Name | CVE-2022-39253 |
Description | Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3239-1, DSA-5332-1, ELA-788-1, ELA-803-1 |
Debian Bugs | 1022046 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
git (PTS) | jessie, jessie (lts) | 1:2.1.4-2.1+deb8u14 | fixed |
stretch (security) | 1:2.11.0-3+deb9u7 | vulnerable | |
stretch (lts), stretch | 1:2.11.0-3+deb9u11 | fixed | |
buster (security), buster, buster (lts) | 1:2.20.1-2+deb10u9 | fixed | |
bullseye | 1:2.30.2-1+deb11u2 | fixed | |
bullseye (security) | 1:2.30.2-1+deb11u3 | fixed | |
bookworm (security), bookworm | 1:2.39.5-0+deb12u1 | fixed | |
trixie | 1:2.45.2-1 | fixed | |
sid | 1:2.45.2-1.2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
git | source | jessie | 1:2.1.4-2.1+deb8u12 | ELA-803-1 | ||
git | source | stretch | 1:2.11.0-3+deb9u9 | ELA-788-1 | ||
git | source | buster | 1:2.20.1-2+deb10u5 | DLA-3239-1 | ||
git | source | bullseye | 1:2.30.2-1+deb11u1 | DSA-5332-1 | ||
git | source | (unstable) | 1:2.38.1-1 | 1022046 |
https://www.openwall.com/lists/oss-security/2022/10/18/5
https://lore.kernel.org/git/xmqq4jw1uku5.fsf@gitster.g/T/#u
https://github.com/git/git/commit/6f054f9fb3a501c35b55c65e547a244f14c38d56 (v2.30.6)
https://github.com/git/git/commit/7de0c306f7b758d3fb537c18c2751f6250cea7a0 (v2.30.6)
https://github.com/git/git/commit/8a96dbcb339d25ba1813632319ea4052bc586ddf (v2.30.6)
https://github.com/git/git/commit/99f4abb8dae4c9c604e5d5cf255958bbe537b928 (v2.30.6)
https://github.com/git/git/commit/f8d510ed0b357787c8d035d64f240bd82b424dc4 (v2.30.6)
https://github.com/git/git/commit/ac7e57fa288260341bdbd5e9abcdd24eaf214740 (v2.30.6)
https://github.com/git/git/commit/225d2d50ccef4baae410a96b9dc9e3978d164826 (v2.30.6)
https://github.com/git/git/commit/0f21b8f468566b991eea60bb7bdf2fce9265e367 (v2.30.6)
https://github.com/git/git/commit/0d3beb71dad7906f576b0de9cea32164549163fe (v2.30.6)
https://github.com/git/git/commit/f4a32a550f9d40471fb42ed1e5c8612dfe4a83b1 (v2.30.6)
https://github.com/git/git/commit/a1d4f67c12ac172f835e6d5e4e0a197075e2146b (v2.30.6)