CVE-2015-7545

The (1) git-remote-ext and (2) unspecified other remote helper programs in Git before 2.3.10, 2.4.x before 2.4.10, 2.5.x before 2.5.4, and 2.6.x before 2.6.1 do not properly restrict the allowed protocols, which might allow remote attackers to execute arbitrary code via a URL in a (a) .gitmodules file or (b) unknown other sources in a submodule.
References
Link Resource
http://lists.opensuse.org/opensuse-updates/2015-11/msg00066.html
http://rhn.redhat.com/errata/RHSA-2015-2515.html
http://www.debian.org/security/2016/dsa-3435
http://www.openwall.com/lists/oss-security/2015/12/08/5
http://www.openwall.com/lists/oss-security/2015/12/09/8
http://www.openwall.com/lists/oss-security/2015/12/11/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securityfocus.com/bid/78711
http://www.securitytracker.com/id/1034501
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.533255
http://www.ubuntu.com/usn/USN-2835-1
https://bugzilla.redhat.com/show_bug.cgi?id=1269794
https://github.com/git/git/blob/master/Documentation/RelNotes/2.3.10.txt Patch Vendor Advisory
https://github.com/git/git/blob/master/Documentation/RelNotes/2.4.10.txt Patch Vendor Advisory
https://github.com/git/git/blob/master/Documentation/RelNotes/2.5.4.txt Patch Vendor Advisory
https://github.com/git/git/blob/master/Documentation/RelNotes/2.6.1.txt
https://kernel.googlesource.com/pub/scm/git/git/+/33cfccbbf35a56e190b79bdec5c85457c952a021
https://lkml.org/lkml/2015/10/5/683
https://security.gentoo.org/glsa/201605-01
http://lists.opensuse.org/opensuse-updates/2015-11/msg00066.html
http://rhn.redhat.com/errata/RHSA-2015-2515.html
http://www.debian.org/security/2016/dsa-3435
http://www.openwall.com/lists/oss-security/2015/12/08/5
http://www.openwall.com/lists/oss-security/2015/12/09/8
http://www.openwall.com/lists/oss-security/2015/12/11/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securityfocus.com/bid/78711
http://www.securitytracker.com/id/1034501
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.533255
http://www.ubuntu.com/usn/USN-2835-1
https://bugzilla.redhat.com/show_bug.cgi?id=1269794
https://github.com/git/git/blob/master/Documentation/RelNotes/2.3.10.txt Patch Vendor Advisory
https://github.com/git/git/blob/master/Documentation/RelNotes/2.4.10.txt Patch Vendor Advisory
https://github.com/git/git/blob/master/Documentation/RelNotes/2.5.4.txt Patch Vendor Advisory
https://github.com/git/git/blob/master/Documentation/RelNotes/2.6.1.txt
https://kernel.googlesource.com/pub/scm/git/git/+/33cfccbbf35a56e190b79bdec5c85457c952a021
https://lkml.org/lkml/2015/10/5/683
https://security.gentoo.org/glsa/201605-01
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:git_project:git:*:*:*:*:*:*:*:*
cpe:2.3:a:git_project:git:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:git_project:git:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:git_project:git:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:git_project:git:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:git_project:git:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:git_project:git:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:git_project:git:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:git_project:git:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:git_project:git:2.4.8:*:*:*:*:*:*:*
cpe:2.3:a:git_project:git:2.4.9:*:*:*:*:*:*:*
cpe:2.3:a:git_project:git:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:git_project:git:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:git_project:git:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:git_project:git:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:git_project:git:2.6.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:36

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2015-11/msg00066.html - () http://lists.opensuse.org/opensuse-updates/2015-11/msg00066.html -
References () http://rhn.redhat.com/errata/RHSA-2015-2515.html - () http://rhn.redhat.com/errata/RHSA-2015-2515.html -
References () http://www.debian.org/security/2016/dsa-3435 - () http://www.debian.org/security/2016/dsa-3435 -
References () http://www.openwall.com/lists/oss-security/2015/12/08/5 - () http://www.openwall.com/lists/oss-security/2015/12/08/5 -
References () http://www.openwall.com/lists/oss-security/2015/12/09/8 - () http://www.openwall.com/lists/oss-security/2015/12/09/8 -
References () http://www.openwall.com/lists/oss-security/2015/12/11/7 - () http://www.openwall.com/lists/oss-security/2015/12/11/7 -
References () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html -
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html - () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -
References () http://www.securityfocus.com/bid/78711 - () http://www.securityfocus.com/bid/78711 -
References () http://www.securitytracker.com/id/1034501 - () http://www.securitytracker.com/id/1034501 -
References () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.533255 - () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.533255 -
References () http://www.ubuntu.com/usn/USN-2835-1 - () http://www.ubuntu.com/usn/USN-2835-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1269794 - () https://bugzilla.redhat.com/show_bug.cgi?id=1269794 -
References () https://github.com/git/git/blob/master/Documentation/RelNotes/2.3.10.txt - Patch, Vendor Advisory () https://github.com/git/git/blob/master/Documentation/RelNotes/2.3.10.txt - Patch, Vendor Advisory
References () https://github.com/git/git/blob/master/Documentation/RelNotes/2.4.10.txt - Patch, Vendor Advisory () https://github.com/git/git/blob/master/Documentation/RelNotes/2.4.10.txt - Patch, Vendor Advisory
References () https://github.com/git/git/blob/master/Documentation/RelNotes/2.5.4.txt - Patch, Vendor Advisory () https://github.com/git/git/blob/master/Documentation/RelNotes/2.5.4.txt - Patch, Vendor Advisory
References () https://github.com/git/git/blob/master/Documentation/RelNotes/2.6.1.txt - () https://github.com/git/git/blob/master/Documentation/RelNotes/2.6.1.txt -
References () https://kernel.googlesource.com/pub/scm/git/git/+/33cfccbbf35a56e190b79bdec5c85457c952a021 - () https://kernel.googlesource.com/pub/scm/git/git/+/33cfccbbf35a56e190b79bdec5c85457c952a021 -
References () https://lkml.org/lkml/2015/10/5/683 - () https://lkml.org/lkml/2015/10/5/683 -
References () https://security.gentoo.org/glsa/201605-01 - () https://security.gentoo.org/glsa/201605-01 -

Information

Published : 2016-04-13 15:59

Updated : 2024-11-21 02:36


NVD link : CVE-2015-7545

Mitre link : CVE-2015-7545

CVE.ORG link : CVE-2015-7545


JSON object : View

Products Affected

canonical

  • ubuntu_linux

opensuse

  • opensuse

git_project

  • git

redhat

  • software_collections
CWE
CWE-20

Improper Input Validation

CWE-284

Improper Access Control