Name | CVE-2023-22490 |
Description | Git is a revision control system. Using a specially-crafted repository, Git prior to versions 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, and 2.30.8 can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source `$GIT_DIR/objects` directory contains symbolic links, the `objects` directory itself may still be a symbolic link. These two may be combined to include arbitrary files based on known paths on the victim's filesystem within the malicious repository's working copy, allowing for data exfiltration in a similar manner as CVE-2022-39253. A fix has been prepared and will appear in v2.39.2 v2.38.4 v2.37.6 v2.36.5 v2.35.7 v2.34.7 v2.33.7 v2.32.6, v2.31.7 and v2.30.8. If upgrading is impractical, two short-term workarounds are available. Avoid cloning repositories from untrusted sources with `--recurse-submodules`. Instead, consider cloning repositories without recursively cloning their submodules, and instead run `git submodule update` at each layer. Before doing so, inspect each new `.gitmodules` file to ensure that it does not contain suspicious module URLs. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3338-1, DSA-5357-1, ELA-808-1 |
Debian Bugs | 1031310 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
git (PTS) | jessie, jessie (lts) | 1:2.1.4-2.1+deb8u14 | fixed |
stretch (security) | 1:2.11.0-3+deb9u7 | vulnerable | |
stretch (lts), stretch | 1:2.11.0-3+deb9u11 | fixed | |
buster (security), buster, buster (lts) | 1:2.20.1-2+deb10u9 | fixed | |
bullseye | 1:2.30.2-1+deb11u2 | fixed | |
bullseye (security) | 1:2.30.2-1+deb11u3 | fixed | |
bookworm (security), bookworm | 1:2.39.5-0+deb12u1 | fixed | |
trixie | 1:2.45.2-1 | fixed | |
sid | 1:2.45.2-1.2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
git | source | jessie | 1:2.1.4-2.1+deb8u13 | ELA-808-1 | ||
git | source | stretch | 1:2.11.0-3+deb9u10 | ELA-808-1 | ||
git | source | buster | 1:2.20.1-2+deb10u8 | DLA-3338-1 | ||
git | source | bullseye | 1:2.30.2-1+deb11u2 | DSA-5357-1 | ||
git | source | (unstable) | 1:2.39.2-1 | 1031310 |
https://www.openwall.com/lists/oss-security/2023/02/14/5
https://github.com/git/git/commit/58325b93c5b6212697b088371809e9948fee8052 (v2.30.8)
https://github.com/git/git/commit/cf8f6ce02a13f4d1979a53241afbee15a293fce9 (v2.30.8)
https://github.com/git/git/commit/bffc762f87ae8d18c6001bf0044a76004245754c (v2.30.8)