[3.0] git: arbitrary code execution issues via URLs (CVE-2015-7545)
A flaw was found in the way the git-remote-ext helper processed certain
URLs.
If a user had Git configured to automatically clone submodules from
untrusted repositories,
an attacker could inject commands into the URL of a submodule, allowing
them to execute arbitrary
code on the user’s system.
Fixed in 2.6.1, 2.5.4, 2.4.10, 2.3.10
References:
http://seclists.org/oss-sec/2015/q4/37
https://kernel.googlesource.com/pub/scm/git/git/+/33cfccbbf35a56e190b79bdec5c85457c952a021
https://lkml.org/lkml/2015/10/5/683
https://github.com/git/git/blob/master/Documentation/RelNotes/2.3.10.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.4.10.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.5.4.txt
https://github.com/git/git/blob/master/Documentation/RelNotes/2.6.1.txt
(from redmine: issue id 5006, created on 2016-01-08, closed on 2016-05-31)
- Relations:
- parent #5002 (closed)