From opensuse-security@opensuse.org Sun Sep 20 04:15:21 2020 From: opensuse-security@opensuse.org To: security-announce@lists.opensuse.org Subject: [security-announce] openSUSE-SU-2020:1478-1: important: Security update for fossil Date: Sun, 20 Sep 2020 06:15:21 +0200 Message-ID: <20200920041521.598B0FCFD@maintenance.suse.de> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============7889093549592947830==" --===============7889093549592947830== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable openSUSE Security Update: Security update for fossil ______________________________________________________________________________ Announcement ID: openSUSE-SU-2020:1478-1 Rating: important References: #1047218 #1175760=20 Cross-References: CVE-2020-24614 Affected Products: openSUSE Leap 15.2 openSUSE Leap 15.1 openSUSE Backports SLE-15-SP2 openSUSE Backports SLE-15-SP1 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update for fossil fixes the following issues: - fossil 2.12.1: * CVE-2020-24614: Remote authenticated users with check-in or administrative privileges could have executed arbitrary code [boo#1175760] * Security fix in the "fossil git export" command. New "safety-net" features were added to prevent similar problems in the future. * Enhancements to the graph display for cases when there are many cherry-pick merges into a single check-in. Example * Enhance the fossil open command with the new --workdir option and the ability to accept a URL as the repository name, causing the remote repository to be cloned automatically. Do not allow "fossil open" to open in a non-empty working directory unless the --keep option or the new --force option is used. * Enhance the markdown formatter to more closely follow the CommonMark specification with regard to text highlighting. Underscores in the middle of identifiers (ex: fossil_printf()) no longer need to be escaped. * The markdown-to-html translator can prevent unsafe HTML (for example: