FEDORA-EPEL-2016-5a99f2af94

security update in Fedora EPEL 5 for git

Status: stable 3 years ago

Security fix for CVE-2016-2315, CVE-2016-2324 and minor upstream bugfix release. The same fix from EL-6 is used, which simply dies when presented with paths that exceed the maximum allowed length (determined by the OS).

Refer to the upstream release notes for 1.8.2.2 and 1.8.2.3 for further details regarding bugfixes since 1.8.2.1.

Comments 5

This update has been submitted for testing by tmz.

This update has been pushed to testing.

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

This update has been submitted for stable by tmz.

This update has been pushed to stable.

Add Comment & Feedback

Please login to add feedback.

Content Type
RPM
Status
stable
Test Gating
Submitted by
Update Type
security
Update Severity
medium
Karma
0
stable threshold: 3
unstable threshold: -3
Autopush (karma)
Enabled
Autopush (time)
Disabled
Dates
submitted 3 years ago
in testing 3 years ago
in stable 3 years ago

Related Bugs 2

00 #1317981 CVE-2016-2315 CVE-2016-2324 git: path_name() integer truncation and overflow leading to buffer overflow
00 #1317982 CVE-2016-2315 CVE-2016-2324 git: remote code execution via buffer overflow [epel-5]

Automated Test Results