跳转到帖子

Rocky Linux: CVE-2023-23946: git (RLSA-2023-3246)

recommended_posts

发布于
  • Members

Rocky Linux: CVE-2023-23946: git (RLSA-2023-3246)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:N)
Published
02/14/2023
Created
03/07/2024
Added
03/05/2024
Modified
01/28/2025

Description

Git, a revision control system, is vulnerable to path traversal prior to versions 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, and 2.30.8. By feeding a crafted input to `git apply`, a path outside the working tree can be overwritten as the user who is running `git apply`. A fix has been prepared and will appear in v2.39.2, v2.38.4, v2.37.6, v2.36.5, v2.35.7, v2.34.7, v2.33.7, v2.32.6, v2.31.7, and v2.30.8. As a workaround, use `git apply --stat` to inspect a patch before applying; avoid applying one that creates a symbolic link and then creates a file beyond the symbolic link.

Solution(s)

  • rocky-upgrade-git
  • rocky-upgrade-git-core
  • rocky-upgrade-git-core-debuginfo
  • rocky-upgrade-git-credential-libsecret
  • rocky-upgrade-git-credential-libsecret-debuginfo
  • rocky-upgrade-git-daemon
  • rocky-upgrade-git-daemon-debuginfo
  • rocky-upgrade-git-debuginfo
  • rocky-upgrade-git-debugsource
  • rocky-upgrade-git-subtree

References

  • https://attackerkb.com/topics/cve-2023-23946
  • CVE - 2023-23946
  • https://errata.rockylinux.org/RLSA-2023:3246
  • 查看数 695
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…