You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa git

Sigurnosni nedostatak programskog paketa git

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2470-1
January 14, 2015

git vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

Git could be made to run programs as your login if it received specially
crafted changes from a remote repository.

Software Description:
– git: fast, scalable, distributed revision control system

Details:

Matt Mackall and Augie Fackler discovered that Git incorrectly handled certain
filesystem paths. A remote attacker could possibly use this issue to execute
arbitrary code if the Git tree is stored in an HFS+ or NTFS filesystem. The
remote attacker would need write access to a Git repository that the victim
pulls from.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.10:
git 1:2.1.0-1ubuntu0.1

Ubuntu 14.04 LTS:
git 1:1.9.1-1ubuntu0.1

Ubuntu 12.04 LTS:
git 1:1.7.9.5-1ubuntu0.1

After a standard system update you need to set the core.protectHFS and/or
core.protectNTFS Git configuration variables to “true” if you store Git trees
in HFS+ and/or NTFS filesystems. If you host Git trees, setting the
core.protectHFS, core.protectNTFS, and receive.fsckObjects Git configuration
variables to “true” will cause your Git server to reject objects containing
malicious paths intended to overwrite the Git metadata.

References:
http://www.ubuntu.com/usn/usn-2470-1
CVE-2014-9390

Package Information:
https://launchpad.net/ubuntu/+source/git/1:2.1.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/git/1:1.9.1-1ubuntu0.1
https://launchpad.net/ubuntu/+source/git/1:1.7.9.5-1ubuntu0.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=FQQB
—–END PGP SIGNATURE—–

AutorMarko Stanec
Cert idNCERT-REF-2015-01-0049-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivosti jezgre operacijskog sustava

Otkrivene su ranjivosti u jezgri operacijskog sustava RHEL 6.4 Extended Update Support. Ranjivosti su pronađene u SCTP implementaciji, a mogle...

Close