First published: Mon Jul 26 2010(Updated: )
A buffer overrun was found in the way Git sanitized path of a git directory. If a local attacker would create a specially-crafted working copy and trick the local user into running any git command, it could lead to arbitrary code execution with the privileges of the user running the Git command. References: [1] <a href="http://seclists.org/oss-sec/2010/q3/93">http://seclists.org/oss-sec/2010/q3/93</a> [2] <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - git-core: upstream fix for buffer overrun (CVE-2010-2542)" href="show_bug.cgi?id=617422">https://bugzilla.redhat.com/show_bug.cgi?id=617422</a> Upstream patches: [3] <a href="http://git.kernel.org/?p=git/git.git;a=commitdiff;h=3c9d0414ed2db0167e6c828b547be8fc9f88fccc;hp=c173dad58787a7f11a526dbcdaa5a2fe9ff1c87f">http://git.kernel.org/?p=git/git.git;a=commitdiff;h=3c9d0414ed2db0167e6c828b547be8fc9f88fccc;hp=c173dad58787a7f11a526dbcdaa5a2fe9ff1c87f</a> [4] <a href="http://git.kernel.org/?p=git/git.git;a=commitdiff;h=b44ebb19e3234c5dffe9869ceac5408bb44c2e20;hp=2a5fe2545882721d6841bad11dae0f15b454bf0d">http://git.kernel.org/?p=git/git.git;a=commitdiff;h=b44ebb19e3234c5dffe9869ceac5408bb44c2e20;hp=2a5fe2545882721d6841bad11dae0f15b454bf0d</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Git Git-shell | <1.7.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2542 has a high severity rating due to its potential for arbitrary code execution.
To fix CVE-2010-2542, update Git to a version later than 1.7.2.1.
CVE-2010-2542 affects local users running vulnerable versions of Git on their systems.
CVE-2010-2542 is classified as a buffer overrun vulnerability.
An attacker can execute arbitrary code with the privileges of the user running the vulnerable Git command.