CVE-2017-14867

NameCVE-2017-14867
DescriptionGit before 2.10.5, 2.11.x before 2.11.4, 2.12.x before 2.12.5, 2.13.x before 2.13.6, and 2.14.x before 2.14.2 uses unsafe Perl scripts to support subcommands such as cvsserver, which allows attackers to execute arbitrary OS commands via shell metacharacters in a module name. The vulnerable code is reachable via git-shell even without CVS support.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1120-1, DSA-3984-1
Debian Bugs876854

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
git (PTS)bullseye1:2.30.2-1+deb11u2fixed
bullseye (security)1:2.30.2-1+deb11u3fixed
bookworm, bookworm (security)1:2.39.5-0+deb12u1fixed
trixie1:2.45.2-1fixed
sid1:2.45.2-1.3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gitsourcewheezy1:1.7.10.4-1+wheezy6DLA-1120-1
gitsourcejessie1:2.1.4-2.1+deb8u5DSA-3984-1
gitsourcestretch1:2.11.0-3+deb9u2DSA-3984-1
gitsource(unstable)1:2.14.2-1876854

Notes

https://www.openwall.com/lists/oss-security/2017/09/26/9
https://public-inbox.org/git/xmqqy3p29ekj.fsf@gitster.mtv.corp.google.com/T/#u

Search for package or bug name: Reporting problems