Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.51.0901202007460.22454@faron.mitre.org>
Date: Tue, 20 Jan 2009 20:09:45 -0500 (EST)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: coley@...us.mitre.org
Subject: Re: CVE request -- git


CVE-2008-5916 was assigned to the diff.external issue.

I updated the descriptions for CVE-2008-5516 and CVE-2008-5517 based on
Tomas' description.

Sebastian - it's not clear to me whether SUSE:SUSE-SR:2009:001 is
addressing CVE-2008-5516, CVE-2008-5517, or both.  Same question to the
rPath maintainers...

- Steve

======================================================
Name: CVE-2008-5516
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5516
Reference: BUGTRAQ:20090113 rPSA-2009-0005-1 git gitweb
Reference: URL:http://www.securityfocus.com/archive/1/archive/1/500008/100/0/threaded
Reference: MISC:http://repo.or.cz/w/git.git?a=commitdiff;h=c582abae
Reference: MLIST:[oss-security] 20090120 Re: CVE request -- git
Reference: URL:http://www.openwall.com/lists/oss-security/2009/01/20/1
Reference: CONFIRM:http://wiki.rpath.com/Advisories:rPSA-2009-0005
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=479715
Reference: CONFIRM:https://issues.rpath.com/browse/RPL-2936

The web interface in git (gitweb) 1.5.6, and possibly other versions,
allows remote attackers to execute arbitrary commands via shell
metacharacters, related to (1) git_snapshot and (2) git_object.  NOTE:
because of the lack of details, it is not clear whether CVE-2008-5516
and CVE-2008-5517 are distinct issues on the rPath Linux 2 platform.


======================================================
Name: CVE-2008-5517
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5517
Reference: BUGTRAQ:20090113 rPSA-2009-0005-1 git gitweb
Reference: URL:http://www.securityfocus.com/archive/1/archive/1/500008/100/0/threaded
Reference: MISC:http://repo.or.cz/w/git.git?a=commitdiff;h=516381d5
Reference: MLIST:[oss-security] 20090120 Re: CVE request -- git
Reference: URL:http://www.openwall.com/lists/oss-security/2009/01/20/1
Reference: CONFIRM:http://wiki.rpath.com/Advisories:rPSA-2009-0005
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=479715
Reference: CONFIRM:https://issues.rpath.com/browse/RPL-2936
Reference: SUSE:SUSE-SR:2009:001
Reference: URL:http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00002.html
Reference: BID:33215
Reference: URL:http://www.securityfocus.com/bid/33215

The web interface in git (gitweb) 1.5.5 and other versions allows
remote attackers to execute arbitrary commands via shell
metacharacters related to git_search.


======================================================
Name: CVE-2008-5916
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5916
Reference: MLIST:[git] 20081220 [Security] gitweb local privilege escalation (fix)
Reference: URL:http://marc.info/?l=git&m=122975564100860&w=2
Reference: MLIST:[linux-kernel] 20081220 [Security] gitweb local privilege escalation (fix)
Reference: URL:http://marc.info/?l=linux-kernel&m=122975564100863&w=2:
Reference: MLIST:[oss-security] 20090115 CVE request -- git
Reference: URL:http://www.openwall.com/lists/oss-security/2009/01/15/2
Reference: MLIST:[oss-security] 20090120 Re: CVE request -- git
Reference: URL:http://www.openwall.com/lists/oss-security/2009/01/20/2

gitweb/gitweb.perl in gitweb in Git 1.6.x before 1.6.0.6, 1.5.6.x
before 1.5.6.6, 1.5.5.x before 1.5.5.6, 1.5.4.x before 1.5.4.7, and
other versions after 1.4.3 allows local repository owners to execute
arbitrary commands by modifying the diff.external configuration
variable and executing a crafted gitweb query.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.