Описание
ELSA-2017-2484: git security update (IMPORTANT)
[1.8.3.1-12]
- prevent command injection via malicious ssh URLs Resolves: CVE-2017-1000117
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
emacs-git
1.8.3.1-12.el7_4
emacs-git-el
1.8.3.1-12.el7_4
git
1.8.3.1-12.el7_4
git-all
1.8.3.1-12.el7_4
git-bzr
1.8.3.1-12.el7_4
git-cvs
1.8.3.1-12.el7_4
git-daemon
1.8.3.1-12.el7_4
git-email
1.8.3.1-12.el7_4
git-gui
1.8.3.1-12.el7_4
git-hg
1.8.3.1-12.el7_4
git-p4
1.8.3.1-12.el7_4
git-svn
1.8.3.1-12.el7_4
gitk
1.8.3.1-12.el7_4
gitweb
1.8.3.1-12.el7_4
perl-Git
1.8.3.1-12.el7_4
perl-Git-SVN
1.8.3.1-12.el7_4
Oracle Linux x86_64
emacs-git
1.8.3.1-12.el7_4
emacs-git-el
1.8.3.1-12.el7_4
git
1.8.3.1-12.el7_4
git-all
1.8.3.1-12.el7_4
git-bzr
1.8.3.1-12.el7_4
git-cvs
1.8.3.1-12.el7_4
git-daemon
1.8.3.1-12.el7_4
git-email
1.8.3.1-12.el7_4
git-gui
1.8.3.1-12.el7_4
git-hg
1.8.3.1-12.el7_4
git-p4
1.8.3.1-12.el7_4
git-svn
1.8.3.1-12.el7_4
gitk
1.8.3.1-12.el7_4
gitweb
1.8.3.1-12.el7_4
perl-Git
1.8.3.1-12.el7_4
perl-Git-SVN
1.8.3.1-12.el7_4
Связанные CVE
Связанные уязвимости
A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
A malicious third-party can give a crafted "ssh://..." URL to an unsus ...