Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2017-2485

Опубликовано: 17 авг. 2017
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2017-2485: git security update (IMPORTANT)

[1.7.1-9]

  • prevent command injection via malicious ssh URLs Resolves: CVE-2017-1000117

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

emacs-git

1.7.1-9.el6_9

emacs-git-el

1.7.1-9.el6_9

git

1.7.1-9.el6_9

git-all

1.7.1-9.el6_9

git-cvs

1.7.1-9.el6_9

git-daemon

1.7.1-9.el6_9

git-email

1.7.1-9.el6_9

git-gui

1.7.1-9.el6_9

git-svn

1.7.1-9.el6_9

gitk

1.7.1-9.el6_9

gitweb

1.7.1-9.el6_9

perl-Git

1.7.1-9.el6_9

Oracle Linux i686

emacs-git

1.7.1-9.el6_9

emacs-git-el

1.7.1-9.el6_9

git

1.7.1-9.el6_9

git-all

1.7.1-9.el6_9

git-cvs

1.7.1-9.el6_9

git-daemon

1.7.1-9.el6_9

git-email

1.7.1-9.el6_9

git-gui

1.7.1-9.el6_9

git-svn

1.7.1-9.el6_9

gitk

1.7.1-9.el6_9

gitweb

1.7.1-9.el6_9

perl-Git

1.7.1-9.el6_9

Связанные CVE

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 8 лет назад

A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.

CVSS3: 6.3
redhat
больше 8 лет назад

A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.

CVSS3: 8.8
nvd
больше 8 лет назад

A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.

CVSS3: 8.8
debian
больше 8 лет назад

A malicious third-party can give a crafted "ssh://..." URL to an unsus ...

suse-cvrf
больше 8 лет назад

Security update for git