Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in git
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in git
ID: FEDORA-2021-ffd0b2108d
Distribution: Fedora
Plattformen: Fedora 32
Datum: Mo, 15. März 2021, 23:19
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300
Applikationen: Git

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2021-ffd0b2108d
2021-03-15 19:59:05.869644
-------------------------------------------------------------------------------
-

Name : git
Product : Fedora 32
Version : 2.26.3
Release : 2.fc32
URL : https://git-scm.com/
Summary : Fast Version Control System
Description :
Git is a fast, scalable, distributed revision control system with an
unusually rich command set that provides both high-level operations
and full access to internals.

The git rpm installs common set of tools which are usually using with
small amount of dependencies. To install all git packages, including
tools for integrating with other SCMs, install the git-all meta-package.

-------------------------------------------------------------------------------
-
Update Information:

Security fix for CVE-2021-21300 A specially crafted repository that contains
symbolic links as well as files using a clean/smudge filter such as Git LFS,
may
cause just-checked out script to be executed while cloning onto a case-
insensitive file system such as NTFS, HFS+ or APFS. Note that clean/smudge
filters have to be configured in advance, in the system-wide or global user
configuration for this bug to be exploited. This issue does not affect Fedora
in default configurations. For further details, please refer to the [upstream
advisory](https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm).
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Mar 10 2021 Todd Zullinger <tmz@pobox.com> - 2.26.3-2
- revert "revert to protocol v0 by default"
* Tue Mar 9 2021 Todd Zullinger <tmz@pobox.com> - 2.26.3-1
- update to 2.26.3 (CVE-2021-21300)
* Fri May 29 2020 Todd Zullinger <tmz@pobox.com> - 2.26.2-2
- revert to protocol v0 by default
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1935158 - CVE-2021-21300 git: remote code execution during clone
operation on case-insensitive filesystems
https://bugzilla.redhat.com/show_bug.cgi?id=1935158
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-ffd0b2108d' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung