Severity
8.8HIGH
EPSS
2.2%
top 15.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 19
Latest updateNov 21

Description

Git is an open source, scalable, distributed revision control system. `git shell` is a restricted login shell that can be used to implement Git's push/pull functionality via SSH. In versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4, the function that splits the command arguments into an array improperly uses an `int` to represent the number of entries in the array, allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 1.8 | Impact: 6.0

Affected Packages5 packages

NVDapple/xcode< 14.1
CVEListV5git/git< 2.30.6+7
NVDgit-scm/git2.31.02.31.5+8
Debiangit< 1:2.30.2-1+deb11u1+3
Ubuntugit< 1:2.17.1-1ubuntu0.13+3

Also affects: Debian Linux 10.0, Fedora 35, 36, 37

🔴Vulnerability Details

4
OSV
git vulnerability2022-11-17
OSV
CVE-2022-39260: Git is an open source, scalable, distributed revision control system2022-10-19
CVEList
Git vulnerable to Remote Code Execution via Heap overflow in `git shell`2022-10-19
OSV
git vulnerabilities2022-10-18

📋Vendor Advisories

6
Ubuntu
Git vulnerabilities2022-11-21
Ubuntu
Git vulnerability2022-11-17
Apple
CVE-2022-39260: Xcode 14.12022-11-01
Red Hat
git: git shell function that splits command arguments can lead to arbitrary heap writes.2022-10-18
Ubuntu
Git vulnerabilities2022-10-18