Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 21 Jul 2010 23:17:01 -0400
From: Greg Brockman <gdb@....EDU>
Cc: Junio C Hamano <>
Subject: CVE request: git

A fix for an exploitable buffer overrun was committed to git in [1].
In particular, if an attacker were to create a crafted working copy
where the user runs any git command, the attacker could force
execution of arbitrary code.

This attack should be mitigated to a denial of service if git is
compiled with appropriate stack-protecting flags.

This buffer overrun was introduced in [2], which first appeared in
v1.5.6, and is fixed in v1.7.2.



Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ