Security Team:
Debian marks this as a high importance vulnerability, I'll follow suit
and change the importance here, please feel free to mark it otherwise.
Otherwise, I plan on working on a fix for this, I'll put something here
within an hour or two.
Thanks!
** Changed in: git (Ubuntu Trusty)
Importance: Undecided => High
** Changed in: git (Ubuntu Xenial)
Importance: Undecided => High
** Changed in: git (Ubuntu Artful)
Status: New => In Progress
** Changed in: git (Ubuntu Trusty)
Assignee: (unassigned) => Simon Quigley (tsimonq2)
** Changed in: git (Ubuntu Zesty)
Assignee: (unassigned) => Simon Quigley (tsimonq2)
** Changed in: git (Ubuntu Xenial)
Assignee: (unassigned) => Simon Quigley (tsimonq2)
** Changed in: git (Ubuntu Artful)
Assignee: (unassigned) => Simon Quigley (tsimonq2)
** Changed in: git (Ubuntu Zesty)
Importance: Undecided => High
** Changed in: git (Ubuntu Artful)
Importance: Undecided => High
** Changed in: git (Ubuntu Zesty)
Status: New => In Progress
** Changed in: git (Ubuntu Xenial)
Status: New => In Progress
** Changed in: git (Ubuntu Trusty)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1719740
Title:
[DSA 3984-1] Git cvsserver OS Command Injection
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/git/+bug/1719740/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs