FEDORA-2016-6554eff611 created by dwmw2 4 years ago for Fedora 23
stable

Security fix for CVE-2016-2315, CVE-2016-2324 (by updating to 2.5.5).

How to install

sudo dnf upgrade --advisory=FEDORA-2016-6554eff611

This update has been submitted for testing by dwmw2.

4 years ago
User Icon rg3 commented & provided feedback 4 years ago
karma

Works for me.

This update has been pushed to testing.

4 years ago
User Icon fszymanski commented & provided feedback 4 years ago
karma

Works for me.

This update has been submitted for stable by bodhi.

4 years ago
User Icon leonn commented & provided feedback 4 years ago
karma

Works for me.

User Icon hhlp commented & provided feedback 4 years ago
karma

Look Good to Me

User Icon mhjacks commented & provided feedback 4 years ago
karma

Works for me

User Icon pstodulk commented & provided feedback 4 years ago
karma

Works for me. Tested with crafted repository.

BZ#1317981 CVE-2016-2315 CVE-2016-2324 git: path_name() integer truncation and overflow leading to buffer overflow
BZ#1318220 CVE-2016-2315 CVE-2016-2324 git: remote code execution via buffer overflow [fedora-all]

This update has been pushed to stable.

4 years ago
karma
BZ#1317981 CVE-2016-2315 CVE-2016-2324 git: path_name() integer truncation and overflow leading to buffer overflow
BZ#1318220 CVE-2016-2315 CVE-2016-2324 git: remote code execution via buffer overflow [fedora-all]

Please login to add feedback.

Metadata
Type
security
Karma
7
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
disabled
Dates
submitted
4 years ago
in testing
4 years ago
in stable
4 years ago
BZ#1317981 CVE-2016-2315 CVE-2016-2324 git: path_name() integer truncation and overflow leading to buffer overflow
0
2
BZ#1318220 CVE-2016-2315 CVE-2016-2324 git: remote code execution via buffer overflow [fedora-all]
0
2

Automated Test Results