CVE-2022-23521
Publication date 17 January 2023
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Git is distributed revision control system. gitattributes are a mechanism to allow defining attributes for paths. These attributes can be defined by adding a `.gitattributes` file to the repository, which contains a set of file patterns and the attributes that should be set for paths matching this pattern. When parsing gitattributes, multiple integer overflows can occur when there is a huge number of path patterns, a huge number of attributes for a single pattern, or when the declared attribute names are huge. These overflows can be triggered via a crafted `.gitattributes` file that may be part of the commit history. Git silently splits lines longer than 2KB when parsing gitattributes from a file, but not when parsing them from the index. Consequentially, the failure mode depends on whether the file exists in the working tree, the index or both. This integer overflow can result in arbitrary heap reads and writes, which may result in remote code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. There are no known workarounds for this issue.
Status
Package | Ubuntu Release | Status |
---|---|---|
git | ||
22.04 LTS jammy |
Fixed 1:2.34.1-1ubuntu1.6
|
|
20.04 LTS focal |
Fixed 1:2.25.1-1ubuntu3.8
|
|
18.04 LTS bionic |
Fixed 1:2.17.1-1ubuntu0.15
|
|
16.04 LTS xenial |
Fixed 1:2.7.4-0ubuntu1.10+esm4
|
|
14.04 LTS trusty |
Fixed 1:1.9.1-1ubuntu0.10+esm1
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProSeverity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 · Critical |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-5810-1
- Git vulnerabilities
- 17 January 2023
- USN-5810-3
- Git vulnerabilities
- 7 February 2023
- USN-5810-4
- Git vulnerabilities
- 1 March 2023