You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa git

Sigurnosni nedostaci programskog paketa git

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2018-080a3d7866
2018-06-01 12:19:10.901608
——————————————————————————–

Name : git
Product : Fedora 27
Version : 2.14.4
Release : 1.fc27
URL : https://git-scm.com/
Summary : Fast Version Control System
Description :
Git is a fast, scalable, distributed revision control system with an
unusually rich command set that provides both high-level operations
and full access to internals.

The git rpm installs common set of tools which are usually using with
small amount of dependencies. To install all git packages, including
tools for integrating with other SCMs, install the git-all meta-package.

——————————————————————————–
Update Information:

Upstream security fixes related to .gitmodules handling. From the [upstream
announcement](https://public-inbox.org/git/xmqqy3g2flb6.fsf@gitster-
ct.c.googlers.com/): “` * Submodule “names” come from the untrusted
.gitmodules file, but we blindly append them to $GIT_DIR/modules to create our
on-disk repo paths. This means you can do bad things by putting “../” into the
name. We now enforce some rules for submodule names which will cause Git to
ignore these malicious names (CVE-2018-11235). Credit for finding this
vulnerability and the proof of concept from which the test script was adapted
goes to Etienne Stalmans. * It was possible to trick the code that sanity-
checks paths on NTFS into reading random piece of memory (CVE-2018-11233). “`
Also fix a segfault in rev-parse with invalid input (#1581678) and install
contrib/diff-highlight (#1550251).
——————————————————————————–
ChangeLog:

* Tue May 29 2018 Todd Zullinger <tmz@pobox.com> – 2.14.4-1
– Update to 2.14.4 (CVE-2018-11233, CVE-2018-11235)
* Thu May 24 2018 Todd Zullinger <tmz@pobox.com> – 2.14.3-4
– Fix segfault in rev-parse with invalid input (#1581678)
– Install contrib/diff-highlight (#1550251)
* Fri Feb 16 2018 Todd Zullinger <tmz@pobox.com> – 2.14.3-3
– git-svn: avoid segfaults in ‘git svn branch’
* Tue Nov 7 2017 Todd Zullinger <tmz@pobox.com> – 2.14.3-2
– Fix git-clone memory exhaustion (CVE-2017-15298)
Resolves: #1510455, #1510457
* Mon Oct 23 2017 Todd Zullinger <tmz@pobox.com> – 2.14.3-1
– Update to 2.14.3
——————————————————————————–
References:

[ 1 ] Bug #1583862 – CVE-2018-11235 git: arbitrary code execution when recursively cloning a malicious repository
https://bugzilla.redhat.com/show_bug.cgi?id=1583862
[ 2 ] Bug #1583888 – CVE-2018-11233 git: path sanity-checks on NTFS can read arbitrary memory
https://bugzilla.redhat.com/show_bug.cgi?id=1583888
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-080a3d7866’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWKTL7J5P3OQER7IUHIJXFASGGZMYKI5/

——————————————————————————–
Fedora Update Notification
FEDORA-2018-75f7624a9f
2018-06-01 12:02:47.407893
——————————————————————————–

Name : git
Product : Fedora 28
Version : 2.17.1
Release : 2.fc28
URL : https://git-scm.com/
Summary : Fast Version Control System
Description :
Git is a fast, scalable, distributed revision control system with an
unusually rich command set that provides both high-level operations
and full access to internals.

The git rpm installs common set of tools which are usually using with
small amount of dependencies. To install all git packages, including
tools for integrating with other SCMs, install the git-all meta-package.

——————————————————————————–
Update Information:

Upstream security fixes related to .gitmodules handling. From the [upstream
announcement](https://public-inbox.org/git/xmqqy3g2flb6.fsf@gitster-
ct.c.googlers.com/): “` * Submodule “names” come from the untrusted
.gitmodules file, but we blindly append them to $GIT_DIR/modules to create our
on-disk repo paths. This means you can do bad things by putting “../” into the
name. We now enforce some rules for submodule names which will cause Git to
ignore these malicious names (CVE-2018-11235). Credit for finding this
vulnerability and the proof of concept from which the test script was adapted
goes to Etienne Stalmans. * It was possible to trick the code that sanity-
checks paths on NTFS into reading random piece of memory (CVE-2018-11233). “`
A preliminary patch to resolve an issue with zlib on aarch64 is also included
(RHBZ#1582555).
——————————————————————————–
ChangeLog:

* Tue May 29 2018 Todd Zullinger <tmz@pobox.com> – 2.17.1-2
– packfile: Correct zlib buffer handling (#1582555)
* Tue May 29 2018 Todd Zullinger <tmz@pobox.com> – 2.17.1-1
– Update to 2.17.1 (CVE-2018-11233, CVE-2018-11235)
* Thu May 24 2018 Todd Zullinger <tmz@pobox.com> – 2.17.0-4
– Fix segfault in rev-parse with invalid input (#1581678)
– Move TEST_SHELL_PATH setting to config.mak
* Mon Apr 16 2018 Todd Zullinger <tmz@pobox.com> – 2.17.0-3
– Move linkcheck macro to existing fedora/rhel > 7 block
– Re-enable t5000-tar-tree.sh test on f28
* Fri Apr 13 2018 Pavel Cahyna <pcahyna@redhat.com>
– Use BuildRequires: perl-interpreter per the packaging guidelines
– Update conditions for future RHEL
* Tue Apr 10 2018 Todd Zullinger <tmz@pobox.com> – 2.17.0-2
– Require perl-generators on EL > 7
* Mon Apr 9 2018 Todd Zullinger <tmz@pobox.com>
– daemon: use –log-destination=stderr with systemd
– daemon: fix condition for redirecting stderr
– git-svn: avoid uninitialized value warning
* Sun Apr 8 2018 Todd Zullinger <tmz@pobox.com>
– Clean up redundant and unneeded Requires
* Sat Apr 7 2018 Todd Zullinger <tmz@pobox.com>
– Remove Git::LoadCPAN to ensure we use only system perl modules
——————————————————————————–
References:

[ 1 ] Bug #1583862 – CVE-2018-11235 git: arbitrary code execution when recursively cloning a malicious repository
https://bugzilla.redhat.com/show_bug.cgi?id=1583862
[ 2 ] Bug #1583888 – CVE-2018-11233 git: path sanity-checks on NTFS can read arbitrary memory
https://bugzilla.redhat.com/show_bug.cgi?id=1583888
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-75f7624a9f’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZDKYTV3LSCNQMBQXEHWGWIWGJUILTTE/

AutorDanijel Kozinovic
Cert idNCERT-REF-2018-06-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa chromium

Otkriven je veći broj sigurnosnih nedostataka u programskom paketu chromium za operacijski sustav openSUSE. Ovisno o tipu nedostatka, potencijalni napadači...

Close