Git revision control system allows overwriting of files outside the working tree via specially crafted input in versions 2.30.9 to 2.40.1
Reporter | Title | Published | Views | Family All 159 |
---|---|---|---|---|
![]() | CVE-2023-25652 "git apply --reject" partially-controlled arbitrary file write | 25 Apr 202319:17 | – | cvelist |
![]() | CVE-2023-25652 | 26 Apr 202306:17 | – | redhatcve |
![]() | GitHub: CVE-2023-25652 "git apply --reject" partially-controlled arbitrary file write | 13 Jun 202307:00 | – | mscve |
![]() | Fedora: Security Advisory for git (FEDORA-2023-2c851f43ba) | 21 Nov 202300:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-6050-2) | 18 May 202300:00 | – | openvas |
![]() | CentOS: Security Advisory for emacs-git (CESA-2023:3263) | 30 Jul 202300:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for git (EulerOS-SA-2023-2683) | 5 Sep 202300:00 | – | openvas |
![]() | Mageia: Security Advisory (MGASA-2023-0163) | 8 May 202300:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-6050-1) | 2 May 202300:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for git (EulerOS-SA-2023-2641) | 5 Sep 202300:00 | – | openvas |
[
{
"vendor": "git",
"product": "git",
"versions": [
{
"version": "< 2.30.9",
"status": "affected"
},
{
"version": ">= 2.31.0, < 2.31.8",
"status": "affected"
},
{
"version": ">= 2.32.0, < 2.32.7",
"status": "affected"
},
{
"version": ">= 2.33.0, < 2.33.8",
"status": "affected"
},
{
"version": ">= 2.34.0, < 2.34.8",
"status": "affected"
},
{
"version": ">= 2.35.0, < 2.35.8",
"status": "affected"
},
{
"version": ">= 2.36.0, < 2.36.6",
"status": "affected"
},
{
"version": ">= 2.37.0, < 2.37.7",
"status": "affected"
},
{
"version": ">= 2.38.0, < 2.38.5",
"status": "affected"
},
{
"version": ">= 2.39.0, < 2.39.3",
"status": "affected"
},
{
"version": ">= 2.40.0, < 2.40.1",
"status": "affected"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo