First published: Mon Jul 26 2010(Updated: )
A buffer overrun was found in the way Git sanitized path of a git directory. If a local attacker would create a specially-crafted working copy and trick the local user into running any git command, it could lead to arbitrary code execution with the privileges of the user running the Git command. References: [1] <a href="http://seclists.org/oss-sec/2010/q3/93">http://seclists.org/oss-sec/2010/q3/93</a> [2] <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - git-core: upstream fix for buffer overrun (CVE-2010-2542)" href="show_bug.cgi?id=617422">https://bugzilla.redhat.com/show_bug.cgi?id=617422</a> Upstream patches: [3] <a href="http://git.kernel.org/?p=git/git.git;a=commitdiff;h=3c9d0414ed2db0167e6c828b547be8fc9f88fccc;hp=c173dad58787a7f11a526dbcdaa5a2fe9ff1c87f">http://git.kernel.org/?p=git/git.git;a=commitdiff;h=3c9d0414ed2db0167e6c828b547be8fc9f88fccc;hp=c173dad58787a7f11a526dbcdaa5a2fe9ff1c87f</a> [4] <a href="http://git.kernel.org/?p=git/git.git;a=commitdiff;h=b44ebb19e3234c5dffe9869ceac5408bb44c2e20;hp=2a5fe2545882721d6841bad11dae0f15b454bf0d">http://git.kernel.org/?p=git/git.git;a=commitdiff;h=b44ebb19e3234c5dffe9869ceac5408bb44c2e20;hp=2a5fe2545882721d6841bad11dae0f15b454bf0d</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Git |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-618108 is critical due to the potential for arbitrary code execution.
To fix REDHAT-BUG-618108, update Git to the latest version where the vulnerability has been patched.
Users running vulnerable versions of Git on systems where a local attacker can manipulate the Git environment are affected by REDHAT-BUG-618108.
REDHAT-BUG-618108 is a buffer overrun vulnerability.
No, REDHAT-BUG-618108 requires local access to the system to exploit the vulnerability.