summaryrefslogtreecommitdiff
path: root/metadata/glsa/glsa-201805-13.xml
diff options
context:
space:
mode:
authorV3n3RiX <venerix@redcorelinux.org>2018-06-02 17:13:10 +0100
committerV3n3RiX <venerix@redcorelinux.org>2018-06-02 17:13:10 +0100
commit0bff53119f08d677db6c1a991bd30741682a8a08 (patch)
tree6ec8d4c38152bb4f2bb4b93277236ebd9fbbd21d /metadata/glsa/glsa-201805-13.xml
parent6c14fa2586d9e9c4427b5f727dc6c8ab77587cec (diff)
Revert "gentoo resync : 02.06.2018"
This reverts commit 6c14fa2586d9e9c4427b5f727dc6c8ab77587cec.
Diffstat (limited to 'metadata/glsa/glsa-201805-13.xml')
-rw-r--r--metadata/glsa/glsa-201805-13.xml51
1 files changed, 0 insertions, 51 deletions
diff --git a/metadata/glsa/glsa-201805-13.xml b/metadata/glsa/glsa-201805-13.xml
deleted file mode 100644
index 701ee3093bcd..000000000000
--- a/metadata/glsa/glsa-201805-13.xml
+++ /dev/null
@@ -1,51 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-<glsa id="201805-13">
- <title>Git: Multiple vulnerabilities</title>
- <synopsis>Git contains multiple vulnerabilities that allow for the remote
- execution of arbitrary code.
- </synopsis>
- <product type="ebuild">git</product>
- <announced>2018-05-30</announced>
- <revised count="1">2018-05-30</revised>
- <bug>656868</bug>
- <access>remote</access>
- <affected>
- <package name="dev-vcs/git" auto="yes" arch="*">
- <unaffected range="ge">2.16.4</unaffected>
- <vulnerable range="lt">2.16.4</vulnerable>
- </package>
- </affected>
- <background>
- <p>Git is a free and open source distributed version control system
- designed to handle everything from small to very large projects with
- speed and efficiency.
- </p>
- </background>
- <description>
- <p>Multiple vulnerabilities have been discovered in Git. Please review the
- CVE identifiers referenced below for details.
- </p>
- </description>
- <impact type="high">
- <p>Remote attackers could execute arbitrary code on both client and server.</p>
- </impact>
- <workaround>
- <p>There is no known workaround at this time.</p>
- </workaround>
- <resolution>
- <p>All Git users should upgrade to the latest version:</p>
-
- <code>
- # emerge --sync
- # emerge --ask --oneshot --verbose "&gt;=dev-vcs/git-2.16.4"
- </code>
-
- </resolution>
- <references>
- <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-11233">CVE-2018-11233</uri>
- <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-11235">CVE-2018-11235</uri>
- </references>
- <metadata tag="requester" timestamp="2018-05-30T00:57:53Z">whissi</metadata>
- <metadata tag="submitter" timestamp="2018-05-30T01:20:47Z">whissi</metadata>
-</glsa>