Descriptionrevision.c in git before 2.7.4 uses an incorrect integer data type, which allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, leading to a heap-based buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh (attack range: remote)
Debian Bugs818318

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cgit (PTS)jessie0.10.2.git2.0.1-3+deb8u1fixed
jessie (security)0.10.2.git2.0.1-3+deb8u2fixed
stretch (security), stretch1.1+git2.10.2-3+deb9u1fixed
buster, sid1.2.1+git2.18.0-1fixed
git (PTS)jessie1:2.1.4-2.1+deb8u6fixed
jessie (security)1:2.1.4-2.1+deb8u7fixed
stretch (security), stretch1:2.11.0-3+deb9u4fixed
buster, sid1:2.20.1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cgitsource(unstable)(not affected)

Notes (v2.7.0-rc0)
- cgit <not-affected> (path_name function from embedded git is not called)

Search for package or bug name: Reporting problems