diff options
author | Johannes Sixt <j6t@kdbg.org> | 2025-05-20 08:54:24 +0200 |
---|---|---|
committer | Taylor Blau <me@ttaylorr.com> | 2025-05-23 17:04:30 -0400 |
commit | a7d1716fa648f6557ea9c91e0f04bae2e8738e6a (patch) | |
tree | 64b5354ac410b05e589830d1722b294faec3966b /git-gui/lib/sshkey.tcl | |
parent | 27fbab4898620183e608865beffd960139c04d58 (diff) | |
parent | a1ccd2512072cf52835050f4c97a4fba9f0ec8f9 (diff) |
Merge branch 'ml/replace-auto-execok'
This addresses CVE-2025-46334, Git GUI malicious command injection on
Windows.
A malicious repository can ship versions of sh.exe or typical textconv
filter programs such as astextplain. Due to the unfortunate design of
Tcl on Windows, the search path when looking for an executable always
includes the current directory. The mentioned programs are invoked when
the user selects "Git Bash" or "Browse Files" from the menu.
Signed-off-by: Johannes Sixt <j6t@kdbg.org>
Diffstat (limited to 'git-gui/lib/sshkey.tcl')
-rw-r--r-- | git-gui/lib/sshkey.tcl | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/git-gui/lib/sshkey.tcl b/git-gui/lib/sshkey.tcl index 589ff8f78a..c0c5d1dad8 100644 --- a/git-gui/lib/sshkey.tcl +++ b/git-gui/lib/sshkey.tcl @@ -83,7 +83,8 @@ proc make_ssh_key {w} { set sshkey_title [mc "Generating..."] $w.header.gen configure -state disabled - set cmdline [list sh -c {echo | ssh-keygen -q -t rsa -f ~/.ssh/id_rsa 2>&1}] + set cmdline [list [shellpath] -c \ + {echo | ssh-keygen -q -t rsa -f ~/.ssh/id_rsa 2>&1}] if {[catch { set sshkey_fd [_open_stdout_stderr $cmdline] } err]} { error_popup [mc "Could not start ssh-keygen:\n\n%s" $err] |