USN-3387-1: Git vulnerability

Publication date

11 August 2017

Overview

Git could be made run programs as your login if it opened a specially crafted git repository.


Packages

  • git - fast, scalable, distributed revision control system

Details

Brian Neel, Joern Schneeweisz, and Jeff King discovered that Git did
not properly handle host names in ‘ssh://’ URLs. A remote attacker
could use this to construct a git repository that when accessed could
run arbitrary code with the privileges of the user.

Brian Neel, Joern Schneeweisz, and Jeff King discovered that Git did
not properly handle host names in ‘ssh://’ URLs. A remote attacker
could use this to construct a git repository that when accessed could
run arbitrary code with the privileges of the user.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
17.04 zesty git –  1:2.11.0-2ubuntu0.2
16.04 xenial git –  1:2.7.4-0ubuntu1.2
14.04 trusty git –  1:1.9.1-1ubuntu0.6

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›