Bug 2168160 (CVE-2023-22490)

Summary: CVE-2023-22490 git: data exfiltration with maliciously crafted repository
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bdettelb, caswilli, chazlett, fjansen, hkataria, jburrell, jkoehler, kaycoth, kshier, kyoshida, opohorel, pjindal, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in Git. Using a specially-crafted repository, Git can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source $GIT_DIR/objects directory contains symbolic links (CVE-2022-39253), the objects directory may still be a symbolic link.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-05-22 12:43:05 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2168198, 2168199, 2170907, 2189872, 2189976, 2190157    
Bug Blocks: 2168115    

Description TEJ RATHI 2023-02-08 10:44:14 UTC
Using a specially-crafted repository, Git can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source $GIT_DIR/objects directory contains symbolic links (c.f., CVE-2022-39253), the objects directory itself may still be a symbolic link.

These two may be combined to include arbitrary files based on known paths on the victim's filesystem within the malicious repository's working copy, allowing for data exfiltration in a similar manner as CVE-2022-39253.

Comment 3 Sandipan Roy 2023-02-17 15:46:48 UTC
Created git tracking bugs for this issue:

Affects: fedora-all [bug 2170907]

Comment 4 errata-xmlrpc 2023-05-22 07:03:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:3245 https://access.redhat.com/errata/RHSA-2023:3245

Comment 5 errata-xmlrpc 2023-05-22 07:04:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:3246 https://access.redhat.com/errata/RHSA-2023:3246

Comment 6 Product Security DevOps Team 2023-05-22 12:43:02 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-22490

Comment 8 errata-xmlrpc 2024-01-24 16:41:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:0407 https://access.redhat.com/errata/RHSA-2024:0407