Skip to content

Commit 8253c00

Browse files
committed
Merge branch 'maint-2.35' into maint-2.36
2 parents fcdaa21 + 02f4981 commit 8253c00

18 files changed

+552
-125
lines changed

Documentation/RelNotes/2.30.7.txt

Lines changed: 86 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,86 @@
1+
Git v2.30.7 Release Notes
2+
=========================
3+
4+
This release addresses the security issues CVE-2022-41903 and
5+
CVE-2022-23521.
6+
7+
8+
Fixes since v2.30.6
9+
-------------------
10+
11+
* CVE-2022-41903:
12+
13+
git log has the ability to display commits using an arbitrary
14+
format with its --format specifiers. This functionality is also
15+
exposed to git archive via the export-subst gitattribute.
16+
17+
When processing the padding operators (e.g., %<(, %<|(, %>(,
18+
%>>(, or %><( ), an integer overflow can occur in
19+
pretty.c::format_and_pad_commit() where a size_t is improperly
20+
stored as an int, and then added as an offset to a subsequent
21+
memcpy() call.
22+
23+
This overflow can be triggered directly by a user running a
24+
command which invokes the commit formatting machinery (e.g., git
25+
log --format=...). It may also be triggered indirectly through
26+
git archive via the export-subst mechanism, which expands format
27+
specifiers inside of files within the repository during a git
28+
archive.
29+
30+
This integer overflow can result in arbitrary heap writes, which
31+
may result in remote code execution.
32+
33+
* CVE-2022-23521:
34+
35+
gitattributes are a mechanism to allow defining attributes for
36+
paths. These attributes can be defined by adding a `.gitattributes`
37+
file to the repository, which contains a set of file patterns and
38+
the attributes that should be set for paths matching this pattern.
39+
40+
When parsing gitattributes, multiple integer overflows can occur
41+
when there is a huge number of path patterns, a huge number of
42+
attributes for a single pattern, or when the declared attribute
43+
names are huge.
44+
45+
These overflows can be triggered via a crafted `.gitattributes` file
46+
that may be part of the commit history. Git silently splits lines
47+
longer than 2KB when parsing gitattributes from a file, but not when
48+
parsing them from the index. Consequentially, the failure mode
49+
depends on whether the file exists in the working tree, the index or
50+
both.
51+
52+
This integer overflow can result in arbitrary heap reads and writes,
53+
which may result in remote code execution.
54+
55+
Credit for finding CVE-2022-41903 goes to Joern Schneeweisz of GitLab.
56+
An initial fix was authored by Markus Vervier of X41 D-Sec. Credit for
57+
finding CVE-2022-23521 goes to Markus Vervier and Eric Sesterhenn of X41
58+
D-Sec. This work was sponsored by OSTIF.
59+
60+
The proposed fixes have been polished and extended to cover additional
61+
findings by Patrick Steinhardt of GitLab, with help from others on the
62+
Git security mailing list.
63+
64+
Patrick Steinhardt (21):
65+
attr: fix overflow when upserting attribute with overly long name
66+
attr: fix out-of-bounds read with huge attribute names
67+
attr: fix integer overflow when parsing huge attribute names
68+
attr: fix out-of-bounds write when parsing huge number of attributes
69+
attr: fix out-of-bounds read with unreasonable amount of patterns
70+
attr: fix integer overflow with more than INT_MAX macros
71+
attr: harden allocation against integer overflows
72+
attr: fix silently splitting up lines longer than 2048 bytes
73+
attr: ignore attribute lines exceeding 2048 bytes
74+
attr: ignore overly large gitattributes files
75+
pretty: fix out-of-bounds write caused by integer overflow
76+
pretty: fix out-of-bounds read when left-flushing with stealing
77+
pretty: fix out-of-bounds read when parsing invalid padding format
78+
pretty: fix adding linefeed when placeholder is not expanded
79+
pretty: fix integer overflow in wrapping format
80+
utf8: fix truncated string lengths in `utf8_strnwidth()`
81+
utf8: fix returning negative string width
82+
utf8: fix overflow when returning string width
83+
utf8: fix checking for glyph width in `strbuf_utf8_replace()`
84+
utf8: refactor `strbuf_utf8_replace` to not rely on preallocated buffer
85+
pretty: restrict input lengths for padding and wrapping formats
86+

Documentation/RelNotes/2.31.6.txt

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
Git v2.31.6 Release Notes
2+
=========================
3+
4+
This release merges the security fix that appears in v2.30.7; see
5+
the release notes for that version for details.

Documentation/RelNotes/2.32.5.txt

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
Git v2.32.5 Release Notes
2+
=========================
3+
4+
This release merges the security fix that appears in v2.30.7; see
5+
the release notes for that version for details.
6+
7+
In addition, included are additional code for "git fsck" to check
8+
for questionable .gitattributes files.

Documentation/RelNotes/2.33.6.txt

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
Git v2.33.6 Release Notes
2+
=========================
3+
4+
This release merges the security fix that appears in v2.30.7; see
5+
the release notes for that version for details.

Documentation/RelNotes/2.34.6.txt

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
Git v2.34.6 Release Notes
2+
=========================
3+
4+
This release merges the security fix that appears in v2.30.7; see
5+
the release notes for that version for details.

Documentation/RelNotes/2.35.6.txt

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
Git v2.35.6 Release Notes
2+
=========================
3+
4+
This release merges the security fix that appears in v2.30.7; see
5+
the release notes for that version for details.

attr.c

Lines changed: 56 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ static const char git_attr__unknown[] = "(builtin)unknown";
2828
#endif
2929

3030
struct git_attr {
31-
int attr_nr; /* unique attribute number */
31+
unsigned int attr_nr; /* unique attribute number */
3232
char name[FLEX_ARRAY]; /* attribute name */
3333
};
3434

@@ -210,7 +210,7 @@ static void report_invalid_attr(const char *name, size_t len,
210210
* dictionary. If no entry is found, create a new attribute and store it in
211211
* the dictionary.
212212
*/
213-
static const struct git_attr *git_attr_internal(const char *name, int namelen)
213+
static const struct git_attr *git_attr_internal(const char *name, size_t namelen)
214214
{
215215
struct git_attr *a;
216216

@@ -226,8 +226,8 @@ static const struct git_attr *git_attr_internal(const char *name, int namelen)
226226
a->attr_nr = hashmap_get_size(&g_attr_hashmap.map);
227227

228228
attr_hashmap_add(&g_attr_hashmap, a->name, namelen, a);
229-
assert(a->attr_nr ==
230-
(hashmap_get_size(&g_attr_hashmap.map) - 1));
229+
if (a->attr_nr != hashmap_get_size(&g_attr_hashmap.map) - 1)
230+
die(_("unable to add additional attribute"));
231231
}
232232

233233
hashmap_unlock(&g_attr_hashmap);
@@ -272,7 +272,7 @@ struct match_attr {
272272
const struct git_attr *attr;
273273
} u;
274274
char is_macro;
275-
unsigned num_attr;
275+
size_t num_attr;
276276
struct attr_state state[FLEX_ARRAY];
277277
};
278278

@@ -293,7 +293,7 @@ static const char *parse_attr(const char *src, int lineno, const char *cp,
293293
struct attr_state *e)
294294
{
295295
const char *ep, *equals;
296-
int len;
296+
size_t len;
297297

298298
ep = cp + strcspn(cp, blank);
299299
equals = strchr(cp, '=');
@@ -337,8 +337,7 @@ static const char *parse_attr(const char *src, int lineno, const char *cp,
337337
static struct match_attr *parse_attr_line(const char *line, const char *src,
338338
int lineno, unsigned flags)
339339
{
340-
int namelen;
341-
int num_attr, i;
340+
size_t namelen, num_attr, i;
342341
const char *cp, *name, *states;
343342
struct match_attr *res = NULL;
344343
int is_macro;
@@ -349,6 +348,11 @@ static struct match_attr *parse_attr_line(const char *line, const char *src,
349348
return NULL;
350349
name = cp;
351350

351+
if (strlen(line) >= ATTR_MAX_LINE_LENGTH) {
352+
warning(_("ignoring overly long attributes line %d"), lineno);
353+
return NULL;
354+
}
355+
352356
if (*cp == '"' && !unquote_c_style(&pattern, name, &states)) {
353357
name = pattern.buf;
354358
namelen = pattern.len;
@@ -385,10 +389,9 @@ static struct match_attr *parse_attr_line(const char *line, const char *src,
385389
goto fail_return;
386390
}
387391

388-
res = xcalloc(1,
389-
sizeof(*res) +
390-
sizeof(struct attr_state) * num_attr +
391-
(is_macro ? 0 : namelen + 1));
392+
res = xcalloc(1, st_add3(sizeof(*res),
393+
st_mult(sizeof(struct attr_state), num_attr),
394+
is_macro ? 0 : namelen + 1));
392395
if (is_macro) {
393396
res->u.attr = git_attr_internal(name, namelen);
394397
} else {
@@ -451,11 +454,12 @@ struct attr_stack {
451454

452455
static void attr_stack_free(struct attr_stack *e)
453456
{
454-
int i;
457+
unsigned i;
455458
free(e->origin);
456459
for (i = 0; i < e->num_matches; i++) {
457460
struct match_attr *a = e->attrs[i];
458-
int j;
461+
size_t j;
462+
459463
for (j = 0; j < a->num_attr; j++) {
460464
const char *setto = a->state[j].setto;
461465
if (setto == ATTR__TRUE ||
@@ -664,8 +668,8 @@ static void handle_attr_line(struct attr_stack *res,
664668
a = parse_attr_line(line, src, lineno, flags);
665669
if (!a)
666670
return;
667-
ALLOC_GROW(res->attrs, res->num_matches + 1, res->alloc);
668-
res->attrs[res->num_matches++] = a;
671+
ALLOC_GROW_BY(res->attrs, res->num_matches, 1, res->alloc);
672+
res->attrs[res->num_matches - 1] = a;
669673
}
670674

671675
static struct attr_stack *read_attr_from_array(const char **list)
@@ -705,11 +709,12 @@ void git_attr_set_direction(enum git_attr_direction new_direction)
705709

706710
static struct attr_stack *read_attr_from_file(const char *path, unsigned flags)
707711
{
712+
struct strbuf buf = STRBUF_INIT;
708713
int fd;
709714
FILE *fp;
710715
struct attr_stack *res;
711-
char buf[2048];
712716
int lineno = 0;
717+
struct stat st;
713718

714719
if (flags & READ_ATTR_NOFOLLOW)
715720
fd = open_nofollow(path, O_RDONLY);
@@ -721,15 +726,26 @@ static struct attr_stack *read_attr_from_file(const char *path, unsigned flags)
721726
return NULL;
722727
}
723728
fp = xfdopen(fd, "r");
729+
if (fstat(fd, &st)) {
730+
warning_errno(_("cannot fstat gitattributes file '%s'"), path);
731+
fclose(fp);
732+
return NULL;
733+
}
734+
if (st.st_size >= ATTR_MAX_FILE_SIZE) {
735+
warning(_("ignoring overly large gitattributes file '%s'"), path);
736+
fclose(fp);
737+
return NULL;
738+
}
724739

725740
CALLOC_ARRAY(res, 1);
726-
while (fgets(buf, sizeof(buf), fp)) {
727-
char *bufp = buf;
728-
if (!lineno)
729-
skip_utf8_bom(&bufp, strlen(bufp));
730-
handle_attr_line(res, bufp, path, ++lineno, flags);
741+
while (strbuf_getline(&buf, fp) != EOF) {
742+
if (!lineno && starts_with(buf.buf, utf8_bom))
743+
strbuf_remove(&buf, 0, strlen(utf8_bom));
744+
handle_attr_line(res, buf.buf, path, ++lineno, flags);
731745
}
746+
732747
fclose(fp);
748+
strbuf_release(&buf);
733749
return res;
734750
}
735751

@@ -740,6 +756,7 @@ static struct attr_stack *read_attr_from_index(struct index_state *istate,
740756
struct attr_stack *res;
741757
char *buf, *sp;
742758
int lineno = 0;
759+
size_t size;
743760

744761
if (!istate)
745762
return NULL;
@@ -758,9 +775,13 @@ static struct attr_stack *read_attr_from_index(struct index_state *istate,
758775
if (!path_in_cone_mode_sparse_checkout(path, istate))
759776
return NULL;
760777

761-
buf = read_blob_data_from_index(istate, path, NULL);
778+
buf = read_blob_data_from_index(istate, path, &size);
762779
if (!buf)
763780
return NULL;
781+
if (size >= ATTR_MAX_FILE_SIZE) {
782+
warning(_("ignoring overly large gitattributes blob '%s'"), path);
783+
return NULL;
784+
}
764785

765786
CALLOC_ARRAY(res, 1);
766787
for (sp = buf; *sp; ) {
@@ -1031,12 +1052,12 @@ static int macroexpand_one(struct all_attrs_item *all_attrs, int nr, int rem);
10311052
static int fill_one(const char *what, struct all_attrs_item *all_attrs,
10321053
const struct match_attr *a, int rem)
10331054
{
1034-
int i;
1055+
size_t i;
10351056

1036-
for (i = a->num_attr - 1; rem > 0 && i >= 0; i--) {
1037-
const struct git_attr *attr = a->state[i].attr;
1057+
for (i = a->num_attr; rem > 0 && i > 0; i--) {
1058+
const struct git_attr *attr = a->state[i - 1].attr;
10381059
const char **n = &(all_attrs[attr->attr_nr].value);
1039-
const char *v = a->state[i].setto;
1060+
const char *v = a->state[i - 1].setto;
10401061

10411062
if (*n == ATTR__UNKNOWN) {
10421063
debug_set(what,
@@ -1055,11 +1076,11 @@ static int fill(const char *path, int pathlen, int basename_offset,
10551076
struct all_attrs_item *all_attrs, int rem)
10561077
{
10571078
for (; rem > 0 && stack; stack = stack->prev) {
1058-
int i;
1079+
unsigned i;
10591080
const char *base = stack->origin ? stack->origin : "";
10601081

1061-
for (i = stack->num_matches - 1; 0 < rem && 0 <= i; i--) {
1062-
const struct match_attr *a = stack->attrs[i];
1082+
for (i = stack->num_matches; 0 < rem && 0 < i; i--) {
1083+
const struct match_attr *a = stack->attrs[i - 1];
10631084
if (a->is_macro)
10641085
continue;
10651086
if (path_matches(path, pathlen, basename_offset,
@@ -1090,11 +1111,11 @@ static void determine_macros(struct all_attrs_item *all_attrs,
10901111
const struct attr_stack *stack)
10911112
{
10921113
for (; stack; stack = stack->prev) {
1093-
int i;
1094-
for (i = stack->num_matches - 1; i >= 0; i--) {
1095-
const struct match_attr *ma = stack->attrs[i];
1114+
unsigned i;
1115+
for (i = stack->num_matches; i > 0; i--) {
1116+
const struct match_attr *ma = stack->attrs[i - 1];
10961117
if (ma->is_macro) {
1097-
int n = ma->u.attr->attr_nr;
1118+
unsigned int n = ma->u.attr->attr_nr;
10981119
if (!all_attrs[n].macro) {
10991120
all_attrs[n].macro = ma;
11001121
}
@@ -1146,7 +1167,7 @@ void git_check_attr(struct index_state *istate,
11461167
collect_some_attrs(istate, path, check);
11471168

11481169
for (i = 0; i < check->nr; i++) {
1149-
size_t n = check->items[i].attr->attr_nr;
1170+
unsigned int n = check->items[i].attr->attr_nr;
11501171
const char *value = check->all_attrs[n].value;
11511172
if (value == ATTR__UNKNOWN)
11521173
value = ATTR__UNSET;

attr.h

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,18 @@
107107
* - Free the `attr_check` struct by calling `attr_check_free()`.
108108
*/
109109

110+
/**
111+
* The maximum line length for a gitattributes file. If the line exceeds this
112+
* length we will ignore it.
113+
*/
114+
#define ATTR_MAX_LINE_LENGTH 2048
115+
116+
/**
117+
* The maximum size of the giattributes file. If the file exceeds this size we
118+
* will ignore it.
119+
*/
120+
#define ATTR_MAX_FILE_SIZE (100 * 1024 * 1024)
121+
110122
struct index_state;
111123

112124
/**

column.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ struct column_data {
2323
/* return length of 's' in letters, ANSI escapes stripped */
2424
static int item_length(const char *s)
2525
{
26-
return utf8_strnwidth(s, -1, 1);
26+
return utf8_strnwidth(s, strlen(s), 1);
2727
}
2828

2929
/*

0 commit comments

Comments
 (0)