===================================================================== CERT-Renater Note d'Information No. 2010/VULN383 _____________________________________________________________________ DATE : 27/09/2010 HARDWARE PLATFORM(S) : / OPERATING SYSTEM(S) : Systems running git. ====================================================================== http://www.openwall.com/lists/oss-security/2010/07/22/1 ______________________________________________________________________ Date: Wed, 21 Jul 2010 23:17:01 -0400 From: Greg Brockman To: oss-security@...ts.openwall.com Cc: Junio C Hamano Subject: CVE request: git A fix for an exploitable buffer overrun was committed to git in [1]. In particular, if an attacker were to create a crafted working copy where the user runs any git command, the attacker could force execution of arbitrary code. This attack should be mitigated to a denial of service if git is compiled with appropriate stack-protecting flags. This buffer overrun was introduced in [2], which first appeared in v1.5.6, and is fixed in v1.7.2. Greg [1] http://git.kernel.org/?p=git/git.git;a=commit;h=3c9d0414ed2db0167e6c828b547be8fc9f88fccc [2] http://git.kernel.org/?p=git/git.git;a=commit;h=b44ebb19e3234c5dffe9869ceac5408bb44c2e20 ====================================================================== ========================================================= Les serveurs de référence du CERT-Renater http://www.urec.fr/securite http://www.cru.fr/securite http://www.renater.fr ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 151 bd de l'Hopital | fax : 01-53-94-20-41 + + 75013 Paris | email: certsvp@renater.fr + =========================================================