Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in Git
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in Git
ID: FEDORA-2017-8ba7572cfd
Distribution: Fedora
Plattformen: Fedora 25
Datum: Mo, 14. August 2017, 07:51
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000117

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2017-8ba7572cfd
2017-08-13 17:48:37.052705
-------------------------------------------------------------------------------
-

Name : git
Product : Fedora 25
Version : 2.9.5
Release : 1.fc25
URL : https://git-scm.com/
Summary : Fast Version Control System
Description :
Git is a fast, scalable, distributed revision control system with an
unusually rich command set that provides both high-level operations
and full access to internals.

The git rpm installs common set of tools which are usually using with
small amount of dependencies. To install all git packages, including
tools for integrating with other SCMs, install the git-all meta-package.

-------------------------------------------------------------------------------
-
Update Information:

Resolve an arbitrary code execution vulnerability via crafted "ssh://"
URL
(CVE-2017-1000117). From the [release announcement](https://public-
inbox.org/git/xmqqh8xf482j.fsf@gitster.mtv.corp.google.com/): A malicious
third-party can give a crafted "ssh://..." URL to an unsuspecting
victim,
and an attempt to visit the URL can result in any program that exists on
the
victim's machine being executed. Such a URL could be placed in the
.gitmodules file of a malicious project, and an unsuspecting victim could
be
tricked into running "git clone --recurse-submodules" to trigger
the
vulnerability. Credits to find and fix the issue go to Brian Neel at
GitLab, Joern Schneeweisz of Recurity Labs and Jeff King at GitHub.
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1480386 - CVE-2017-1000117 git: Command injection via malicious
ssh URLs
https://bugzilla.redhat.com/show_bug.cgi?id=1480386
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade git' at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung