Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
10 Jun 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Dec 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
References |
|
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html - Mailing List, Third Party Advisory |
14 Dec 2022, 01:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* |
|
References |
|
|
References | (FULLDISC) http://seclists.org/fulldisclosure/2022/Nov/1 - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKFHE4KVD7EKS5J3KTDFVBEKU3CLXGVV/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VFYXCTLOSESYIP72BUYD6ECDIMUM4WMB/ - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/kb/HT213496 - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OHNO2FB55CPX47BAXMBWUBGWHO6N6ZZH/ - Mailing List, Third Party Advisory |
08 Nov 2022, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Nov 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Oct 2022, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Oct 2022, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Oct 2022, 17:44
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-59 | |
References | (CONFIRM) https://github.com/git/git/security/advisories/GHSA-3wp6-j8xr-qw85 - Mitigation, Third Party Advisory | |
CPE | cpe:2.3:a:git-scm:git:2.38.0:*:*:*:*:*:*:* cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:* |
19 Oct 2022, 12:43
Type | Values Removed | Values Added |
---|---|---|
Summary | Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`. |
19 Oct 2022, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-19 11:15
Updated : 2024-06-10 18:15
NVD link : CVE-2022-39253
Mitre link : CVE-2022-39253
CVE.ORG link : CVE-2022-39253
JSON object : View
Products Affected
fedoraproject
- fedora
debian
- debian_linux
apple
- xcode
git-scm
- git