GLSA 200903-15: git: Multiple vulnerabilties

Severity:high
Title:git: Multiple vulnerabilties
Date:03/09/2009
Bugs: #251343
ID:200903-15

Synopsis

Multiple vulnerabilities in gitweb allow for remote execution of arbitrary commands.

Background

GIT - the stupid content tracker, the revision control system used by the Linux kernel team.

Affected packages

Package Vulnerable Unaffected Architecture(s)
dev-util/git < 1.6.0.6 >= 1.6.0.6 All supported architectures

Description

Multiple vulnerabilities have been reported in gitweb that is part of the git package:

  • Shell metacharacters related to git_search are not properly sanitized (CVE-2008-5516).
  • Shell metacharacters related to git_snapshot and git_object are not properly sanitized (CVE-2008-5517).
  • The diff.external configuration variable as set in a repository can be executed by gitweb (CVE-2008-5916).

Impact

A remote unauthenticated attacker can execute arbitrary commands via shell metacharacters in a query, remote attackers with write access to a git repository configuration can execute arbitrary commands with the privileges of the user running gitweb by modifying the diff.external configuration variable in the repository and sending a crafted query to gitweb.

Workaround

There is no known workaround at this time.

Resolution

All git users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-util/git-1.6.0.6"

References

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200903-15.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

Thank you!