Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in git
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in git
ID: FEDORA-2018-75f7624a9f
Distribution: Fedora
Plattformen: Fedora 28
Datum: Fr, 1. Juni 2018, 14:20
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11233
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235
Applikationen: Git

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2018-75f7624a9f
2018-06-01 12:02:47.407893
-------------------------------------------------------------------------------
-

Name : git
Product : Fedora 28
Version : 2.17.1
Release : 2.fc28
URL : https://git-scm.com/
Summary : Fast Version Control System
Description :
Git is a fast, scalable, distributed revision control system with an
unusually rich command set that provides both high-level operations
and full access to internals.

The git rpm installs common set of tools which are usually using with
small amount of dependencies. To install all git packages, including
tools for integrating with other SCMs, install the git-all meta-package.

-------------------------------------------------------------------------------
-
Update Information:

Upstream security fixes related to .gitmodules handling. From the [upstream
announcement](https://public-inbox.org/git/xmqqy3g2flb6.fsf@gitster-
ct.c.googlers.com/): ``` * Submodule "names" come from the untrusted
.gitmodules file, but we blindly append them to $GIT_DIR/modules to create
our
on-disk repo paths. This means you can do bad things by putting "../"
into the
name. We now enforce some rules for submodule names which will cause Git to
ignore these malicious names (CVE-2018-11235). Credit for finding this
vulnerability and the proof of concept from which the test script was adapted
goes to Etienne Stalmans. * It was possible to trick the code that sanity-
checks paths on NTFS into reading random piece of memory (CVE-2018-11233).
```
A preliminary patch to resolve an issue with zlib on aarch64 is also included
(RHBZ#1582555).
-------------------------------------------------------------------------------
-
ChangeLog:

* Tue May 29 2018 Todd Zullinger <tmz@pobox.com> - 2.17.1-2
- packfile: Correct zlib buffer handling (#1582555)
* Tue May 29 2018 Todd Zullinger <tmz@pobox.com> - 2.17.1-1
- Update to 2.17.1 (CVE-2018-11233, CVE-2018-11235)
* Thu May 24 2018 Todd Zullinger <tmz@pobox.com> - 2.17.0-4
- Fix segfault in rev-parse with invalid input (#1581678)
- Move TEST_SHELL_PATH setting to config.mak
* Mon Apr 16 2018 Todd Zullinger <tmz@pobox.com> - 2.17.0-3
- Move linkcheck macro to existing fedora/rhel > 7 block
- Re-enable t5000-tar-tree.sh test on f28
* Fri Apr 13 2018 Pavel Cahyna <pcahyna@redhat.com>
- Use BuildRequires: perl-interpreter per the packaging guidelines
- Update conditions for future RHEL
* Tue Apr 10 2018 Todd Zullinger <tmz@pobox.com> - 2.17.0-2
- Require perl-generators on EL > 7
* Mon Apr 9 2018 Todd Zullinger <tmz@pobox.com>
- daemon: use --log-destination=stderr with systemd
- daemon: fix condition for redirecting stderr
- git-svn: avoid uninitialized value warning
* Sun Apr 8 2018 Todd Zullinger <tmz@pobox.com>
- Clean up redundant and unneeded Requires
* Sat Apr 7 2018 Todd Zullinger <tmz@pobox.com>
- Remove Git::LoadCPAN to ensure we use only system perl modules
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1583862 - CVE-2018-11235 git: arbitrary code execution when
recursively cloning a malicious repository
https://bugzilla.redhat.com/show_bug.cgi?id=1583862
[ 2 ] Bug #1583888 - CVE-2018-11233 git: path sanity-checks on NTFS can read
arbitrary memory
https://bugzilla.redhat.com/show_bug.cgi?id=1583888
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2018-75f7624a9f' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZDKYTV3LSCNQMBQXEHWGWIWGJUILTTE/
Pro-Linux
Unterstützer werden
Neue Nachrichten
Werbung