QID 355246

Date Published: 2023-05-29

QID 355246: Amazon Linux Security Advisory for git : ALAS2023-2023-180

Git is a revision control system.
Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (corresponding to the rejected hunk(s) from the given patch).
A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1.
As a workaround, avoid using `git apply` with `--reject` when applying patches from an untrusted source.
Use `git apply --stat` to inspect a patch before applying; avoid applying one that create a conflict where a link corresponding to the `*.rej` file exists. (
( CVE-2023-25652) git is a revision control system.
Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule urls that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`.
This bug can be used to inject arbitrary configuration into a user's `$git_dir/config` when attempting to remove the configuration section associated with that submodule.
When the attacker injects configuration values which specify executables to run (such as `core.pager`, `core.editor`, `core.sshcommand`, etc.)
This can lead to a remote code execution.
A fix a fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1.
As a workaround, avoid running `git submodule deinit` on untrusted repositories or without prior inspection of any submodule sections in `$git_dir/config`. (
( CVE-2023-29007)



Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2023-2023-180 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 355246

    Software Advisories
    Advisory ID Software Component Link
    ALAS2023-2023-180 amazon linux 2023 URL Logo alas.aws.amazon.com/AL2023/ALAS-2023-180.html