Bug 1480386 (CVE-2017-1000117)
Summary: | CVE-2017-1000117 git: Command injection via malicious ssh URLs | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Trevor Jay <tjay> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aileenc, alazarot, avibelli, chazlett, cperry, drusso, etirelli, gvarsami, hhorak, jbalunas, jcoleman, jmrazek, jolee, jorton, jshepherd, kconner, kverlaen, ldimaggi, lpetrovi, mbaluch, mwinkler, nwallace, pstodulk, rrajasek, rwagner, rzhang, tcunning, tkirby, tmz, vhalbert, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | git 2.7.6, git 2.8.6, git 2.9.5, git 2.10.4, git 2.11.3, git 2.12.4, git 2.13.5, git 2.14.1 | Doc Type: | If docs needed, set a value |
Doc Text: |
A shell command injection flaw related to the handling of "ssh" URLs has been discovered in Git. An attacker could use this flaw to execute shell commands with the privileges of the user running the Git client, for example, when performing a "clone" action on a malicious repository or a legitimate repository containing a malicious commit.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-08 03:20:21 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1480387, 1480388, 1480504, 1480505, 1480634, 1480635 | ||
Bug Blocks: | 1480393, 1481834 |
Description
Trevor Jay
2017-08-10 23:54:57 UTC
External References: https://lkml.org/lkml/2017/8/10/757 http://blog.recurity-labs.com/2017-08-10/scm-vulns Updates for Fedora 25 and 26 were pushed while this bug was being created. I don't see any Fedora tracker bugs. For Fedora users who search by the CVE and want to find the updates for testing, here are the links: https://bodhi.fedoraproject.org/updates/FEDORA-2017-b1b3ae6666 https://bodhi.fedoraproject.org/updates/FEDORA-2017-8ba7572cfd git-2.13.5-1.fc26 has been pushed to the Fedora 26 stable repository. If problems still persist, please make note of it in this bug report. git-2.9.5-1.fc25 has been pushed to the Fedora 25 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:2484 https://access.redhat.com/errata/RHSA-2017:2484 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:2485 https://access.redhat.com/errata/RHSA-2017:2485 This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2017:2491 https://access.redhat.com/errata/RHSA-2017:2491 This issue has been addressed in the following products: Red Hat Mobile Application Platform 4.5 Via RHSA-2017:2675 https://access.redhat.com/errata/RHSA-2017:2675 This issue has been addressed in the following products: Red Hat Mobile Application Platform 4.5 Via RHSA-2017:2674 https://access.redhat.com/errata/RHSA-2017:2674 |