ALT-BU-2019-3692-1
Branch p8 update bulletin.
Closed vulnerabilities
BDU:2017-02354
Уязвимость распределенной системы управления версиями Git, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольные команды операционной системы
BDU:2018-01486
Уязвимость распределенной системы управления версиями Git, связанная с ошибками в обработке специально сформированных имён подмодулей, позволяющая нарушителю выполнить произвольный код
BDU:2019-00423
Уязвимость функционала «git clone» распределенной системы контроля версий Git, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2017-1000117
A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
- DSA-3934
- DSA-3934
- 100283
- 100283
- 1039131
- 1039131
- RHSA-2017:2484
- RHSA-2017:2484
- RHSA-2017:2485
- RHSA-2017:2485
- RHSA-2017:2491
- RHSA-2017:2491
- RHSA-2017:2674
- RHSA-2017:2674
- RHSA-2017:2675
- RHSA-2017:2675
- GLSA-201709-10
- GLSA-201709-10
- https://support.apple.com/HT208103
- https://support.apple.com/HT208103
- 42599
- 42599
- https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1466490.html
- https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1466490.html
Modified: 2024-11-21
CVE-2017-14867
Git before 2.10.5, 2.11.x before 2.11.4, 2.12.x before 2.12.5, 2.13.x before 2.13.6, and 2.14.x before 2.14.2 uses unsafe Perl scripts to support subcommands such as cvsserver, which allows attackers to execute arbitrary OS commands via shell metacharacters in a module name. The vulnerable code is reachable via git-shell even without CVS support.
- http://www.openwall.com/lists/oss-security/2017/09/26/9
- http://www.openwall.com/lists/oss-security/2017/09/26/9
- 101060
- 101060
- 1039431
- 1039431
- https://bugs.debian.org/876854
- https://bugs.debian.org/876854
- https://lists.debian.org/debian-security-announce/2017/msg00246.html
- https://lists.debian.org/debian-security-announce/2017/msg00246.html
- https://public-inbox.org/git/xmqqy3p29ekj.fsf%40gitster.mtv.corp.google.com/T/#u
- https://public-inbox.org/git/xmqqy3p29ekj.fsf%40gitster.mtv.corp.google.com/T/#u
- DSA-3984
- DSA-3984
Modified: 2024-11-21
CVE-2017-15298
Git through 2.14.2 mishandles layers of tree objects, which allows remote attackers to cause a denial of service (memory consumption) via a crafted repository, aka a Git bomb. This can also have an impact of disk consumption; however, an affected process typically would not survive its attempt to build the data structure in memory before writing to disk.
Modified: 2024-11-21
CVE-2017-8386
git-shell in git before 2.4.12, 2.5.x before 2.5.6, 2.6.x before 2.6.7, 2.7.x before 2.7.5, 2.8.x before 2.8.5, 2.9.x before 2.9.4, 2.10.x before 2.10.3, 2.11.x before 2.11.2, and 2.12.x before 2.12.3 might allow remote authenticated users to gain privileges via a repository name that starts with a - (dash) character.
- openSUSE-SU-2017:1422
- openSUSE-SU-2017:1422
- [git] 20170510 [ANNOUNCE] Git v2.12.3 and others
- [git] 20170510 [ANNOUNCE] Git v2.12.3 and others
- DSA-3848
- DSA-3848
- 98409
- 98409
- 1038479
- 1038479
- USN-3287-1
- USN-3287-1
- RHSA-2017:2004
- RHSA-2017:2004
- RHSA-2017:2491
- RHSA-2017:2491
- https://insinuator.net/2017/05/git-shell-bypass-by-abusing-less-cve-2017-8386/
- https://insinuator.net/2017/05/git-shell-bypass-by-abusing-less-cve-2017-8386/
- https://kernel.googlesource.com/pub/scm/git/git/+/3ec804490a265f4c418a321428c12f3f18b7eff5
- https://kernel.googlesource.com/pub/scm/git/git/+/3ec804490a265f4c418a321428c12f3f18b7eff5
- FEDORA-2017-01a7989fc0
- FEDORA-2017-01a7989fc0
- FEDORA-2017-f4319b6dfc
- FEDORA-2017-f4319b6dfc
- FEDORA-2017-7ea0e02914
- FEDORA-2017-7ea0e02914
- GLSA-201706-04
- GLSA-201706-04
Modified: 2024-11-21
CVE-2018-1000021
GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack).
Modified: 2024-11-21
CVE-2018-11233
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, code to sanity-check pathnames on NTFS can result in reading out-of-bounds memory.
Modified: 2024-11-21
CVE-2018-11235
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- 104345
- 104345
- 1040991
- 1040991
- RHSA-2018:1957
- RHSA-2018:1957
- RHSA-2018:2147
- RHSA-2018:2147
- https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/
- https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/
- https://marc.info/?l=git&m=152761328506724&w=2
- https://marc.info/?l=git&m=152761328506724&w=2
- GLSA-201805-13
- GLSA-201805-13
- USN-3671-1
- USN-3671-1
- DSA-4212
- DSA-4212
- 44822
- 44822
Modified: 2024-11-21
CVE-2018-17456
Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character.
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html
- http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html
- 105523
- 105523
- 107511
- 107511
- 1041811
- 1041811
- RHSA-2018:3408
- RHSA-2018:3408
- RHSA-2018:3505
- RHSA-2018:3505
- RHSA-2018:3541
- RHSA-2018:3541
- RHSA-2020:0316
- RHSA-2020:0316
- https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404
- https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404
- https://github.com/git/git/commit/a124133e1e6ab5c7a9fef6d0e6bcb084e3455b46
- https://github.com/git/git/commit/a124133e1e6ab5c7a9fef6d0e6bcb084e3455b46
- https://marc.info/?l=git&m=153875888916397&w=2
- https://marc.info/?l=git&m=153875888916397&w=2
- 20190320 March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities
- 20190320 March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities
- USN-3791-1
- USN-3791-1
- DSA-4311
- DSA-4311
- 45548
- 45548
- 45631
- 45631
- https://www.openwall.com/lists/oss-security/2018/10/06/3
- https://www.openwall.com/lists/oss-security/2018/10/06/3
Closed bugs
Переименовать пакет в git-full
git-core should depend on perl-Git