security update in Fedora 25 for git

Status: stable 11 months ago

Resolve an arbitrary code execution vulnerability via crafted "ssh://" URL (CVE-2017-1000117).

From the release announcement:

A malicious third-party can give a crafted "ssh://..." URL to an
unsuspecting victim, and an attempt to visit the URL can result in
any program that exists on the victim's machine being executed.
Such a URL could be placed in the .gitmodules file of a malicious
project, and an unsuspecting victim could be tricked into running
"git clone --recurse-submodules" to trigger the vulnerability.

Credits to find and fix the issue go to Brian Neel at GitLab, Joern
Schneeweisz of Recurity Labs and Jeff King at GitHub.

Comments 7

This update has been submitted for testing by tmz.

This update has been pushed to testing.

I been waiting for this update. LGTM

karma: +1 critpath: +1 #1480386: +1


karma: +1 critpath: +1 #1480386: +1

This update has been submitted for stable by bodhi.

This update has been pushed to stable.

Add Comment & Feedback
Toggle Preview

Comment fields support Fedora-Flavored Markdown. Comments are governed under this privacy policy.

-1 0 +1 Feedback Guidelines
#1480386 CVE-2017-1000117 git: Command injection via malicious ssh URLs
Does the system's basic functionality continue to work after this update?
Is the update generally functional?
Content Type
Test Gating Status
Tests not running
Submitted by
Update Type
Update Severity
stable threshold: 3
unstable threshold: -3
submitted 11 months ago
in testing 11 months ago
in stable 11 months ago

Related Bugs 1

0+2 #1480386 CVE-2017-1000117 git: Command injection via malicious ssh URLs

Automated Test Results

Test results and gating status may sometimes conflict as the gating status is retrieved periodically by Bodhi's backend server, while the test results presented here are retrieved upon page load. If your update is marked as gated while all the tests show green/passed, the next check of gating status should open the gate.