blob: 65a1dc0bbe88707100e9120a4a6b1f76cf32fb05 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200809-16">
<title>Git: User-assisted execution of arbitrary code</title>
Multiple buffer overflow vulnerabilities have been discovered in Git.
<product type="ebuild">git</product>
<announced>September 25, 2008</announced>
<revised>September 25, 2008: 01</revised>
<package name="dev-util/git" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
Git is a distributed version control system.
Multiple boundary errors in the functions diff_addremove() and
diff_change() when processing overly long repository path names were
<impact type="normal">
A remote attacker could entice a user to run commands like "git-diff"
or "git-grep" on a specially crafted repository, possibly resulting in
the remote execution of arbitrary code with the privileges of the user
running the application.
There is no known workaround at this time.
All Git users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=dev-util/git-;</code>
<uri link="">CVE-2008-3546</uri>
<metadata tag="requester" timestamp="Sun, 21 Sep 2008 11:13:42 +0000">
<metadata tag="bugReady" timestamp="Sun, 21 Sep 2008 11:16:38 +0000">
<metadata tag="submitter" timestamp="Mon, 22 Sep 2008 11:39:05 +0000">