First published: Thu Apr 20 2023(Updated: )
A vulnerability was found in Git. This security flaw occurs when Git compiles with runtime prefix support and runs without translated messages, and it still uses the gettext machinery to display messages, which subsequently looks for translated messages in unexpected places. This flaw allows the malicious placement of crafted messages.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/git | <0:2.39.3-1.el8_8 | 0:2.39.3-1.el8_8 |
redhat/git | <0:2.18.4-3.el8_1 | 0:2.18.4-3.el8_1 |
redhat/git | <0:2.18.4-4.el8_2 | 0:2.18.4-4.el8_2 |
redhat/git | <0:2.27.0-4.el8_4 | 0:2.27.0-4.el8_4 |
redhat/git | <0:2.31.1-4.el8_6 | 0:2.31.1-4.el8_6 |
redhat/git | <0:2.39.3-1.el9_2 | 0:2.39.3-1.el9_2 |
redhat/git | <0:2.31.1-5.el9_0 | 0:2.31.1-5.el9_0 |
redhat/rh-git227-git | <0:2.27.0-6.el7 | 0:2.27.0-6.el7 |
Microsoft Visual Studio 2019 | =16.11 | |
Microsoft Visual Studio 2017 | =15.9 | |
debian/git | <=1:2.30.2-1+deb11u2 | 1:2.30.2-1+deb11u4 1:2.39.5-0+deb12u2 1:2.47.2-0.1 1:2.49.0-1 |
Git for Windows | <2.40.1 | |
Red Hat Fedora | =37 | |
Red Hat Fedora | =38 | |
Visual Studio Community 2022 | =17.2 | |
Visual Studio Community 2022 | =17.4 | |
Visual Studio Community 2022 | =17.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)