Source: git-core
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for git-core.

| Some vulnerabilities have been reported in GIT, which can potentially be
| exploited by malicious people to compromise a user's system.
| 
| The vulnerabilities are caused due to boundary errors in various functions 
when
| processing overly long repository pathnames. These can be exploited to cause
| stack-based buffer overflows by tricking a user into running e.g. "git-diff" 
or
| "git-grep" against a repository containing pathnames that are larger than the
| "PATH_MAX" value on the user's system.
| 
| Successful exploitation may allow execution of arbitrary code.

In this case there is no CVE id yet. I will add the CVE id to the bug report
when I got it.  Please make sure to add it in the changelog when fixing the bug
then.

You can find the upstream patch on:
http://kerneltrap.org/mailarchive/git/2008/7/16/2529284

For further information see:

[0] http://secunia.com/advisories/31347/

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpdF4Gz3OfRz.pgp
Description: PGP signature

Reply via email to