![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2017.1357.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2017:1357-1) |
Summary: | The remote host is missing an update for the 'git' package(s) announced via the SUSE-SU-2017:1357-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'git' package(s) announced via the SUSE-SU-2017:1357-1 advisory. Vulnerability Insight: This update for git fixes the following issues: - git 2.12.3: * CVE-2017-8386: Fix git-shell not to escape with the starting dash name (bsc#1038395) * Fix for potential segv introduced in v2.11.0 and later * Misc fixes and cleanups. - git 2.12.2: * CLI output fixes * 'Dump http' transport fixes * various fixes for internal code paths * Trailer 'Cc:' RFC fix - git 2.12.1: * Reduce authentication round-trip over HTTP when the server supports just a single authentication method. * 'git add -i' patch subcommand fixed to have a path selection * various path verification fixes * fix 'git log -L...' buffer overrun Affected Software/OS: 'git' package(s) on SUSE Linux Enterprise Server 12-SP1, SUSE Linux Enterprise Server 12-SP2, SUSE Linux Enterprise Server for Raspberry Pi 12-SP2, SUSE Linux Enterprise Server for SAP Applications 12-SP1, SUSE Linux Enterprise Server for SAP Applications 12-SP2. Solution: Please install the updated package(s). CVSS Score: 6.5 CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-8386 BugTraq ID: 98409 http://www.securityfocus.com/bid/98409 Debian Security Information: DSA-3848 (Google Search) http://www.debian.org/security/2017/dsa-3848 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ISHYFLM2ACYHHY3JHCLF75X7UF4ZMDM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDS3LSJJ3YGGQYIVPKQDVOCXWDSF6JGF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPYRN7APMHY4ZFDPAKD22J5R4QJFY2JP/ https://security.gentoo.org/glsa/201706-04 https://insinuator.net/2017/05/git-shell-bypass-by-abusing-less-cve-2017-8386/ http://public-inbox.org/git/xmqq8tm5ziat.fsf@gitster.mtv.corp.google.com/ RedHat Security Advisories: RHSA-2017:2004 https://access.redhat.com/errata/RHSA-2017:2004 RedHat Security Advisories: RHSA-2017:2491 https://access.redhat.com/errata/RHSA-2017:2491 http://www.securitytracker.com/id/1038479 SuSE Security Announcement: openSUSE-SU-2017:1422 (Google Search) http://lists.opensuse.org/opensuse-updates/2017-05/msg00090.html http://www.ubuntu.com/usn/USN-3287-1 |
Copyright | Copyright (C) 2021 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |