drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Preisgabe von Informationen in cgit
Name: |
Preisgabe von Informationen in cgit |
|
ID: |
DSA-4263-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian stretch |
|
Datum: |
Sa, 4. August 2018, 14:32 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14912 |
|
Applikationen: |
cgit |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4263-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso August 04, 2018 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : cgit CVE ID : CVE-2018-14912 Debian Bug : 905382
Jann Horn discovered a directory traversal vulnerability in cgit, a fast web frontend for git repositories written in C. A remote attacker can take advantage of this flaw to retrieve arbitrary files via a specially crafted request, when 'enable-http-clone=1' (default) is not turned off.
For the stable distribution (stretch), this problem has been fixed in version 1.1+git2.10.2-3+deb9u1.
We recommend that you upgrade your cgit packages.
For the detailed security status of cgit please refer to its security tracker page at: https://security-tracker.debian.org/tracker/cgit
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAltllZdfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RH4RAAkS7HwXwIGsqhqrHJFfkz2spXztT5744PI5ssZ6XBYnJ1SfcxXQB7QMe/ yiuzhy9OL3Hk4PIxwbHSh6tZnQhsTGYEPGRC35RM1yUh2uCJlnkhtxWYNvKREjKV Fh4ILihTZ8CcxilA4sXJ7r6WsBgAr0tJEPTPs94SzX9QiOa3krBsdvqYzhkoqx8T xvhMWxDz1GlogwrntObq4BTkrI1WRVwDCH8gkcn3ZgRUK9o44z+g7exQO++4Wepv ERDwEpPXxKg++QPYEoRiiaDtG+Ny901sakORJ4R2RmtOoOrfOuIUFFPj6kfk8q8b IWMVkZu8Q6YhZ/E0/a14zP9elsPmyoK1Vv+UnTkAJDzIVWv+Lqe9a2xZHwQQGKXh 0MJZw5i/527sHGP8Br98ubMhWR8mKBa1d68gE5ZC8cX4UA4Vyp1azoA6E31zdc7I iRW2uU9axIpzJNoLdSdyJcL9ab57mkwrMsY37ihTXHAnF/ufqid+BlegPVTeM6j2 7DhZkZ7xqdZfnhm3pPthakAE/I3KRhqSGzYlf/ADDaIXA97/MNOBljzxOE0qvO2M EVWyoBxWiu3UPe/41fv0f8If8+y4eZ9BLpG90UdQ2WTT5odE3o92+GR5ICXSNme4 8it1K6IrxU9W/RZ9dzV+ldpkcj2/gy8aS1dp1L/z5qMAJ1U/jaU= =5WPv -----END PGP SIGNATURE-----
|
|
|
|