Bug 1480386 - (CVE-2017-1000117) CVE-2017-1000117 git: Command injection via malicious ssh URLs [NEEDINFO]
CVE-2017-1000117 git: Command injection via malicious ssh URLs
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20170810,repo...
: Security
Depends On: 1480388 1480505 1480634 1480387 1480504 1480635
Blocks: 1480393 1481834
  Show dependency treegraph
 
Reported: 2017-08-10 19:54 EDT by Trevor Jay
Modified: 2017-08-21 10:56 EDT (History)
35 users (show)

See Also:
Fixed In Version: git 2.7.6, git 2.8.6, git 2.9.5, git 2.10.4, git 2.11.3, git 2.12.4, git 2.13.5, git 2.14.1
Doc Type: If docs needed, set a value
Doc Text:
A shell command injection flaw related to the handling of "ssh" URLs has been discovered in Git. An attacker could use this flaw to execute shell commands with the privileges of the user running the Git client, for example, when performing a "clone" action on a malicious repository or a legitimate repository containing a malicious commit.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
scorneli: needinfo? (tjay)


Attachments (Terms of Use)

  None (edit)
Description Trevor Jay 2017-08-10 19:54:57 EDT
A flaw was found in the way the Git client handles "ssh://" URLs. A maliciously crafted "ssh://" URL would cause Git clients to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious users committing to an honest server (to attack another user of that server's repositories), or by a proxy server.
Comment 6 Stefan Cornelius 2017-08-11 08:17:51 EDT
External References:

https://lkml.org/lkml/2017/8/10/757
http://blog.recurity-labs.com/2017-08-10/scm-vulns
Comment 10 Todd Zullinger 2017-08-12 12:24:10 EDT
Updates for Fedora 25 and 26 were pushed while this bug was being created.  I don't see any Fedora tracker bugs.  For Fedora users who search by the CVE and want to find the updates for testing, here are the links:

https://bodhi.fedoraproject.org/updates/FEDORA-2017-b1b3ae6666
https://bodhi.fedoraproject.org/updates/FEDORA-2017-8ba7572cfd
Comment 11 Fedora Update System 2017-08-13 16:55:17 EDT
git-2.13.5-1.fc26 has been pushed to the Fedora 26 stable repository. If problems still persist, please make note of it in this bug report.
Comment 12 Fedora Update System 2017-08-13 20:55:38 EDT
git-2.9.5-1.fc25 has been pushed to the Fedora 25 stable repository. If problems still persist, please make note of it in this bug report.
Comment 13 errata-xmlrpc 2017-08-16 19:04:48 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:2484 https://access.redhat.com/errata/RHSA-2017:2484
Comment 14 errata-xmlrpc 2017-08-16 19:27:13 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2017:2485 https://access.redhat.com/errata/RHSA-2017:2485
Comment 15 errata-xmlrpc 2017-08-17 17:56:58 EDT
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2017:2491 https://access.redhat.com/errata/RHSA-2017:2491

Note You need to log in before you can comment on or make changes to this bug.