{
  "threat_severity" : "Moderate",
  "public_date" : "2023-02-14T00:00:00Z",
  "bugzilla" : {
    "description" : "git: git apply: a path outside the working tree can be overwritten with crafted input",
    "id" : "2168161",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2168161"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-22",
  "details" : [ "Git, a revision control system, is vulnerable to path traversal prior to versions 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, and 2.30.8. By feeding a crafted input to `git apply`, a path outside the working tree can be overwritten as the user who is running `git apply`. A fix has been prepared and will appear in v2.39.2, v2.38.4, v2.37.6, v2.36.5, v2.35.7, v2.34.7, v2.33.7, v2.32.6, v2.31.7, and v2.30.8. As a workaround, use `git apply --stat` to inspect a patch before applying; avoid applying one that creates a symbolic link and then creates a file beyond the symbolic link.", "A vulnerability was found in Git. This security issue occurs when feeding a crafted input to \"git apply.\" A path outside the working tree can be overwritten by the user running \"git apply.\"" ],
  "statement" : "This vulnerability marked as Moderate severity and it's less likely to be exploitable because it requires a specially crafted malicious patch to be applied via git apply, to overwrite files outside the working tree of the user running git apply. This could lead to some compromise of integrity of resources under certain circumstances, however it does not compromise the whole system or gain additional privileges to execute arbitrary code, or allow remote users to cause a denial of service.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2023-05-22T00:00:00Z",
    "advisory" : "RHSA-2023:3246",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "git-0:2.39.3-1.el8_8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Extended Update Support",
    "release_date" : "2024-01-25T00:00:00Z",
    "advisory" : "RHSA-2024:0407",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.6",
    "package" : "git-0:2.31.8-1.el8_6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-05-22T00:00:00Z",
    "advisory" : "RHSA-2023:3245",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "git-0:2.39.3-1.el9_2"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "git",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "git",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat JBoss Data Grid 7",
    "fix_state" : "Out of support scope",
    "package_name" : "git",
    "cpe" : "cpe:/a:redhat:jboss_data_grid:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-23946\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-23946\nhttps://github.blog/2023-02-14-git-security-vulnerabilities-announced-3/\nhttps://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh" ],
  "name" : "CVE-2023-23946",
  "mitigation" : {
    "value" : "Use git apply --stat to inspect a patch before applying; avoid applying one that creates a symbolic link and then creates a file beyond the symbolic link.",
    "lang" : "en:us"
  },
  "csaw" : false
}