Hi Gerrit,
* Gerrit Pape <[EMAIL PROTECTED]> [2008-08-13 11:04]:
> On Thu, Aug 07, 2008 at 10:46:01AM +0200, Nico Golde wrote:
> > the following CVE (Common Vulnerabilities & Exposures) id was
> > published for git-core.
> 
> > You can find the upstream patch on:
> > http://kerneltrap.org/mailarchive/git/2008/7/16/2529284
> > 
> > For further information see:
> > 
> > [0] http://secunia.com/advisories/31347/
> 
> Hi, upstream has three commits concerning buffer overflows in point
> release 1.5.6.4
> 
>  http://git.kernel.org/?p=git/git.git;a=commitdiff;h=620e2bb
>  http://git.kernel.org/?p=git/git.git;a=commitdiff;h=fd55a19
>  http://git.kernel.org/?p=git/git.git;a=commitdiff;h=f66cf96
> 
> the NMU misses the first and third.

Ouch. Sorry for messing this up , I was under the impression that the patch in 
linked in the CVE id description is complete.

> I suggest to upload upstream version 1.5.6.5 to fix this, provided it'll
> be accepted for lenny.

Ok.

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpAbqm2KOMFK.pgp
Description: PGP signature

Reply via email to