CVE-2022-42906

NameCVE-2022-42906
Descriptionpowerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbitrary code execution. git repositories can contain per-repository configuration that changes the behavior of git, including running arbitrary commands. When using powerline-gitstatus, changing to a directory automatically runs git commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory to one controlled by the attacker, such as in a shared filesystem or extracted archive, powerline-gitstatus will run arbitrary commands under the attacker's control. NOTE: this is similar to CVE-2022-20001.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3277-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
powerline-gitstatus (PTS)buster1.3.1-1vulnerable
buster (security)1.3.2-0+deb10u1fixed
bullseye1.3.2-0+deb11u1fixed
sid, trixie, bookworm1.3.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
powerline-gitstatussourcebuster1.3.2-0+deb10u1DLA-3277-1
powerline-gitstatussourcebullseye1.3.2-0+deb11u1
powerline-gitstatussource(unstable)1.3.2-1

Notes

https://github.com/jaspernbrouwer/powerline-gitstatus/issues/45
https://github.com/jaspernbrouwer/powerline-gitstatus/pull/46

Search for package or bug name: Reporting problems