Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in Git
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in Git
ID: FEDORA-2017-b1b3ae6666
Distribution: Fedora
Plattformen: Fedora 26
Datum: Mo, 14. August 2017, 07:49
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000117

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2017-b1b3ae6666
2017-08-13 17:48:59.925623
-------------------------------------------------------------------------------
-

Name : git
Product : Fedora 26
Version : 2.13.5
Release : 1.fc26
URL : https://git-scm.com/
Summary : Fast Version Control System
Description :
Git is a fast, scalable, distributed revision control system with an
unusually rich command set that provides both high-level operations
and full access to internals.

The git rpm installs common set of tools which are usually using with
small amount of dependencies. To install all git packages, including
tools for integrating with other SCMs, install the git-all meta-package.

-------------------------------------------------------------------------------
-
Update Information:

Resolve an arbitrary code execution vulnerability via crafted "ssh://"
URL
(CVE-2017-1000117). From the [release announcement](https://public-
inbox.org/git/xmqqh8xf482j.fsf@gitster.mtv.corp.google.com/): A malicious
third-party can give a crafted "ssh://..." URL to an unsuspecting
victim,
and an attempt to visit the URL can result in any program that exists on
the
victim's machine being executed. Such a URL could be placed in the
.gitmodules file of a malicious project, and an unsuspecting victim could
be
tricked into running "git clone --recurse-submodules" to trigger
the
vulnerability. Credits to find and fix the issue go to Brian Neel at
GitLab, Joern Schneeweisz of Recurity Labs and Jeff King at GitHub.
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1480386 - CVE-2017-1000117 git: Command injection via malicious
ssh URLs
https://bugzilla.redhat.com/show_bug.cgi?id=1480386
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade git' at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung