aboutsummaryrefslogtreecommitdiffstats
path: root/git-gui/lib/class.tcl
diff options
context:
space:
mode:
authorJohannes Sixt <j6t@kdbg.org>2025-07-08 20:46:24 +0200
committerJohannes Sixt <j6t@kdbg.org>2025-07-08 20:48:25 +0200
commit0c8be6f09043e152493e369be8469d645098469f (patch)
tree575776e3f68d86c02699d30adb1f2e6f81762f03 /git-gui/lib/class.tcl
parentMerge branch 'top-panel-search-highlight' of github.com:bnfour/gitk (diff)
parentgitk: encode arguments correctly with "open" (diff)
downloadgit-0c8be6f09043e152493e369be8469d645098469f.tar.gz
git-0c8be6f09043e152493e369be8469d645098469f.zip
Merge branch 'ah/fix-open-with-stdin'
This addresses CVE-2025-27614, Arbitrary command execution with Gitk: A Git repository can be crafted in such a way that with some social engineering a user who has cloned the repository can be tricked into running any script (e.g., Bourne shell, Perl, Python, ...) supplied by the attacker by invoking `gitk filename`, where `filename` has a particular structure. The script is run with the privileges of the user. * ah/fix-open-with-stdin: gitk: encode arguments correctly with "open" Signed-off-by: Johannes Sixt <j6t@kdbg.org>
Diffstat (limited to 'git-gui/lib/class.tcl')
0 files changed, 0 insertions, 0 deletions