mirror of
https://git.FreeBSD.org/ports.git
synced 2024-12-03 01:23:49 +00:00
Document git vulerability
Approved by: swills Security: CVE-2014-9390
This commit is contained in:
parent
6a2ca3cd94
commit
08f04987d9
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=374959
@ -57,6 +57,40 @@ Notes:
|
||||
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="1d567278-87a5-11e4-879c-000c292ee6b8">
|
||||
<topic>git -- Arbitrary command execution on case-insensitive filesystems</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>git</name>
|
||||
<range><lt>2.2.1</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>The Git Project reports:</p>
|
||||
<blockquote cite="http://article.gmane.org/gmane.linux.kernel/1853266">
|
||||
<p>When using a case-insensitive filesystem an attacker can
|
||||
craft a malicious Git tree that will cause Git to overwrite
|
||||
its own .git/config file when cloning or checking out a
|
||||
repository, leading to arbitrary command execution in the
|
||||
client machine. If you are a hosting service whose users
|
||||
may fetch from your service to Windows or Mac OS X machines,
|
||||
you are strongly encouraged to update to protect such users
|
||||
who use existing versions of Git.</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<cvename>CVE-2014-9390</cvename>
|
||||
<url>https://github.com/blog/1938-git-client-vulnerability-announced</url>
|
||||
<url>http://article.gmane.org/gmane.linux.kernel/1853266</url>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2014-12-19</discovery>
|
||||
<entry>2014-12-19</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="0c5cf7c4-856e-11e4-a089-60a44c524f57">
|
||||
<topic>otrs -- Incomplete Access Control</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user