Debian Security Advisory

DSA-2114-1 git-core -- buffer overflow

Date Reported:
26 Sep 2010
Affected Packages:
Security database references:
In the Debian bugtracking system: Bug 595728, Bug 590026.
In Mitre's CVE dictionary: CVE-2010-2542.
More information:

The Debian stable point release 5.0.6 included updated packages of the Git revision control system in order to fix a security issue. Unfortunately, the update introduced a regression which could make it impossible to clone or create Git repositories. This upgrade fixes this regression, which is tracked as Debian bug #595728.

The original security issue allowed an attacker to execute arbitrary code if he could trick a local user to execute a git command in a crafted working directory (CVE-2010-2542).

For the stable distribution (lenny), this problem has been fixed in version

The packages for the hppa architecture are not included in this advisory. However, the hppa architecture is not known to be affected by the regression.

For the testing distribution (squeeze) and the unstable distribution (sid), the security issue has been fixed in version 1.7.1-1.1. These distributions were not affected by the regression.

We recommend that you upgrade your git-core packages.

Fixed in:

Debian GNU/Linux 5.0 (stable)

Architecture-independent component:
Intel IA-32:
Intel IA-64:
Big-endian MIPS:
Little-endian MIPS:
IBM S/390:
Sun Sparc:

MD5 checksums of the listed files are available in the original advisory.