Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in python-dulwich
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in python-dulwich
ID: FEDORA-2015-4534
Distribution: Fedora
Plattformen: Fedora 20
Datum: Fr, 10. April 2015, 12:08
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9706

Originalnachricht

Name        : python-dulwich
Product : Fedora 20
Version : 0.10.0
Release : 1.fc20
URL : http://samba.org/~jelmer/dulwich/
Summary : A python implementation of the Git file formats and protocols
Description :
Dulwich is a pure-Python implementation of the Git file formats and
protocols. The project is named after the village in which Mr. and
Mrs. Git live in the Monty Python sketch.

-------------------------------------------------------------------------------
-
Update Information:

Fix for CVE-2014-9706 (rhbz#1204889, rhbz#1204890, and rhbz#1204891)
-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Mar 23 2015 Fabian Affolter <mail@fabian-affolter.ch> - 0.10.0-1
- Fix for CVE-2014-9706 (rhbz#1204889, rhbz#1204890, and rhbz#1204891)
- Update to new upstream version 0.10.0
* Mon Mar 23 2015 Fabian Affolter <mail@fabian-affolter.ch> - 0.9.9-1
- Update to new upstream version 0.9.9
* Sun Aug 17 2014 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 0.9.7-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Fri Jun 27 2014 Fabian Affolter <mail@fabian-affolter.ch> - 0.9.7-1
- Update to new upstream version 0.9.7
* Sat Jun 7 2014 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 0.9.6-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Sat May 24 2014 Fabian Affolter <mail@fabian-affolter.ch> - 0.9.6-1
- Update to new upstream version 0.9.6
* Wed Feb 26 2014 Fabian Affolter <mail@fabian-affolter.ch> - 0.9.5-1
- Tests are currently not working
- Update to new upstream version 0.9.5
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1204889 - CVE-2014-9706 python-dulwich: arbitrary files allowed to
be commited, leading to code execution
https://bugzilla.redhat.com/show_bug.cgi?id=1204889
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update python-dulwich' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung