MGASA-2023-0163

Source
https://advisories.mageia.org/MGASA-2023-0163.html
Import Source
https://advisories.mageia.org/MGASA-2023-0163.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2023-0163
Related
Published
2023-05-06T18:19:07Z
Modified
2023-05-06T17:07:30Z
Summary
Updated git packages fix security vulnerability
Details

By feeding specially crafted input to 'git apply --reject', a path outside the working tree can be overwritten with partially controlled contents corresponding to the rejected hunk(s) from the given patch. (CVE-2023-25652).

When Git is compiled with runtime prefix support and runs without translated messages, it still used the gettext machinery to display messages, which subsequently potentially looked for translated messages in unexpected places. This allowed for malicious placement of crafted messages (CVE-2023-25815).

When renaming or deleting a section from a configuration file, certain malicious configuration values may be misinterpreted as the beginning of a new configuration section, leading to arbitrary configuration injection (CVE-2023-29007).

References
Credits

Affected packages