git@vger.kernel.org mailing list mirror (one of many)
 help / color / mirror / code / Atom feed
From: "Dyer, Edwin" <Edwin.Dyer@alliancedata.com>
To: Santiago Torres <santiago@nyu.edu>,
	"git@vger.kernel.org" <git@vger.kernel.org>
Cc: "christian.del.vecchio@zurich.com" <christian.del.vecchio@zurich.com>
Subject: RE: GIT 2.3.1 - Code Execution Vulnerability
Date: Thu, 25 Jan 2018 19:01:47 +0000	[thread overview]
Message-ID: <BN6PR0101MB293001FE100A016227C04F9EF1E10@BN6PR0101MB2930.prod.exchangelabs.com> (raw)
In-Reply-To: <20180125172057.ie3pvhxx5egpil35@LykOS.localdomain>

Current Solaris 10/11 version of Git is 2.4.0:

https://www.opencsw.org/package/git/


Ed Dyer
Associate DevOps Engineer

Alliance Data Retail Services
3075 Loyalty Circle, Columbus OH 43219
Office: 614-944-3923| Mobile: 614-432-3862



-----Original Message-----
From: git-owner@vger.kernel.org [mailto:git-owner@vger.kernel.org] On Behalf Of Santiago Torres
Sent: Thursday, January 25, 2018 12:21 PM
To: christian.del.vecchio@zurich.com
Cc: git@vger.kernel.org
Subject: Re: GIT 2.3.1 - Code Execution Vulnerability

Hi, Christian.

They are probably talking about one of these[1][2]. I don't have access to a solaris machine right now, so I don't know which is the latest version they ship, but they probably backported patches. 

Here we can't do much more about it, given that the packagers for your solaris version are the ones (possibly) packaging 2.3.1. I'd email or open a ticket with Oracle after making sure they 1) haven't backported patches to fix these, or 2) don't have a newer version in their repositories.

Cheers!
-Santiago.


[1] https://security.archlinux.org/CVE-2017-1000117
[2] https://nvd.nist.gov/vuln/detail/CVE-2016-2324

On Thu, Jan 25, 2018 at 06:02:34PM +0100, christian.del.vecchio@zurich.com wrote:
> dear Team
> 
> I am Christian Del Vecchio,and i work in the infrastructure of Middleware on Zurich.
> we have installed in our system Sun your product in order to connect to our bitbucket repository.
> 
> we have followed the instruction provided on your Web Page:
> 
> https://git-scm.com/download/linux
> pkgutil -i git
> 
> the version installed is the 2.3.1, and actually it works.
> 
> but last week our security team informed that this software didn't 
> pass the check control due: Git Server and Client Remote Code 
> Execution Vulnerability
> 
> 
> please, is it available a newer version that fix this problem?
> 
> our system is: Sun Solaris v10 sparc
> 
> best regards
> __________________________________________
> 
> Christian Del Vecchio
> Middleware SME
> 
> Zurich Insurance Group Ltd. 
> bac de Roda 58,
> Building C, 4th floor
> 08019 Barcelona, Spain
> 
> 64402 (internal)
> +34 93 4465402 (direct)
> christian.del.vecchio@zurich.com
> http://www.zurich.com

______________________________________________________________________
The information contained in this e-mail message and any attachments may be privileged and confidential. If the reader of this message is not the intended recipient or an agent responsible for delivering it to the intended recipient, you are hereby notified that any review, dissemination, distribution or copying of this communication is strictly prohibited. If you have received this communication in error, please notify the sender immediately by replying to this e-mail and delete the message and any attachments from your computer.
______________________________________________________________________

      reply	other threads:[~2018-01-25 19:01 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-01-25 17:02 GIT 2.3.1 - Code Execution Vulnerability christian.del.vecchio
2018-01-25 17:20 ` Santiago Torres
2018-01-25 19:01   ` Dyer, Edwin [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

  List information: http://vger.kernel.org/majordomo-info.html

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=BN6PR0101MB293001FE100A016227C04F9EF1E10@BN6PR0101MB2930.prod.exchangelabs.com \
    --to=edwin.dyer@alliancedata.com \
    --cc=christian.del.vecchio@zurich.com \
    --cc=git@vger.kernel.org \
    --cc=santiago@nyu.edu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://80x24.org/mirrors/git.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).