drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in git
Name: |
Zwei Probleme in git |
|
ID: |
FEDORA-2018-75f7624a9f |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 28 |
|
Datum: |
Fr, 1. Juni 2018, 14:20 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11233
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235 |
|
Applikationen: |
Git |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2018-75f7624a9f 2018-06-01 12:02:47.407893 ------------------------------------------------------------------------------- -
Name : git Product : Fedora 28 Version : 2.17.1 Release : 2.fc28 URL : https://git-scm.com/ Summary : Fast Version Control System Description : Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals.
The git rpm installs common set of tools which are usually using with small amount of dependencies. To install all git packages, including tools for integrating with other SCMs, install the git-all meta-package.
------------------------------------------------------------------------------- - Update Information:
Upstream security fixes related to .gitmodules handling. From the [upstream announcement](https://public-inbox.org/git/xmqqy3g2flb6.fsf@gitster- ct.c.googlers.com/): ``` * Submodule "names" come from the untrusted .gitmodules file, but we blindly append them to $GIT_DIR/modules to create our on-disk repo paths. This means you can do bad things by putting "../" into the name. We now enforce some rules for submodule names which will cause Git to ignore these malicious names (CVE-2018-11235). Credit for finding this vulnerability and the proof of concept from which the test script was adapted goes to Etienne Stalmans. * It was possible to trick the code that sanity- checks paths on NTFS into reading random piece of memory (CVE-2018-11233). ``` A preliminary patch to resolve an issue with zlib on aarch64 is also included (RHBZ#1582555). ------------------------------------------------------------------------------- - ChangeLog:
* Tue May 29 2018 Todd Zullinger <tmz@pobox.com> - 2.17.1-2 - packfile: Correct zlib buffer handling (#1582555) * Tue May 29 2018 Todd Zullinger <tmz@pobox.com> - 2.17.1-1 - Update to 2.17.1 (CVE-2018-11233, CVE-2018-11235) * Thu May 24 2018 Todd Zullinger <tmz@pobox.com> - 2.17.0-4 - Fix segfault in rev-parse with invalid input (#1581678) - Move TEST_SHELL_PATH setting to config.mak * Mon Apr 16 2018 Todd Zullinger <tmz@pobox.com> - 2.17.0-3 - Move linkcheck macro to existing fedora/rhel > 7 block - Re-enable t5000-tar-tree.sh test on f28 * Fri Apr 13 2018 Pavel Cahyna <pcahyna@redhat.com> - Use BuildRequires: perl-interpreter per the packaging guidelines - Update conditions for future RHEL * Tue Apr 10 2018 Todd Zullinger <tmz@pobox.com> - 2.17.0-2 - Require perl-generators on EL > 7 * Mon Apr 9 2018 Todd Zullinger <tmz@pobox.com> - daemon: use --log-destination=stderr with systemd - daemon: fix condition for redirecting stderr - git-svn: avoid uninitialized value warning * Sun Apr 8 2018 Todd Zullinger <tmz@pobox.com> - Clean up redundant and unneeded Requires * Sat Apr 7 2018 Todd Zullinger <tmz@pobox.com> - Remove Git::LoadCPAN to ensure we use only system perl modules ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1583862 - CVE-2018-11235 git: arbitrary code execution when recursively cloning a malicious repository https://bugzilla.redhat.com/show_bug.cgi?id=1583862 [ 2 ] Bug #1583888 - CVE-2018-11233 git: path sanity-checks on NTFS can read arbitrary memory https://bugzilla.redhat.com/show_bug.cgi?id=1583888 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2018-75f7624a9f' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZDKYTV3LSCNQMBQXEHWGWIWGJUILTTE/
|
|
|
|