-31T13:13:03+00:00", "revision_history": [ { "date": "2023-05-31T13:13:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-05-31T13:13:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T17:17:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "git-0:2.18.4-4.el8_2.src", "product": { "name": "git-0:2.18.4-4.el8_2.src", "product_id": "git-0:2.18.4-4.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/git@2.18.4-4.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "git-0:2.18.4-4.el8_2.x86_64", "product": { "name": "git-0:2.18.4-4.el8_2.x86_64", "product_id": "git-0:2.18.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/git@2.18.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "git-core-0:2.18.4-4.el8_2.x86_64", "product": { "name": "git-core-0:2.18.4-4.el8_2.x86_64", "product_id": "git-core-0:2.18.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/git-core@2.18.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "git-daemon-0:2.18.4-4.el8_2.x86_64", "product": { "name": "git-daemon-0:2.18.4-4.el8_2.x86_64", "product_id": "git-daemon-0:2.18.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/git-daemon@2.18.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "git-instaweb-0:2.18.4-4.el8_2.x86_64", "product": { "name": "git-instaweb-0:2.18.4-4.el8_2.x86_64", "product_id": "git-instaweb-0:2.18.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/git-instaweb@2.18.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "git-subtree-0:2.18.4-4.el8_2.x86_64", "product": { "name": "git-subtree-0:2.18.4-4.el8_2.x86_64", "product_id": "git-subtree-0:2.18.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/git-subtree@2.18.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "git-svn-0:2.18.4-4.el8_2.x86_64", "product": { "name": "git-svn-0:2.18.4-4.el8_2.x86_64", "product_id": "git-svn-0:2.18.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/git-svn@2.18.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "git-debugsource-0:2.18.4-4.el8_2.x86_64", "product": { "name": "git-debugsource-0:2.18.4-4.el8_2.x86_64", "product_id": "git-debugsource-0:2.18.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/git-debugsource@2.18.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "git-core-debuginfo-0:2.18.4-4.el8_2.x86_64", "product": { "name": "git-core-debuginfo-0:2.18.4-4.el8_2.x86_64", "product_id": "git-core-debuginfo-0:2.18.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/git-core-debuginfo@2.18.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "git-daemon-debuginfo-0:2.18.4-4.el8_2.x86_64", "product": { "name": "git-daemon-debuginfo-0:2.18.4-4.el8_2.x86_64", "product_id": "git-daemon-debuginfo-0:2.18.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/git-daemon-debuginfo@2.18.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "git-debuginfo-0:2.18.4-4.el8_2.x86_64", "product": { "name": "git-debuginfo-0:2.18.4-4.el8_2.x86_64", "product_id": "git-debuginfo-0:2.18.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/git-debuginfo@2.18.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "git-svn-debuginfo-0:2.18.4-4.el8_2.x86_64", "product": { "name": "git-svn-debuginfo-0:2.18.4-4.el8_2.x86_64", "product_id": "git-svn-debuginfo-0:2.18.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/git-svn-debuginfo@2.18.4-4.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "git-all-0:2.18.4-4.el8_2.noarch", "product": { "name": "git-all-0:2.18.4-4.el8_2.noarch", "product_id": "git-all-0:2.18.4-4.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/git-all@2.18.4-4.el8_2?arch=noarch" } } }, { "category": "product_version", "name": "git-core-doc-0:2.18.4-4.el8_2.noarch", "product": { "name": "git-core-doc-0:2.18.4-4.el8_2.noarch", "product_id": "git-core-doc-0:2.18.4-4.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/git-core-doc@2.18.4-4.el8_2?arch=noarch" } } }, { "category": "product_version", "name": "git-email-0:2.18.4-4.el8_2.noarch", "product": { "name": "git-email-0:2.18.4-4.el8_2.noarch", "product_id": "git-email-0:2.18.4-4.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/git-email@2.18.4-4.el8_2?arch=noarch" } } }, { "category": "product_version", "name": "git-gui-0:2.18.4-4.el8_2.noarch", "product": { "name": "git-gui-0:2.18.4-4.el8_2.noarch", "product_id": "git-gui-0:2.18.4-4.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/git-gui@2.18.4-4.el8_2?arch=noarch" } } }, { "category": "product_version", "name": "gitk-0:2.18.4-4.el8_2.noarch", "product": { "name": "gitk-0:2.18.4-4.el8_2.noarch", "product_id": "gitk-0:2.18.4-4.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gitk@2.18.4-4.el8_2?arch=noarch" } } }, { "category": "product_version", "name": "gitweb-0:2.18.4-4.el8_2.noarch", "product": { "name": "gitweb-0:2.18.4-4.el8_2.noarch", "product_id": "gitweb-0:2.18.4-4.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gitweb@2.18.4-4.el8_2?arch=noarch" } } }, { "category": "product_version", "name": "perl-Git-0:2.18.4-4.el8_2.noarch", "product": { "name": "perl-Git-0:2.18.4-4.el8_2.noarch", "product_id": "perl-Git-0:2.18.4-4.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Git@2.18.4-4.el8_2?arch=noarch" } } }, { "category": "product_version", "name": "perl-Git-SVN-0:2.18.4-4.el8_2.noarch", "product": { "name": "perl-Git-SVN-0:2.18.4-4.el8_2.noarch", "product_id": "perl-Git-SVN-0:2.18.4-4.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Git-SVN@2.18.4-4.el8_2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "git-0:2.18.4-4.el8_2.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.src" }, "product_reference": "git-0:2.18.4-4.el8_2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "git-0:2.18.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.x86_64" }, "product_reference": "git-0:2.18.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "git-all-0:2.18.4-4.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:git-all-0:2.18.4-4.el8_2.noarch" }, "product_reference": "git-all-0:2.18.4-4.el8_2.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "git-core-0:2.18.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:git-core-0:2.18.4-4.el8_2.x86_64" }, "product_reference": "git-core-0:2.18.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "git-core-debuginfo-0:2.18.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:git-core-debuginfo-0:2.18.4-4.el8_2.x86_64" }, "product_reference": "git-core-debuginfo-0:2.18.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "git-core-doc-0:2.18.4-4.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:git-core-doc-0:2.18.4-4.el8_2.noarch" }, "product_reference": "git-core-doc-0:2.18.4-4.el8_2.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "git-daemon-0:2.18.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:git-daemon-0:2.18.4-4.el8_2.x86_64" }, "product_reference": "git-daemon-0:2.18.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "git-daemon-debuginfo-0:2.18.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:git-daemon-debuginfo-0:2.18.4-4.el8_2.x86_64" }, "product_reference": "git-daemon-debuginfo-0:2.18.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "git-debuginfo-0:2.18.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:git-debuginfo-0:2.18.4-4.el8_2.x86_64" }, "product_reference": "git-debuginfo-0:2.18.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "git-debugsource-0:2.18.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:git-debugsource-0:2.18.4-4.el8_2.x86_64" }, "product_reference": "git-debugsource-0:2.18.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "git-email-0:2.18.4-4.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:git-email-0:2.18.4-4.el8_2.noarch" }, "product_reference": "git-email-0:2.18.4-4.el8_2.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "git-gui-0:2.18.4-4.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:git-gui-0:2.18.4-4.el8_2.noarch" }, "product_reference": "git-gui-0:2.18.4-4.el8_2.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "git-instaweb-0:2.18.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:git-instaweb-0:2.18.4-4.el8_2.x86_64" }, "product_reference": "git-instaweb-0:2.18.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "git-subtree-0:2.18.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:git-subtree-0:2.18.4-4.el8_2.x86_64" }, "product_reference": "git-subtree-0:2.18.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "git-svn-0:2.18.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:git-svn-0:2.18.4-4.el8_2.x86_64" }, "product_reference": "git-svn-0:2.18.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "git-svn-debuginfo-0:2.18.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:git-svn-debuginfo-0:2.18.4-4.el8_2.x86_64" }, "product_reference": "git-svn-debuginfo-0:2.18.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "gitk-0:2.18.4-4.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:gitk-0:2.18.4-4.el8_2.noarch" }, "product_reference": "gitk-0:2.18.4-4.el8_2.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "gitweb-0:2.18.4-4.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:gitweb-0:2.18.4-4.el8_2.noarch" }, "product_reference": "gitweb-0:2.18.4-4.el8_2.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Git-0:2.18.4-4.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:perl-Git-0:2.18.4-4.el8_2.noarch" }, "product_reference": "perl-Git-0:2.18.4-4.el8_2.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Git-SVN-0:2.18.4-4.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:perl-Git-SVN-0:2.18.4-4.el8_2.noarch" }, "product_reference": "perl-Git-SVN-0:2.18.4-4.el8_2.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-25652", "discovery_date": "2023-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2188333" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Git. This security flaw occurs when feeding specially crafted input to `git apply --reject`; a path outside the working tree can be overwritten with partially controlled contents corresponding to the rejected hunk(s) from the given patch.", "title": "Vulnerability description" }, { "category": "summary", "text": "git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.src", "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-all-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-core-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-doc-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-daemon-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-daemon-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debugsource-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-email-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-gui-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-instaweb-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-subtree-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:gitk-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:gitweb-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-SVN-0:2.18.4-4.el8_2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-25652" }, { "category": "external", "summary": "RHBZ#2188333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-25652", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25652" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25652", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25652" } ], "release_date": "2023-04-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-31T13:13:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.src", "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-all-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-core-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-doc-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-daemon-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-daemon-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debugsource-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-email-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-gui-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-instaweb-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-subtree-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:gitk-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:gitweb-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-SVN-0:2.18.4-4.el8_2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3382" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.src", "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-all-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-core-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-doc-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-daemon-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-daemon-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debugsource-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-email-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-gui-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-instaweb-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-subtree-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:gitk-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:gitweb-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-SVN-0:2.18.4-4.el8_2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents" }, { "cve": "CVE-2023-25815", "discovery_date": "2023-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2188337" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Git. This security flaw occurs when Git compiles with runtime prefix support and runs without translated messages, and it still uses the gettext machinery to display messages, which subsequently looks for translated messages in unexpected places. This flaw allows the malicious placement of crafted messages.", "title": "Vulnerability description" }, { "category": "summary", "text": "git: malicious placement of crafted messages when git was compiled with runtime prefix", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.src", "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-all-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-core-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-doc-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-daemon-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-daemon-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debugsource-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-email-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-gui-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-instaweb-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-subtree-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:gitk-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:gitweb-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-SVN-0:2.18.4-4.el8_2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-25815" }, { "category": "external", "summary": "RHBZ#2188337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-25815", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25815" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25815", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25815" } ], "release_date": "2023-04-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-31T13:13:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.src", "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-all-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-core-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-doc-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-daemon-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-daemon-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debugsource-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-email-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-gui-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-instaweb-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-subtree-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:gitk-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:gitweb-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-SVN-0:2.18.4-4.el8_2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3382" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.src", "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-all-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-core-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-doc-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-daemon-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-daemon-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debugsource-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-email-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-gui-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-instaweb-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-subtree-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:gitk-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:gitweb-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-SVN-0:2.18.4-4.el8_2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "git: malicious placement of crafted messages when git was compiled with runtime prefix" }, { "cve": "CVE-2023-29007", "discovery_date": "2023-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2188338" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Git. This security flaw occurs when renaming or deleting a section from a configuration file, where certain malicious configuration values may be misinterpreted as the beginning of a new configuration section. This flaw leads to arbitrary configuration injection.", "title": "Vulnerability description" }, { "category": "summary", "text": "git: arbitrary configuration injection when renaming or deleting a section from a configuration file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.src", "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-all-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-core-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-doc-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-daemon-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-daemon-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debugsource-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-email-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-gui-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-instaweb-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-subtree-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:gitk-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:gitweb-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-SVN-0:2.18.4-4.el8_2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-29007" }, { "category": "external", "summary": "RHBZ#2188338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-29007", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29007" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29007", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29007" } ], "release_date": "2023-04-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-31T13:13:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.src", "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-all-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-core-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-doc-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-daemon-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-daemon-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debugsource-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-email-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-gui-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-instaweb-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-subtree-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:gitk-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:gitweb-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-SVN-0:2.18.4-4.el8_2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3382" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.src", "AppStream-8.2.0.Z.AUS:git-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-all-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-core-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-core-doc-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-daemon-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-daemon-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-debugsource-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-email-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-gui-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:git-instaweb-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-subtree-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:git-svn-debuginfo-0:2.18.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:gitk-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:gitweb-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-0:2.18.4-4.el8_2.noarch", "AppStream-8.2.0.Z.AUS:perl-Git-SVN-0:2.18.4-4.el8_2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "git: arbitrary configuration injection when renaming or deleting a section from a configuration file" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.