CVE-2022-39260
Publication date 18 October 2022
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Git is an open source, scalable, distributed revision control system. `git shell` is a restricted login shell that can be used to implement Git's push/pull functionality via SSH. In versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4, the function that splits the command arguments into an array improperly uses an `int` to represent the number of entries in the array, allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap writes. Because the resulting array is then passed to `execv()`, it is possible to leverage this attack to gain remote code execution on a victim machine. Note that a victim must first allow access to `git shell` as a login shell in order to be vulnerable to this attack. This problem is patched in versions 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 and users are advised to upgrade to the latest version. Disabling `git shell` access via remote logins is a viable short-term workaround.
Status
Package | Ubuntu Release | Status |
---|---|---|
git | ||
22.04 LTS jammy |
Fixed 1:2.34.1-1ubuntu1.5
|
|
20.04 LTS focal |
Fixed 1:2.25.1-1ubuntu3.6
|
|
18.04 LTS bionic |
Fixed 1:2.17.1-1ubuntu0.13
|
|
16.04 LTS xenial |
Fixed 1:2.7.4-0ubuntu1.10+esm3
|
|
14.04 LTS trusty | Ignored end of standard support |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProSeverity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-5686-1
- Git vulnerabilities
- 18 October 2022
- USN-5686-2
- Git vulnerability
- 17 November 2022
- USN-5686-3
- Git vulnerabilities
- 21 November 2022