Debian 10262 Published by

A powerline-gitstatus security update has been released for Debian GNU/Linux 10 LTS to address an issue that allowed arbitrary code execution.



DLA 3277-1: powerline-gitstatus security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-3277-1 debian-lts@lists.debian.org
  https://www.debian.org/lts/security/ Markus Koschany
January 20, 2023   https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : powerline-gitstatus
Version : 1.3.2-0+deb10u1
CVE ID : CVE-2022-42906

Powerline Gitstatus, a status line plugin for the VIM editor, allows
arbitrary code execution. Git repositories can contain per-repository
configuration that changes the behavior of git, including running arbitrary
commands. When using powerline-gitstatus, changing to a directory
automatically runs git commands in order to display information about the
current repository in the prompt. If an attacker can convince a user to
change their current directory to one controlled by the attacker, such as
in a shared filesystem or extracted archive, powerline-gitstatus will run
arbitrary commands under the attacker's control.

For Debian 10 buster, this problem has been fixed in version
1.3.2-0+deb10u1.

We recommend that you upgrade your powerline-gitstatus packages.

For the detailed security status of powerline-gitstatus please refer to
its security tracker page at:
  https://security-tracker.debian.org/tracker/powerline-gitstatus

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at:   https://wiki.debian.org/LTS