Lucene search

K
debianDebianDEBIAN:DLA-3282-1:DF150
HistoryJan 26, 2023 - 1:00 p.m.

[SECURITY] [DLA 3282-1] git security update

2023-01-2613:00:35
lists.debian.org
18

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

69.3%


Debian LTS Advisory DLA-3282-1 [email protected]
https://www.debian.org/lts/security/ Sylvain Beucler
January 26, 2023 https://wiki.debian.org/LTS


Package : git
Version : 1:2.20.1-2+deb10u7
CVE ID : CVE-2022-23521 CVE-2022-41903
Debian Bug : 1029114

Two vulnerabilities were discovered in Git, a distributed revision
control system. An attacker may trigger code execution in specific
situations.

CVE-2022-23521

gitattributes are a mechanism to allow defining attributes for
paths. These attributes can be defined by adding a
`.gitattributes` file to the repository, which contains a set of
file patterns and the attributes that should be set for paths
matching this pattern. When parsing gitattributes, multiple
integer overflows can occur when there is a huge number of path
patterns, a huge number of attributes for a single pattern, or
when the declared attribute names are huge. These overflows can be
triggered via a crafted `.gitattributes` file that may be part of
the commit history. Git silently splits lines longer than 2KB when
parsing gitattributes from a file, but not when parsing them from
the index. Consequentially, the failure mode depends on whether
the file exists in the working tree, the index or both. This
integer overflow can result in arbitrary heap reads and writes,
which may result in remote code execution.

CVE-2022-41903

`git log` can display commits in an arbitrary format using its
`--format` specifiers. This functionality is also exposed to `git
archive` via the `export-subst` gitattribute. When processing the
padding operators, there is a integer overflow in
`pretty.c::format_and_pad_commit()` where a `size_t` is stored
improperly as an `int`, and then added as an offset to a
`memcpy()`. This overflow can be triggered directly by a user
running a command which invokes the commit formatting machinery
(e.g., `git log --format=...`). It may also be triggered
indirectly through git archive via the export-subst mechanism,
which expands format specifiers inside of files within the
repository during a git archive. This integer overflow can result
in arbitrary heap writes, which may result in arbitrary code
execution.

For Debian 10 buster, these problems have been fixed in version
1:2.20.1-2+deb10u7.

We recommend that you upgrade your git packages.

For the detailed security status of git please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/git

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

69.3%