CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
90.4%
Git is distributed revision control system. gitattributes are a mechanism
to allow defining attributes for paths. These attributes can be defined by
adding a .gitattributes
file to the repository, which contains a set of
file patterns and the attributes that should be set for paths matching this
pattern. When parsing gitattributes, multiple integer overflows can occur
when there is a huge number of path patterns, a huge number of attributes
for a single pattern, or when the declared attribute names are huge. These
overflows can be triggered via a crafted .gitattributes
file that may be
part of the commit history. Git silently splits lines longer than 2KB when
parsing gitattributes from a file, but not when parsing them from the
index. Consequentially, the failure mode depends on whether the file exists
in the working tree, the index or both. This integer overflow can result in
arbitrary heap reads and writes, which may result in remote code execution.
The problem has been patched in the versions published on 2023-01-17, going
back to v2.30.7. Users are advised to upgrade. There are no known
workarounds for this issue.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | git | < 1:2.17.1-1ubuntu0.15 | UNKNOWN |
ubuntu | 20.04 | noarch | git | < 1:2.25.1-1ubuntu3.8 | UNKNOWN |
ubuntu | 22.04 | noarch | git | < 1:2.34.1-1ubuntu1.6 | UNKNOWN |
ubuntu | 22.10 | noarch | git | < 1:2.37.2-1ubuntu1.2 | UNKNOWN |
ubuntu | 23.04 | noarch | git | < 1:2.39.1-0.1ubuntu1 | UNKNOWN |
ubuntu | 14.04 | noarch | git | < 1:1.9.1-1ubuntu0.10+esm1 | UNKNOWN |
ubuntu | 16.04 | noarch | git | < 1:2.7.4-0ubuntu1.10+esm4 | UNKNOWN |
github.com/git/git/security/advisories/GHSA-c738-c5qq-xg89
launchpad.net/bugs/cve/CVE-2022-23521
nvd.nist.gov/vuln/detail/CVE-2022-23521
security-tracker.debian.org/tracker/CVE-2022-23521
ubuntu.com/security/notices/USN-5810-1
ubuntu.com/security/notices/USN-5810-2
ubuntu.com/security/notices/USN-5810-3
ubuntu.com/security/notices/USN-5810-4
www.cve.org/CVERecord?id=CVE-2022-23521