Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sat, 27 Oct 2012 20:10:15 -0600
From: "Jason A. Donenfeld" <>
To: oss-security <>
Subject: CVE Request: cgit command injection

Hi Kurt,


" Fix command injection.

By not quoting the argument, an attacker with the ability to add files
to the repository could pass arbitrary arguments to the highlight
command, in particular, the --plug-in argument which can lead to
arbitrary command execution.

This patch adds simple argument quoting."

The vulnerable script is not a hard requirement and is more in the
"contrib" variety of things. That said, lots of users do wind up using
it verbatim, as it's simple and works well, so this does affect a
decent number of folks.

The patch for it will be released in the upcoming cgit release, along
with the previous CVE for that buffer overflow. I'll send the list an
update when that release is made.


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ