Name | CVE-2016-2324 |
Description | Integer overflow in Git before 2.7.4 allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, which triggers a heap-based buffer overflow. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more) |
References | DSA-3521-1 |
NVD severity | high (attack range: remote) |
Debian Bugs | 818318 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
cgit (PTS) | jessie (security), jessie | 0.10.2.git2.0.1-3+deb8u1 | fixed |
buster, sid, stretch | 1.1+git2.10.2-3 | fixed | |
git (PTS) | wheezy | 1:1.7.10.4-1+wheezy3 | fixed |
wheezy (security) | 1:1.7.10.4-1+wheezy6 | fixed | |
jessie (security), jessie | 1:2.1.4-2.1+deb8u5 | fixed | |
stretch (security), stretch | 1:2.11.0-3+deb9u2 | fixed | |
buster, sid | 1:2.17.0-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
cgit | source | (unstable) | (not affected) | |||
git | source | (unstable) | 1:2.8.0~rc3-1 | high | 818318 | |
git | source | jessie | 1:2.1.4-2.1+deb8u2 | high | DSA-3521-1 | |
git | source | wheezy | 1:1.7.10.4-1+wheezy3 | high | DSA-3521-1 |
Removal of path_name: https://github.com/git/git/commit/9831e92bfa833ee9c0ce464bbc2f941ae6c2698d (v2.8.0-rc0)
http://www.openwall.com/lists/oss-security/2016/03/16/2
https://bugzilla.novell.com/show_bug.cgi?id=971328#c4
- cgit <not-affected> (path_name function from embedded git is not called)