Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1175960 - (CVE-2014-9390) CVE-2014-9390 git: arbitrary command execution vulnerability on case-insensitive file systems
CVE-2014-9390 git: arbitrary command execution vulnerability on case-insensit...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20141218,reported=2...
: Reopened, Security
: 1175959 (view as bug list)
Depends On: 1178856 1220552
Blocks:
  Show dependency treegraph
 
Reported: 2014-12-18 19:43 EST by Vincent Danen
Modified: 2015-05-11 15:42 EDT (History)
13 users (show)

See Also:
Fixed In Version: git 2.2.1, git 2.1.4, git 2.0.5, git 1.9.5, git 1.8.5.6
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
: 1178856 (view as bug list)
Environment:
Last Closed: 2015-01-05 10:02:35 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Knowledge Base (Solution) 1310493 None None None Never

  None (edit)
Description Vincent Danen 2014-12-18 19:43:34 EST
It was reported [1] that git, when used as a client on a case-insensitive filesystem (such as FAT, FAT32, NTFS, HFS+, etc.), could allow the overwrite of the .git/config file when the client performed a "git pull".  Because git permitted committing .Git/config (or any case variation), on the pull this would replace the user's .git/config.  If this malicious config file contained defined external commands (such as for invoking and editor or an external diff utility) it could allow for the execution of arbitrary code with the privileges of the user running the git client.

[1] http://article.gmane.org/gmane.linux.kernel/1853266


Statement:

This flaw is only exploitable when the local git repository is stored on a case-insensitive filesystem.  By default, Red Hat Enterprise Linux uses case-sensitive filesystems (such as ext2/3/4, XFS, etc.) and as such is not vulnerable to this flaw.
Comment 1 pstodulk 2014-12-19 10:26:51 EST
*** Bug 1175959 has been marked as a duplicate of this bug. ***

Note You need to log in before you can comment on or make changes to this bug.