CVE-2022-41903
Publication date 17 January 2023
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Git is distributed revision control system. `git log` can display commits in an arbitrary format using its `--format` specifiers. This functionality is also exposed to `git archive` via the `export-subst` gitattribute. When processing the padding operators, there is a integer overflow in `pretty.c::format_and_pad_commit()` where a `size_t` is stored improperly as an `int`, and then added as an offset to a `memcpy()`. This overflow can be triggered directly by a user running a command which invokes the commit formatting machinery (e.g., `git log --format=...`). It may also be triggered indirectly through git archive via the export-subst mechanism, which expands format specifiers inside of files within the repository during a git archive. This integer overflow can result in arbitrary heap writes, which may result in arbitrary code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. Users who are unable to upgrade should disable `git archive` in untrusted repositories. If you expose git archive via `git daemon`, disable it by running `git config --global daemon.uploadArch false`.
Status
Package | Ubuntu Release | Status |
---|---|---|
git | ||
22.04 LTS jammy |
Fixed 1:2.34.1-1ubuntu1.6
|
|
20.04 LTS focal |
Fixed 1:2.25.1-1ubuntu3.8
|
|
18.04 LTS bionic |
Fixed 1:2.17.1-1ubuntu0.15
|
|
16.04 LTS xenial |
Fixed 1:2.7.4-0ubuntu1.10+esm4
|
|
14.04 LTS trusty |
Fixed 1:1.9.1-1ubuntu0.10+esm1
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProSeverity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 · Critical |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-5810-1
- Git vulnerabilities
- 17 January 2023
- USN-5810-3
- Git vulnerabilities
- 7 February 2023
- USN-5810-4
- Git vulnerabilities
- 1 March 2023