User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.3) Gecko/20100423 Ubuntu/10.04 (lucid) Firefox/3.6.3 A fix for an exploitable buffer overrun (CVE-2010-2542, per [1]) was committed to git in [2]. In particular, if an attacker were to create a crafted working copy where the user runs any git command, the attacker could force execution of arbitrary code. This attack should be mitigated to a denial of service if git is compiled with appropriate stack-protecting flags, as is the case on Fedora. This buffer overrun was introduced in [3], which first appeared in v1.5.6, and is fixed in v1.7.2. [1] http://seclists.org/oss-sec/2010/q3/93 [2] http://git.kernel.org/?p=git/git.git;a=commit;h=3c9d0414ed2db0167e6c828b547be8fc9f88fccc [3] http://git.kernel.org/?p=git/git.git;a=commit;h=b44ebb19e3234c5dffe9869ceac5408bb44c2e20 Reproducible: Always
This issue has been addressed in the current versions of the git package, present in Fedora -testing repository (git-1.7.2-1.fc1{2,3,4}).
Fixed in git-1.7.2-1.fc13.