git (1:2.5.0-1ubuntu0.1) wily-security; urgency=medium

  * SECURITY UPDATE: arbitrary code execution issues via URLs
    - debian/diff/0008-CVE-2015-7545-1.patch: add a protocol-whitelist
      environment variable.
    - debian/diff/0009-CVE-2015-7545-2.patch: allow only certain protocols
      for submodule fetches.
    - debian/diff/0010-CVE-2015-7545-3.patch: refactor protocol whitelist
      code.
    - debian/diff/0011-CVE-2015-7545-4.patch: limit redirection to
      protocol-whitelist.
    - debian/diff/0012-CVE-2015-7545-5.patch: limit redirection depth.
    - debian/rules: make new tests executable.
    - CVE-2015-7545

Date: 2015-12-11 19:00:14.902447+00:00
Changed-By: Marc Deslauriers <[email protected]>
https://launchpad.net/ubuntu/+source/git/1:2.5.0-1ubuntu0.1
Sorry, changesfile not available.
-- 
Wily-changes mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/wily-changes

Reply via email to