*** This bug is a security vulnerability *** You have been subscribed to a public security bug by Marc Deslauriers (mdeslaur):
Binary package hint: git-core A fix for an exploitable buffer overrun (CVE-2010-2542, per [1]) was committed to git in [2]. In particular, if an attacker were to create a crafted working copy where the user runs any git command, the attacker could force execution of arbitrary code. This attack should be mitigated to a denial of service if git is compiled with appropriate stack-protecting flags, as I believe is the case on Ubuntu. This buffer overrun was introduced in [3], which first appeared in v1.5.6, and is fixed in v1.7.2. Greg [1] http://seclists.org/oss-sec/2010/q3/93 [2] http://git.kernel.org/?p=git/git.git;a=commit;h=3c9d0414ed2db0167e6c828b547be8fc9f88fccc [3] http://git.kernel.org/?p=git/git.git;a=commit;h=b44ebb19e3234c5dffe9869ceac5408bb44c2e20 ** Affects: git-core (Ubuntu) Importance: Undecided Status: New -- git-core: upstream fix for buffer overrun (CVE-2010-2542) https://bugs.edge.launchpad.net/bugs/608973 You received this bug notification because you are a member of Ubuntu Bugs, which is a direct subscriber. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs