Skip to content

Commit 3748b5b

Browse files
committed
Merge branch 'maint-2.33' into maint-2.34
2 parents be85cfc + 7fe9bf5 commit 3748b5b

17 files changed

+546
-125
lines changed

Documentation/RelNotes/2.30.7.txt

Lines changed: 86 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,86 @@
1+
Git v2.30.7 Release Notes
2+
=========================
3+
4+
This release addresses the security issues CVE-2022-41903 and
5+
CVE-2022-23521.
6+
7+
8+
Fixes since v2.30.6
9+
-------------------
10+
11+
* CVE-2022-41903:
12+
13+
git log has the ability to display commits using an arbitrary
14+
format with its --format specifiers. This functionality is also
15+
exposed to git archive via the export-subst gitattribute.
16+
17+
When processing the padding operators (e.g., %<(, %<|(, %>(,
18+
%>>(, or %><( ), an integer overflow can occur in
19+
pretty.c::format_and_pad_commit() where a size_t is improperly
20+
stored as an int, and then added as an offset to a subsequent
21+
memcpy() call.
22+
23+
This overflow can be triggered directly by a user running a
24+
command which invokes the commit formatting machinery (e.g., git
25+
log --format=...). It may also be triggered indirectly through
26+
git archive via the export-subst mechanism, which expands format
27+
specifiers inside of files within the repository during a git
28+
archive.
29+
30+
This integer overflow can result in arbitrary heap writes, which
31+
may result in remote code execution.
32+
33+
* CVE-2022-23521:
34+
35+
gitattributes are a mechanism to allow defining attributes for
36+
paths. These attributes can be defined by adding a `.gitattributes`
37+
file to the repository, which contains a set of file patterns and
38+
the attributes that should be set for paths matching this pattern.
39+
40+
When parsing gitattributes, multiple integer overflows can occur
41+
when there is a huge number of path patterns, a huge number of
42+
attributes for a single pattern, or when the declared attribute
43+
names are huge.
44+
45+
These overflows can be triggered via a crafted `.gitattributes` file
46+
that may be part of the commit history. Git silently splits lines
47+
longer than 2KB when parsing gitattributes from a file, but not when
48+
parsing them from the index. Consequentially, the failure mode
49+
depends on whether the file exists in the working tree, the index or
50+
both.
51+
52+
This integer overflow can result in arbitrary heap reads and writes,
53+
which may result in remote code execution.
54+
55+
Credit for finding CVE-2022-41903 goes to Joern Schneeweisz of GitLab.
56+
An initial fix was authored by Markus Vervier of X41 D-Sec. Credit for
57+
finding CVE-2022-23521 goes to Markus Vervier and Eric Sesterhenn of X41
58+
D-Sec. This work was sponsored by OSTIF.
59+
60+
The proposed fixes have been polished and extended to cover additional
61+
findings by Patrick Steinhardt of GitLab, with help from others on the
62+
Git security mailing list.
63+
64+
Patrick Steinhardt (21):
65+
attr: fix overflow when upserting attribute with overly long name
66+
attr: fix out-of-bounds read with huge attribute names
67+
attr: fix integer overflow when parsing huge attribute names
68+
attr: fix out-of-bounds write when parsing huge number of attributes
69+
attr: fix out-of-bounds read with unreasonable amount of patterns
70+
attr: fix integer overflow with more than INT_MAX macros
71+
attr: harden allocation against integer overflows
72+
attr: fix silently splitting up lines longer than 2048 bytes
73+
attr: ignore attribute lines exceeding 2048 bytes
74+
attr: ignore overly large gitattributes files
75+
pretty: fix out-of-bounds write caused by integer overflow
76+
pretty: fix out-of-bounds read when left-flushing with stealing
77+
pretty: fix out-of-bounds read when parsing invalid padding format
78+
pretty: fix adding linefeed when placeholder is not expanded
79+
pretty: fix integer overflow in wrapping format
80+
utf8: fix truncated string lengths in `utf8_strnwidth()`
81+
utf8: fix returning negative string width
82+
utf8: fix overflow when returning string width
83+
utf8: fix checking for glyph width in `strbuf_utf8_replace()`
84+
utf8: refactor `strbuf_utf8_replace` to not rely on preallocated buffer
85+
pretty: restrict input lengths for padding and wrapping formats
86+

Documentation/RelNotes/2.31.6.txt

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
Git v2.31.6 Release Notes
2+
=========================
3+
4+
This release merges the security fix that appears in v2.30.7; see
5+
the release notes for that version for details.

Documentation/RelNotes/2.32.5.txt

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
Git v2.32.5 Release Notes
2+
=========================
3+
4+
This release merges the security fix that appears in v2.30.7; see
5+
the release notes for that version for details.
6+
7+
In addition, included are additional code for "git fsck" to check
8+
for questionable .gitattributes files.

Documentation/RelNotes/2.33.6.txt

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
Git v2.33.6 Release Notes
2+
=========================
3+
4+
This release merges the security fix that appears in v2.30.7; see
5+
the release notes for that version for details.

attr.c

Lines changed: 56 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ static const char git_attr__unknown[] = "(builtin)unknown";
2929
#endif
3030

3131
struct git_attr {
32-
int attr_nr; /* unique attribute number */
32+
unsigned int attr_nr; /* unique attribute number */
3333
char name[FLEX_ARRAY]; /* attribute name */
3434
};
3535

@@ -211,7 +211,7 @@ static void report_invalid_attr(const char *name, size_t len,
211211
* dictionary. If no entry is found, create a new attribute and store it in
212212
* the dictionary.
213213
*/
214-
static const struct git_attr *git_attr_internal(const char *name, int namelen)
214+
static const struct git_attr *git_attr_internal(const char *name, size_t namelen)
215215
{
216216
struct git_attr *a;
217217

@@ -227,8 +227,8 @@ static const struct git_attr *git_attr_internal(const char *name, int namelen)
227227
a->attr_nr = hashmap_get_size(&g_attr_hashmap.map);
228228

229229
attr_hashmap_add(&g_attr_hashmap, a->name, namelen, a);
230-
assert(a->attr_nr ==
231-
(hashmap_get_size(&g_attr_hashmap.map) - 1));
230+
if (a->attr_nr != hashmap_get_size(&g_attr_hashmap.map) - 1)
231+
die(_("unable to add additional attribute"));
232232
}
233233

234234
hashmap_unlock(&g_attr_hashmap);
@@ -273,7 +273,7 @@ struct match_attr {
273273
const struct git_attr *attr;
274274
} u;
275275
char is_macro;
276-
unsigned num_attr;
276+
size_t num_attr;
277277
struct attr_state state[FLEX_ARRAY];
278278
};
279279

@@ -294,7 +294,7 @@ static const char *parse_attr(const char *src, int lineno, const char *cp,
294294
struct attr_state *e)
295295
{
296296
const char *ep, *equals;
297-
int len;
297+
size_t len;
298298

299299
ep = cp + strcspn(cp, blank);
300300
equals = strchr(cp, '=');
@@ -338,8 +338,7 @@ static const char *parse_attr(const char *src, int lineno, const char *cp,
338338
static struct match_attr *parse_attr_line(const char *line, const char *src,
339339
int lineno, unsigned flags)
340340
{
341-
int namelen;
342-
int num_attr, i;
341+
size_t namelen, num_attr, i;
343342
const char *cp, *name, *states;
344343
struct match_attr *res = NULL;
345344
int is_macro;
@@ -350,6 +349,11 @@ static struct match_attr *parse_attr_line(const char *line, const char *src,
350349
return NULL;
351350
name = cp;
352351

352+
if (strlen(line) >= ATTR_MAX_LINE_LENGTH) {
353+
warning(_("ignoring overly long attributes line %d"), lineno);
354+
return NULL;
355+
}
356+
353357
if (*cp == '"' && !unquote_c_style(&pattern, name, &states)) {
354358
name = pattern.buf;
355359
namelen = pattern.len;
@@ -386,10 +390,9 @@ static struct match_attr *parse_attr_line(const char *line, const char *src,
386390
goto fail_return;
387391
}
388392

389-
res = xcalloc(1,
390-
sizeof(*res) +
391-
sizeof(struct attr_state) * num_attr +
392-
(is_macro ? 0 : namelen + 1));
393+
res = xcalloc(1, st_add3(sizeof(*res),
394+
st_mult(sizeof(struct attr_state), num_attr),
395+
is_macro ? 0 : namelen + 1));
393396
if (is_macro) {
394397
res->u.attr = git_attr_internal(name, namelen);
395398
} else {
@@ -452,11 +455,12 @@ struct attr_stack {
452455

453456
static void attr_stack_free(struct attr_stack *e)
454457
{
455-
int i;
458+
unsigned i;
456459
free(e->origin);
457460
for (i = 0; i < e->num_matches; i++) {
458461
struct match_attr *a = e->attrs[i];
459-
int j;
462+
size_t j;
463+
460464
for (j = 0; j < a->num_attr; j++) {
461465
const char *setto = a->state[j].setto;
462466
if (setto == ATTR__TRUE ||
@@ -665,8 +669,8 @@ static void handle_attr_line(struct attr_stack *res,
665669
a = parse_attr_line(line, src, lineno, flags);
666670
if (!a)
667671
return;
668-
ALLOC_GROW(res->attrs, res->num_matches + 1, res->alloc);
669-
res->attrs[res->num_matches++] = a;
672+
ALLOC_GROW_BY(res->attrs, res->num_matches, 1, res->alloc);
673+
res->attrs[res->num_matches - 1] = a;
670674
}
671675

672676
static struct attr_stack *read_attr_from_array(const char **list)
@@ -706,11 +710,12 @@ void git_attr_set_direction(enum git_attr_direction new_direction)
706710

707711
static struct attr_stack *read_attr_from_file(const char *path, unsigned flags)
708712
{
713+
struct strbuf buf = STRBUF_INIT;
709714
int fd;
710715
FILE *fp;
711716
struct attr_stack *res;
712-
char buf[2048];
713717
int lineno = 0;
718+
struct stat st;
714719

715720
if (flags & READ_ATTR_NOFOLLOW)
716721
fd = open_nofollow(path, O_RDONLY);
@@ -722,15 +727,26 @@ static struct attr_stack *read_attr_from_file(const char *path, unsigned flags)
722727
return NULL;
723728
}
724729
fp = xfdopen(fd, "r");
730+
if (fstat(fd, &st)) {
731+
warning_errno(_("cannot fstat gitattributes file '%s'"), path);
732+
fclose(fp);
733+
return NULL;
734+
}
735+
if (st.st_size >= ATTR_MAX_FILE_SIZE) {
736+
warning(_("ignoring overly large gitattributes file '%s'"), path);
737+
fclose(fp);
738+
return NULL;
739+
}
725740

726741
CALLOC_ARRAY(res, 1);
727-
while (fgets(buf, sizeof(buf), fp)) {
728-
char *bufp = buf;
729-
if (!lineno)
730-
skip_utf8_bom(&bufp, strlen(bufp));
731-
handle_attr_line(res, bufp, path, ++lineno, flags);
742+
while (strbuf_getline(&buf, fp) != EOF) {
743+
if (!lineno && starts_with(buf.buf, utf8_bom))
744+
strbuf_remove(&buf, 0, strlen(utf8_bom));
745+
handle_attr_line(res, buf.buf, path, ++lineno, flags);
732746
}
747+
733748
fclose(fp);
749+
strbuf_release(&buf);
734750
return res;
735751
}
736752

@@ -741,6 +757,7 @@ static struct attr_stack *read_attr_from_index(struct index_state *istate,
741757
struct attr_stack *res;
742758
char *buf, *sp;
743759
int lineno = 0;
760+
size_t size;
744761

745762
if (!istate)
746763
return NULL;
@@ -759,9 +776,13 @@ static struct attr_stack *read_attr_from_index(struct index_state *istate,
759776
if (!path_in_cone_mode_sparse_checkout(path, istate))
760777
return NULL;
761778

762-
buf = read_blob_data_from_index(istate, path, NULL);
779+
buf = read_blob_data_from_index(istate, path, &size);
763780
if (!buf)
764781
return NULL;
782+
if (size >= ATTR_MAX_FILE_SIZE) {
783+
warning(_("ignoring overly large gitattributes blob '%s'"), path);
784+
return NULL;
785+
}
765786

766787
CALLOC_ARRAY(res, 1);
767788
for (sp = buf; *sp; ) {
@@ -1032,12 +1053,12 @@ static int macroexpand_one(struct all_attrs_item *all_attrs, int nr, int rem);
10321053
static int fill_one(const char *what, struct all_attrs_item *all_attrs,
10331054
const struct match_attr *a, int rem)
10341055
{
1035-
int i;
1056+
size_t i;
10361057

1037-
for (i = a->num_attr - 1; rem > 0 && i >= 0; i--) {
1038-
const struct git_attr *attr = a->state[i].attr;
1058+
for (i = a->num_attr; rem > 0 && i > 0; i--) {
1059+
const struct git_attr *attr = a->state[i - 1].attr;
10391060
const char **n = &(all_attrs[attr->attr_nr].value);
1040-
const char *v = a->state[i].setto;
1061+
const char *v = a->state[i - 1].setto;
10411062

10421063
if (*n == ATTR__UNKNOWN) {
10431064
debug_set(what,
@@ -1056,11 +1077,11 @@ static int fill(const char *path, int pathlen, int basename_offset,
10561077
struct all_attrs_item *all_attrs, int rem)
10571078
{
10581079
for (; rem > 0 && stack; stack = stack->prev) {
1059-
int i;
1080+
unsigned i;
10601081
const char *base = stack->origin ? stack->origin : "";
10611082

1062-
for (i = stack->num_matches - 1; 0 < rem && 0 <= i; i--) {
1063-
const struct match_attr *a = stack->attrs[i];
1083+
for (i = stack->num_matches; 0 < rem && 0 < i; i--) {
1084+
const struct match_attr *a = stack->attrs[i - 1];
10641085
if (a->is_macro)
10651086
continue;
10661087
if (path_matches(path, pathlen, basename_offset,
@@ -1091,11 +1112,11 @@ static void determine_macros(struct all_attrs_item *all_attrs,
10911112
const struct attr_stack *stack)
10921113
{
10931114
for (; stack; stack = stack->prev) {
1094-
int i;
1095-
for (i = stack->num_matches - 1; i >= 0; i--) {
1096-
const struct match_attr *ma = stack->attrs[i];
1115+
unsigned i;
1116+
for (i = stack->num_matches; i > 0; i--) {
1117+
const struct match_attr *ma = stack->attrs[i - 1];
10971118
if (ma->is_macro) {
1098-
int n = ma->u.attr->attr_nr;
1119+
unsigned int n = ma->u.attr->attr_nr;
10991120
if (!all_attrs[n].macro) {
11001121
all_attrs[n].macro = ma;
11011122
}
@@ -1147,7 +1168,7 @@ void git_check_attr(struct index_state *istate,
11471168
collect_some_attrs(istate, path, check);
11481169

11491170
for (i = 0; i < check->nr; i++) {
1150-
size_t n = check->items[i].attr->attr_nr;
1171+
unsigned int n = check->items[i].attr->attr_nr;
11511172
const char *value = check->all_attrs[n].value;
11521173
if (value == ATTR__UNKNOWN)
11531174
value = ATTR__UNSET;

attr.h

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,18 @@
107107
* - Free the `attr_check` struct by calling `attr_check_free()`.
108108
*/
109109

110+
/**
111+
* The maximum line length for a gitattributes file. If the line exceeds this
112+
* length we will ignore it.
113+
*/
114+
#define ATTR_MAX_LINE_LENGTH 2048
115+
116+
/**
117+
* The maximum size of the giattributes file. If the file exceeds this size we
118+
* will ignore it.
119+
*/
120+
#define ATTR_MAX_FILE_SIZE (100 * 1024 * 1024)
121+
110122
struct index_state;
111123

112124
/**

column.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ struct column_data {
2323
/* return length of 's' in letters, ANSI escapes stripped */
2424
static int item_length(const char *s)
2525
{
26-
return utf8_strnwidth(s, -1, 1);
26+
return utf8_strnwidth(s, strlen(s), 1);
2727
}
2828

2929
/*

0 commit comments

Comments
 (0)