Users of git please be advised of a stack-based buffer overflow vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Amplify’d from www.criticalwatch.com
MDVSA-2010:194: [MDVSA-2010:194] git stack-based buffer overflow
Problem Description:
A vulnerability has been found and corrected in git:
Stack-based buffer overflow in the is_git_directory function in setup.c
in Git before 1.7.2.1 allows local users to gain privileges via a
long gitdir: field in a .git file in a working copy (CVE-2010-2542).
Read more at www.criticalwatch.com
See this Amp at http://bit.ly/b8MusT

No comments:
Post a Comment