[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3282-1] git security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3282-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Sylvain Beucler
January 26, 2023                              https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : git
Version        : 1:2.20.1-2+deb10u7
CVE ID         : CVE-2022-23521 CVE-2022-41903
Debian Bug     : 1029114

Two vulnerabilities were discovered in Git, a distributed revision
control system. An attacker may trigger code execution in specific
situations.

CVE-2022-23521

    gitattributes are a mechanism to allow defining attributes for
    paths. These attributes can be defined by adding a
    `.gitattributes` file to the repository, which contains a set of
    file patterns and the attributes that should be set for paths
    matching this pattern. When parsing gitattributes, multiple
    integer overflows can occur when there is a huge number of path
    patterns, a huge number of attributes for a single pattern, or
    when the declared attribute names are huge. These overflows can be
    triggered via a crafted `.gitattributes` file that may be part of
    the commit history. Git silently splits lines longer than 2KB when
    parsing gitattributes from a file, but not when parsing them from
    the index. Consequentially, the failure mode depends on whether
    the file exists in the working tree, the index or both. This
    integer overflow can result in arbitrary heap reads and writes,
    which may result in remote code execution.

CVE-2022-41903

    `git log` can display commits in an arbitrary format using its
    `--format` specifiers. This functionality is also exposed to `git
    archive` via the `export-subst` gitattribute. When processing the
    padding operators, there is a integer overflow in
    `pretty.c::format_and_pad_commit()` where a `size_t` is stored
    improperly as an `int`, and then added as an offset to a
    `memcpy()`. This overflow can be triggered directly by a user
    running a command which invokes the commit formatting machinery
    (e.g., `git log --format=...`). It may also be triggered
    indirectly through git archive via the export-subst mechanism,
    which expands format specifiers inside of files within the
    repository during a git archive. This integer overflow can result
    in arbitrary heap writes, which may result in arbitrary code
    execution.

For Debian 10 buster, these problems have been fixed in version
1:2.20.1-2+deb10u7.

We recommend that you upgrade your git packages.

For the detailed security status of git please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/git

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=pn7F
-----END PGP SIGNATURE-----


Reply to: