Description
A malicious third-party can give a crafted "ssh://..." URL to an
unsuspecting victim, and an attempt to visit the URL can result in any
program that exists on the victim's machine being executed. Such a URL
could be placed in the .gitmodules file of a malicious project, and an
unsuspecting victim could be tricked into running "git clone
--recurse-submodules" to trigger the vulnerability.
Ubuntu-Description
Brian Neel, Joern Schneeweisz, and Jeff King discovered that Git did
not properly handle host names in 'ssh://' URLs. A remote attacker
could use this to construct a git repository that when accessed
could run arbitrary code with the privileges of the user.
Package
Upstream: | needs-triage
|
Ubuntu 16.04 ESM: | released
(1:2.7.4-0ubuntu1.2)
|
Ubuntu 14.04 ESM: | DNE
(trusty was released [1:1.9.1-1ubuntu0.6])
|
Patches:
Updated: 2022-04-13 12:51:26 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)