Security Team:

Debian marks this as a high importance vulnerability, I'll follow suit
and change the importance here, please feel free to mark it otherwise.

Otherwise, I plan on working on a fix for this, I'll put something here
within an hour or two.

Thanks!

** Changed in: git (Ubuntu Trusty)
   Importance: Undecided => High

** Changed in: git (Ubuntu Xenial)
   Importance: Undecided => High

** Changed in: git (Ubuntu Artful)
       Status: New => In Progress

** Changed in: git (Ubuntu Trusty)
     Assignee: (unassigned) => Simon Quigley (tsimonq2)

** Changed in: git (Ubuntu Zesty)
     Assignee: (unassigned) => Simon Quigley (tsimonq2)

** Changed in: git (Ubuntu Xenial)
     Assignee: (unassigned) => Simon Quigley (tsimonq2)

** Changed in: git (Ubuntu Artful)
     Assignee: (unassigned) => Simon Quigley (tsimonq2)

** Changed in: git (Ubuntu Zesty)
   Importance: Undecided => High

** Changed in: git (Ubuntu Artful)
   Importance: Undecided => High

** Changed in: git (Ubuntu Zesty)
       Status: New => In Progress

** Changed in: git (Ubuntu Xenial)
       Status: New => In Progress

** Changed in: git (Ubuntu Trusty)
       Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1719740

Title:
  [DSA 3984-1] Git cvsserver OS Command Injection

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/git/+bug/1719740/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to