CVE-2017-14867

NameCVE-2017-14867
DescriptionGit before 2.10.5, 2.11.x before 2.11.4, 2.12.x before 2.12.5, 2.13.x before 2.13.6, and 2.14.x before 2.14.2 uses unsafe Perl scripts to support subcommands such as cvsserver, which allows attackers to execute arbitrary OS commands via shell metacharacters in a module name. The vulnerable code is reachable via git-shell even without CVS support.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1120-1, DSA-3984-1
NVD severityhigh
Debian Bugs876854

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
git (PTS)stretch (security), stretch1:2.11.0-3+deb9u7fixed
buster, buster (security)1:2.20.1-2+deb10u3fixed
bullseye1:2.30.2-1fixed
sid1:2.31.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gitsourcewheezy1:1.7.10.4-1+wheezy6DLA-1120-1
gitsourcejessie1:2.1.4-2.1+deb8u5DSA-3984-1
gitsourcestretch1:2.11.0-3+deb9u2DSA-3984-1
gitsource(unstable)1:2.14.2-1876854

Notes

https://www.openwall.com/lists/oss-security/2017/09/26/9
https://public-inbox.org/git/xmqqy3p29ekj.fsf@gitster.mtv.corp.google.com/T/#u

Search for package or bug name: Reporting problems