From e590456a8f7fef7ac4410bcf8f1e1486848e0243 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Wed, 1 Nov 2023 15:50:35 +0000 Subject: gentoo auto-resync : 01:11:2023 - 15:50:35 --- metadata/glsa/glsa-202311-01.xml | 42 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 metadata/glsa/glsa-202311-01.xml (limited to 'metadata/glsa/glsa-202311-01.xml') diff --git a/metadata/glsa/glsa-202311-01.xml b/metadata/glsa/glsa-202311-01.xml new file mode 100644 index 000000000000..323844773d3e --- /dev/null +++ b/metadata/glsa/glsa-202311-01.xml @@ -0,0 +1,42 @@ + + + + GitPython: Code Execution via Crafted Input + A vulnerability has been discovered in GitPython where crafted input to Repo.clone_from can lead to code execution + GitPython + 2023-11-01 + 2023-11-01 + 884623 + local + + + 3.1.30 + 3.1.30 + + + +

GitPython is a Python library used to interact with Git repositories.

+
+ +

Please review the CVE identifier referenced below for details.

+
+ +

An attacker may be able to trigger Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.

+
+ +

There is no known workaround at this time.

+
+ +

All GitPython users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/GitPython-3.1.30" + +
+ + CVE-2022-24439 + + graaff + graaff +
\ No newline at end of file -- cgit v1.2.3