 
        | Release Date: | 2023-04-25 | |
| Impact: | None | What is this? | 
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, by feeding specially crafted input to git apply --reject, a path outside the working tree can be overwritten with partially controlled contents (corresponding to the rejected hunk(s) from the given patch). A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid using git apply with --reject when applying patches from an untrusted source. Use git apply --stat to inspect a patch before applying; avoid applying one that create a conflict where a link corresponding to the *.rej file exists.
See more information about CVE-2023-25652 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
| Base Score: | 7.5 | 
| Vector String: | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N | 
| Version: | 3.0 | 
| Attack Vector: | Network | 
| Attack Complexity: | Low | 
| Privileges Required: | None | 
| User Interaction: | None | 
| Scope: | Unchanged | 
| Confidentiality Impact: | None | 
| Integrity Impact: | High | 
| Availability Impact: | None | 
| Platform | Errata | Release Date | 
| Oracle Linux version 7 (git) | ELSA-2023-3263 | 2023-05-23 | 
| Oracle Linux version 8 (git) | ELSA-2023-3246 | 2023-05-24 | 
| Oracle Linux version 9 (git) | ELSA-2023-3245 | 2023-05-23 | 
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: