stable

git-2.5.5-1.fc23

FEDORA-2016-6554eff611 created by dwmw2 8 years ago for Fedora 23

Security fix for CVE-2016-2315, CVE-2016-2324 (by updating to 2.5.5).

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2016-6554eff611

This update has been submitted for testing by dwmw2.

8 years ago
User Icon rg3 commented & provided feedback 8 years ago
karma

Works for me.

This update has been pushed to testing.

8 years ago
User Icon fszymanski commented & provided feedback 8 years ago
karma

Works for me.

This update has been submitted for stable by bodhi.

8 years ago
User Icon leonn commented & provided feedback 8 years ago
karma

Works for me.

User Icon hhlp commented & provided feedback 8 years ago
karma

Look Good to Me

User Icon mhjacks commented & provided feedback 8 years ago
karma

Works for me

User Icon pstodulk commented & provided feedback 8 years ago
karma

Works for me. Tested with crafted repository.

BZ#1317981 CVE-2016-2315 CVE-2016-2324 git: path_name() integer truncation and overflow leading to buffer overflow
BZ#1318220 CVE-2016-2315 CVE-2016-2324 git: remote code execution via buffer overflow [fedora-all]

This update has been pushed to stable.

8 years ago
karma
BZ#1317981 CVE-2016-2315 CVE-2016-2324 git: path_name() integer truncation and overflow leading to buffer overflow
BZ#1318220 CVE-2016-2315 CVE-2016-2324 git: remote code execution via buffer overflow [fedora-all]

Please login to add feedback.

Metadata
Type
security
Karma
7
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
disabled
Dates
submitted
8 years ago
in testing
8 years ago
in stable
8 years ago
BZ#1317981 CVE-2016-2315 CVE-2016-2324 git: path_name() integer truncation and overflow leading to buffer overflow
0
2
BZ#1318220 CVE-2016-2315 CVE-2016-2324 git: remote code execution via buffer overflow [fedora-all]
0
2

Automated Test Results