You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa cgit

Sigurnosni nedostatak programskog paketa cgit

openSUSE Security Update: Security update for cgit
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2308-1
Rating: moderate
References: #1103799
Cross-References: CVE-2018-14912
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for cgit fixes the following issues:

The following security vulnerability was addressed:

– CVE-2018-14912: Fixed a directory traversal vulnerability, when
enable-http-clone=1 is not turned off (boo#1103799)

The following other changes were made:

– Update to upstream release 1.2.1
* syntax-highlighting: replace invalid unicode with ‘?’
* ui-repolist: properly sort by age
* ui-patch: fix crash when using path limit

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-863=1

Package List:

– openSUSE Leap 15.0 (x86_64):

cgit-1.2.1-lp150.2.3.1
cgit-debuginfo-1.2.1-lp150.2.3.1
cgit-debugsource-1.2.1-lp150.2.3.1

References:

https://www.suse.com/security/cve/CVE-2018-14912.html
https://bugzilla.suse.com/1103799


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for cgit
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2313-1
Rating: moderate
References: #1103799
Cross-References: CVE-2018-14912
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for cgit to version 1.2.1 fixes the following issues:

The following security vulnerability was addressed:

– CVE-2018-14912: Fixed a directory traversal vulnerability, when
enable-http-clone=1 is not turned off (boo#1103799)

The following other changes were made:

– Update to upstream release 1.2.1:
– syntax-highlighting: replace invalid unicode with ‘?’
– ui-repolist: properly sort by age
– ui-patch: fix crash when using path limit

– Update bundled git to 2.11.1

– Update to upstream release 1.0:
* Add repo.homepage/gitweb.homepage setting and homepage tab.
* Show reverse paths in title bar so that browser tab shows filename.
* Allow redirects even when caching is turned on.
* More gracefully deal with unparsable commits.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-864=1

Package List:

– openSUSE Leap 42.3 (i586 x86_64):

cgit-1.2.1-13.3.1
cgit-debuginfo-1.2.1-13.3.1
cgit-debugsource-1.2.1-13.3.1

References:

https://www.suse.com/security/cve/CVE-2018-14912.html
https://bugzilla.suse.com/1103799


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa NetworkManager-vpnc

Otkriven je sigurnosni nedostatak u programskom paketu NetworkManager-vpnc za operacijki sustav openSUSE. Otkriveni nedostatak potencijalnim napadačima omogućuje zaobilaženje sigurnosnih ograničenja,...

Close