Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-23521
HistoryJan 17, 2023 - 12:00 a.m.

CVE-2022-23521

2023-01-1700:00:00
ubuntu.com
ubuntu.com
42
git
integer overflow
gitattributes
parsing
remote code execution
upgrade
unix

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.025

Percentile

90.4%

Git is distributed revision control system. gitattributes are a mechanism
to allow defining attributes for paths. These attributes can be defined by
adding a .gitattributes file to the repository, which contains a set of
file patterns and the attributes that should be set for paths matching this
pattern. When parsing gitattributes, multiple integer overflows can occur
when there is a huge number of path patterns, a huge number of attributes
for a single pattern, or when the declared attribute names are huge. These
overflows can be triggered via a crafted .gitattributes file that may be
part of the commit history. Git silently splits lines longer than 2KB when
parsing gitattributes from a file, but not when parsing them from the
index. Consequentially, the failure mode depends on whether the file exists
in the working tree, the index or both. This integer overflow can result in
arbitrary heap reads and writes, which may result in remote code execution.
The problem has been patched in the versions published on 2023-01-17, going
back to v2.30.7. Users are advised to upgrade. There are no known
workarounds for this issue.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchgit< 1:2.17.1-1ubuntu0.15UNKNOWN
ubuntu20.04noarchgit< 1:2.25.1-1ubuntu3.8UNKNOWN
ubuntu22.04noarchgit< 1:2.34.1-1ubuntu1.6UNKNOWN
ubuntu22.10noarchgit< 1:2.37.2-1ubuntu1.2UNKNOWN
ubuntu23.04noarchgit< 1:2.39.1-0.1ubuntu1UNKNOWN
ubuntu14.04noarchgit< 1:1.9.1-1ubuntu0.10+esm1UNKNOWN
ubuntu16.04noarchgit< 1:2.7.4-0ubuntu1.10+esm4UNKNOWN

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.025

Percentile

90.4%