Resolve an arbitrary code execution vulnerability via crafted "ssh://" URL (CVE-2017-1000117).
From the release announcement:
A malicious third-party can give a crafted "ssh://..." URL to an
unsuspecting victim, and an attempt to visit the URL can result in
any program that exists on the victim's machine being executed.
Such a URL could be placed in the .gitmodules file of a malicious
project, and an unsuspecting victim could be tricked into running
"git clone --recurse-submodules" to trigger the vulnerability.
Credits to find and fix the issue go to Brian Neel at GitLab, Joern
Schneeweisz of Recurity Labs and Jeff King at GitHub.
Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:
sudo dnf upgrade --refresh --advisory=FEDORA-2017-8ba7572cfd
Please login to add feedback.
This update has been submitted for testing by tmz.
This update has been pushed to testing.
I been waiting for this update. LGTM
LGTM
Works
This update has been submitted for stable by bodhi.
This update has been pushed to stable.