Pardus Linux Security Advisory - Some vulnerabilities have been reported in GIT, which can potentially be exploited by malicious people to compromise a user's system.
d5132cf7098c0fe3645db61a904528e0f49626d340c2bb42215c425db11c0822
------------------------------------------------------------------------
Pardus Linux Security Advisory 2008-19 security@pardus.org.tr
------------------------------------------------------------------------
Date: 2008-08-07
Severity: 2
Type: Remote
------------------------------------------------------------------------
Summary
=======
Some vulnerabilities have been reported in GIT, which can potentially be
exploited by malicious people to compromise a user's system.
Description
===========
The vulnerabilities are caused due to boundary errors in various
functions when processing overly long repository pathnames. These can be
exploited to cause stack-based buffer overflows by tricking a user into
running e.g. "git-diff" or "git-grep" against a repository containing
pathnames that are larger than the "PATH_MAX" value on the user's
system.
Successful exploitation may allow execution of arbitrary code.
Affected packages:
Pardus 2008:
git, all before 1.5.6.4-66-3
git-emacs, all before 1.5.6.4-66-3
gitweb, all before 1.5.6.4-66-3
Pardus 2007:
git, all before 1.5.6.4-66-51
git-emacs, all before 1.5.6.4-66-25
gitweb, all before 1.5.6.4-66-27
Resolution
==========
There are update(s) for git, git-emacs, gitweb. You can update them via
Package Manager or with a single command from console:
Pardus 2008:
pisi up git git-emacs gitweb
Pardus 2007:
pisi up git git-emacs gitweb
References
==========
* http://www.kernel.org/pub/software/scm/git/docs/RelNotes-1.5.6.4.txt
* http://kerneltrap.org/mailarchive/git/2008/7/16/2529284
* http://secunia.com/advisories/31347/
------------------------------------------------------------------------
--
Pınar Yanardağ
http://pinguar.org