Lucene search

K
gentooGentoo FoundationGLSA-200903-15
HistoryMar 09, 2009 - 12:00 a.m.

git: Multiple vulnerabilties

2009-03-0900:00:00
Gentoo Foundation
security.gentoo.org
12

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.347 Low

EPSS

Percentile

97.1%

Background

GIT - the stupid content tracker, the revision control system used by the Linux kernel team.

Description

Multiple vulnerabilities have been reported in gitweb that is part of the git package:

  • Shell metacharacters related to git_search are not properly sanitized (CVE-2008-5516).
  • Shell metacharacters related to git_snapshot and git_object are not properly sanitized (CVE-2008-5517).
  • The diff.external configuration variable as set in a repository can be executed by gitweb (CVE-2008-5916).

Impact

A remote unauthenticated attacker can execute arbitrary commands via shell metacharacters in a query, remote attackers with write access to a git repository configuration can execute arbitrary commands with the privileges of the user running gitweb by modifying the diff.external configuration variable in the repository and sending a crafted query to gitweb.

Workaround

There is no known workaround at this time.

Resolution

All git users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-util/git-1.6.0.6"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-util/git< 1.6.0.6UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.347 Low

EPSS

Percentile

97.1%