CVE-2016-2324

NameCVE-2016-2324
DescriptionInteger overflow in Git before 2.7.4 allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, which triggers a heap-based buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-3521-1
NVD severityhigh (attack range: remote)
Debian Bugs818318

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cgit (PTS)jessie (security), jessie0.10.2.git2.0.1-3+deb8u1fixed
buster, sid, stretch1.1+git2.10.2-3fixed
git (PTS)wheezy1:1.7.10.4-1+wheezy3fixed
wheezy (security)1:1.7.10.4-1+wheezy6fixed
jessie1:2.1.4-2.1+deb8u3fixed
jessie (security)1:2.1.4-2.1+deb8u5fixed
stretch (security), stretch1:2.11.0-3+deb9u2fixed
buster1:2.14.2-1fixed
sid1:2.15.0~rc1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cgitsource(unstable)(not affected)
gitsource(unstable)1:2.8.0~rc3-1high818318
gitsourcejessie1:2.1.4-2.1+deb8u2highDSA-3521-1
gitsourcewheezy1:1.7.10.4-1+wheezy3highDSA-3521-1

Notes

Removal of path_name: https://github.com/git/git/commit/9831e92bfa833ee9c0ce464bbc2f941ae6c2698d (v2.8.0-rc0)
http://www.openwall.com/lists/oss-security/2016/03/16/2
https://bugzilla.novell.com/show_bug.cgi?id=971328#c4
- cgit <not-affected> (path_name function from embedded git is not called)

Search for package or bug name: Reporting problems