Discussion:
Upcoming git fix release 2.39.2
(too old to reply)
Randall
2023-02-14 18:40:50 UTC
Permalink
A git fix release has just been released. ITUGLIB is currently running through a built/test cycle. I will post an update when ready. The following CVEs are corrected by to this fix release:

* CVE-2023-22490:

Using a specially-crafted repository, Git can be tricked into using
its local clone optimization even when using a non-local transport.
Though Git will abort local clones whose source $GIT_DIR/objects
directory contains symbolic links (c.f., CVE-2022-39253), the objects
directory itself may still be a symbolic link.

These two may be combined to include arbitrary files based on known
paths on the victim's filesystem within the malicious repository's
working copy, allowing for data exfiltration in a similar manner as
CVE-2022-39253.

* CVE-2023-23946:

By feeding a crafted input to "git apply", a path outside the working tree can be overwritten as the user who is running "git apply".
Randall
2023-02-14 19:06:16 UTC
Permalink
Post by Randall
Using a specially-crafted repository, Git can be tricked into using
its local clone optimization even when using a non-local transport.
Though Git will abort local clones whose source $GIT_DIR/objects
directory contains symbolic links (c.f., CVE-2022-39253), the objects
directory itself may still be a symbolic link.
These two may be combined to include arbitrary files based on known
paths on the victim's filesystem within the malicious repository's
working copy, allowing for data exfiltration in a similar manner as
CVE-2022-39253.
By feeding a crafted input to "git apply", a path outside the working tree can be overwritten as the user who is running "git apply".
I should point out that this fix set also applies to prior versions. If you need a prior version of git, please post the request. I cannot guarantee that we can do it, but will try.
Randall
2023-02-15 19:51:34 UTC
Permalink
Post by Randall
Post by Randall
Using a specially-crafted repository, Git can be tricked into using
its local clone optimization even when using a non-local transport.
Though Git will abort local clones whose source $GIT_DIR/objects
directory contains symbolic links (c.f., CVE-2022-39253), the objects
directory itself may still be a symbolic link.
These two may be combined to include arbitrary files based on known
paths on the victim's filesystem within the malicious repository's
working copy, allowing for data exfiltration in a similar manner as
CVE-2022-39253.
By feeding a crafted input to "git apply", a path outside the working tree can be overwritten as the user who is running "git apply".
I should point out that this fix set also applies to prior versions. If you need a prior version of git, please post the request. I cannot guarantee that we can do it, but will try.
For you git build/test fans, t1450 fails on 2.39.x, but this in the test infrastructure, not in git itself. So nothing to worry about. Same as t1800 and t9001. The release is being deployed.
Loading...