You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa libgit2

Sigurnosni nedostaci programskog paketa libgit2

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2018-fb071377ba
2018-07-19 17:46:53.575273
——————————————————————————–

Name : libgit2
Product : Fedora 27
Version : 0.26.5
Release : 1.fc27
URL : http://libgit2.github.com/
Summary : C implementation of the Git core methods as a library with a solid API
Description :
libgit2 is a portable, pure C implementation of the Git core methods
provided as a re-entrant linkable library with a solid API, allowing
you to write native speed custom Git applications in any language
with bindings.

——————————————————————————–
Update Information:

Update to 0.26.5 (CVE-2018-10887, CVE-2018-10888)
——————————————————————————–
ChangeLog:

* Tue Jul 10 2018 Pete Walter <pwalter@fedoraproject.org> – 0.26.5-1
– Update to 0.26.5 (CVE-2018-10887, CVE-2018-10888)
* Mon Jun 25 2018 Pete Walter <pwalter@fedoraproject.org> – 0.26.4-1
– Update to 0.26.4 (CVE-2018-11235)
* Mon Mar 12 2018 Igor Gnatenko <ignatenkobrain@fedoraproject.org> – 0.26.3-1
– Update to 0.26.3
* Wed Feb 7 2018 Fedora Release Engineering <releng@fedoraproject.org> – 0.26.0-5
– Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
* Fri Feb 2 2018 Igor Gnatenko <ignatenkobrain@fedoraproject.org> – 0.26.0-4
– Switch to %ldconfig_scriptlets
——————————————————————————–
References:

[ 1 ] Bug #1598024 – CVE-2018-10888 libgit2: an improper input validation leads to an out-of-bound read in git_delta_apply, allowing to read beyond delta limits
https://bugzilla.redhat.com/show_bug.cgi?id=1598024
[ 2 ] Bug #1598021 – CVE-2018-10887 libgit2: integer overflow leads to out-of-bounds read in git_delta_apply, allowing to read before base array
https://bugzilla.redhat.com/show_bug.cgi?id=1598021
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-fb071377ba’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5GAR2S4GMRIEBQXZU3D6ZDJQTR5C4MZH/

——————————————————————————–
Fedora Update Notification
FEDORA-2018-4d253dc945
2018-07-19 18:02:50.871497
——————————————————————————–

Name : libgit2
Product : Fedora 28
Version : 0.26.5
Release : 1.fc28
URL : http://libgit2.github.com/
Summary : C implementation of the Git core methods as a library with a solid API
Description :
libgit2 is a portable, pure C implementation of the Git core methods
provided as a re-entrant linkable library with a solid API, allowing
you to write native speed custom Git applications in any language
with bindings.

——————————————————————————–
Update Information:

Update to 0.26.5 (CVE-2018-10887, CVE-2018-10888)
——————————————————————————–
ChangeLog:

* Tue Jul 10 2018 Pete Walter <pwalter@fedoraproject.org> – 0.26.5-1
– Update to 0.26.5 (CVE-2018-10887, CVE-2018-10888)
* Mon Jun 25 2018 Pete Walter <pwalter@fedoraproject.org> – 0.26.4-1
– Update to 0.26.4 (CVE-2018-11235)
——————————————————————————–
References:

[ 1 ] Bug #1598024 – CVE-2018-10888 libgit2: an improper input validation leads to an out-of-bound read in git_delta_apply, allowing to read beyond delta limits
https://bugzilla.redhat.com/show_bug.cgi?id=1598024
[ 2 ] Bug #1598021 – CVE-2018-10887 libgit2: integer overflow leads to out-of-bounds read in git_delta_apply, allowing to read before base array
https://bugzilla.redhat.com/show_bug.cgi?id=1598021
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-4d253dc945’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DI7CXOAS5SSCDPWYHUDJEDPVLTAFS6H/

AutorPetar Bertok
Cert idNCERT-REF-2018-07-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa mercurial

Otkriveni su sigurnosni nedostaci u programskom paketu mercurial za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju podljev među-spremnika. Savjetuje...

Close