blob: 23bf413ee59a21d8daf05d9e96d6354bfc1d8c8a [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200903-15">
<title>git: Multiple vulnerabilties</title>
Multiple vulnerabilities in gitweb allow for remote execution of arbitrary
<product type="ebuild">git</product>
<announced>March 09, 2009</announced>
<revised>March 09, 2009: 01</revised>
<package name="dev-util/git" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
GIT - the stupid content tracker, the revision control system used by
the Linux kernel team.
Multiple vulnerabilities have been reported in gitweb that is part of
the git package:
Shell metacharacters related to git_search are not properly sanitized
Shell metacharacters related to git_snapshot and git_object are not
properly sanitized (CVE-2008-5517).
The diff.external configuration variable as set in a repository can be
executed by gitweb (CVE-2008-5916).
<impact type="high">
A remote unauthenticated attacker can execute arbitrary commands via
shell metacharacters in a query, remote attackers with write access to
a git repository configuration can execute arbitrary commands with the
privileges of the user running gitweb by modifying the diff.external
configuration variable in the repository and sending a crafted query to
There is no known workaround at this time.
All git users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=dev-util/git-;</code>
<uri link="">CVE-2008-5516</uri>
<uri link="">CVE-2008-5517</uri>
<uri link="">CVE-2008-5916</uri>
<metadata tag="requester" timestamp="Sun, 11 Jan 2009 18:26:05 +0000">
<metadata tag="submitter" timestamp="Thu, 12 Feb 2009 18:42:55 +0000">
<metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 18:43:18 +0000">