Security home

 

Home / mailingsPDF  

[USN-3387-1] Git vulnerability

Posted on 11 August 2017
Ubuntu Security

--===============5859403027820601452==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature"; boundary="5lyqnftpvgxdthsz"
Content-Disposition: inline


--5lyqnftpvgxdthsz
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-3387-1
August 11, 2017

git vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Git could be made run programs as your login if it opened a specially
crafted git repository.

Software Description:
- git: fast, scalable, distributed revision control system

Details:

Brian Neel, Joern Schneeweisz, and Jeff King discovered that Git did
not properly handle host names in 'ssh://' URLs. A remote attacker
could use this to construct a git repository that when accessed could
run arbitrary code with the privileges of the user.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
git 1:2.11.0-2ubuntu0.2

Ubuntu 16.04 LTS:
git 1:2.7.4-0ubuntu1.2

Ubuntu 14.04 LTS:
git 1:1.9.1-1ubuntu0.6

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3387-1
CVE-2017-1000117

Package Information:
https://launchpad.net/ubuntu/+source/git/1:2.11.0-2ubuntu0.2
https://launchpad.net/ubuntu/+source/git/1:2.7.4-0ubuntu1.2
https://launchpad.net/ubuntu/+source/git/1:1.9.1-1ubuntu0.6

 

TOP

Mailings :

Exploits :