Source: git Version: 1:2.40.0-1 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Control: fixed -1 1:2.40.1-1
Hi, The following vulnerabilities were published for git, while fixed in unstable already (thus adding along as well the fixed version), it will affect bookworm, and good if they are fixed before the bookworm release. CVE-2023-25652[0]: | By feeding specially crafted input to `git apply --reject`, a | path outside the working tree can be overwritten with partially | controlled contents (corresponding to the rejected hunk(s) from | the given patch). CVE-2023-25815[1]: | When Git is compiled with runtime prefix support and runs without | translated messages, it still used the gettext machinery to | display messages, which subsequently potentially looked for | translated messages in unexpected places. This allowed for | malicious placement of crafted messages. CVE-2023-29007[2]: | When renaming or deleting a section from a configuration file, | certain malicious configuration values may be misinterpreted as | the beginning of a new configuration section, leading to arbitrary | configuration injection. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-25652 https://www.cve.org/CVERecord?id=CVE-2023-25652 [1] https://security-tracker.debian.org/tracker/CVE-2023-25815 https://www.cve.org/CVERecord?id=CVE-2023-25815 [2] https://security-tracker.debian.org/tracker/CVE-2023-29007 https://www.cve.org/CVERecord?id=CVE-2023-29007 [3] https://lore.kernel.org/lkml/xmqqa5yv3n93.fsf@gitster.g/ Please adjust the affected versions in the BTS as needed. Regards, Salvatore