2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-41903" ,
"sourceIdentifier" : "security-advisories@github.com" ,
"published" : "2023-01-17T23:15:15.690" ,
2023-12-27 11:00:28 +00:00
"lastModified" : "2023-12-27T10:15:37.930" ,
"vulnStatus" : "Modified" ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Git is distributed revision control system. `git log` can display commits in an arbitrary format using its `--format` specifiers. This functionality is also exposed to `git archive` via the `export-subst` gitattribute. When processing the padding operators, there is a integer overflow in `pretty.c::format_and_pad_commit()` where a `size_t` is stored improperly as an `int`, and then added as an offset to a `memcpy()`. This overflow can be triggered directly by a user running a command which invokes the commit formatting machinery (e.g., `git log --format=...`). It may also be triggered indirectly through git archive via the export-subst mechanism, which expands format specifiers inside of files within the repository during a git archive. This integer overflow can result in arbitrary heap writes, which may result in arbitrary code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. Users who are unable to upgrade should disable `git archive` in untrusted repositories. If you expose git archive via `git daemon`, disable it by running `git config --global daemon.uploadArch false`."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
} ,
{
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "security-advisories@github.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-190"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.30.6" ,
"matchCriteriaId" : "8D0B133C-FC2B-4CBF-8840-C85F6D650510"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.31.0" ,
"versionEndIncluding" : "2.31.5" ,
"matchCriteriaId" : "BA5113C4-D095-4E76-A6C6-F849E11DFA9D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.32.0" ,
"versionEndIncluding" : "2.32.4" ,
"matchCriteriaId" : "B82E8E87-1083-45B9-A273-E6AB31548D56"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.33.0" ,
"versionEndIncluding" : "2.33.5" ,
"matchCriteriaId" : "C9162726-CACE-4CB9-ACDE-204655D6BB3B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.34.0" ,
"versionEndIncluding" : "2.34.5" ,
"matchCriteriaId" : "65D149AF-5604-4109-A60B-CB7B5BBBEE87"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.35.0" ,
"versionEndIncluding" : "2.35.5" ,
"matchCriteriaId" : "383C057B-98D3-4AC6-9D43-AE13CC81FEC4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.36.0" ,
"versionEndIncluding" : "2.36.3" ,
"matchCriteriaId" : "7B191BB2-D3C9-440D-8F7F-237BE0CBDB96"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.37.0" ,
"versionEndIncluding" : "2.37.4" ,
"matchCriteriaId" : "E3F7AE8C-A383-442C-8E74-7BC13E8B251D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.38.0" ,
"versionEndIncluding" : "2.38.2" ,
"matchCriteriaId" : "28F8851A-1566-4F16-AEC4-2C09AC866C2A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:git-scm:git:2.39.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC98AC76-7F3E-45A0-9DE6-3D097CEE5199"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://git-scm.com/book/en/v2/Customizing-Git-Git-Attributes#_export_subst" ,
"source" : "security-advisories@github.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://git-scm.com/docs/pretty-formats#Documentation/pretty-formats.txt-emltltNgttruncltruncmtruncem" ,
"source" : "security-advisories@github.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://github.com/git/git/commit/508386c6c5857b4faa2c3e491f422c98cc69ae76" ,
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch" ,
"Release Notes" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/git/git/security/advisories/GHSA-475x-2q3q-hvwq" ,
"source" : "security-advisories@github.com" ,
"tags" : [
"Third Party Advisory"
]
2023-12-27 11:00:28 +00:00
} ,
{
"url" : "https://security.gentoo.org/glsa/202312-15" ,
"source" : "security-advisories@github.com"
2023-04-24 12:24:31 +02:00
}
]
}