Bug 2168160 (CVE-2023-22490) - CVE-2023-22490 git: data exfiltration with maliciously crafted repository
Summary: CVE-2023-22490 git: data exfiltration with maliciously crafted repository
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2023-22490
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: Red Hat2168198 Red Hat2168199 2170907 Red Hat2189872 Red Hat2189976 Red Hat2190157
Blocks: Embargoed2168115
TreeView+ depends on / blocked
 
Reported: 2023-02-08 10:44 UTC by TEJ RATHI
Modified: 2023-05-29 00:39 UTC (History)
13 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in Git. Using a specially-crafted repository, Git can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source $GIT_DIR/objects directory contains symbolic links (CVE-2022-39253), the objects directory may still be a symbolic link.
Clone Of:
Environment:
Last Closed: 2023-05-22 12:43:05 UTC


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2023:3250 0 None None None 2023-05-22 10:37:52 UTC
Red Hat Product Errata RHBA-2023:3251 0 None None None 2023-05-22 11:26:45 UTC
Red Hat Product Errata RHBA-2023:3252 0 None None None 2023-05-22 11:28:57 UTC
Red Hat Product Errata RHBA-2023:3253 0 None None None 2023-05-22 11:29:02 UTC
Red Hat Product Errata RHBA-2023:3254 0 None None None 2023-05-22 14:34:40 UTC
Red Hat Product Errata RHBA-2023:3255 0 None None None 2023-05-22 16:25:00 UTC
Red Hat Product Errata RHBA-2023:3274 0 None None None 2023-05-23 13:14:02 UTC
Red Hat Product Errata RHBA-2023:3284 0 None None None 2023-05-24 05:17:38 UTC
Red Hat Product Errata RHBA-2023:3285 0 None None None 2023-05-24 05:19:05 UTC
Red Hat Product Errata RHBA-2023:3312 0 None None None 2023-05-25 09:42:09 UTC
Red Hat Product Errata RHBA-2023:3314 0 None None None 2023-05-25 09:42:03 UTC
Red Hat Product Errata RHBA-2023:3315 0 None None None 2023-05-25 09:43:58 UTC
Red Hat Product Errata RHBA-2023:3316 0 None None None 2023-05-25 09:42:20 UTC
Red Hat Product Errata RHBA-2023:3317 0 None None None 2023-05-25 09:52:41 UTC
Red Hat Product Errata RHBA-2023:3324 0 None None None 2023-05-25 13:45:34 UTC
Red Hat Product Errata RHBA-2023:3337 0 None None None 2023-05-29 00:39:14 UTC
Red Hat Product Errata RHSA-2023:3245 0 None None None 2023-05-22 07:04:00 UTC
Red Hat Product Errata RHSA-2023:3246 0 None None None 2023-05-22 07:04:36 UTC

Description TEJ RATHI 2023-02-08 10:44:14 UTC
Using a specially-crafted repository, Git can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source $GIT_DIR/objects directory contains symbolic links (c.f., CVE-2022-39253), the objects directory itself may still be a symbolic link.

These two may be combined to include arbitrary files based on known paths on the victim's filesystem within the malicious repository's working copy, allowing for data exfiltration in a similar manner as CVE-2022-39253.

Comment 3 Sandipan Roy 2023-02-17 15:46:48 UTC
Created git tracking bugs for this issue:

Affects: fedora-all [bug 2170907]

Comment 4 errata-xmlrpc 2023-05-22 07:03:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:3245 https://access.redhat.com/errata/RHSA-2023:3245

Comment 5 errata-xmlrpc 2023-05-22 07:04:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:3246 https://access.redhat.com/errata/RHSA-2023:3246

Comment 6 Product Security DevOps Team 2023-05-22 12:43:02 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-22490


Note You need to log in before you can comment on or make changes to this bug.