* SECURITY UPDATE: Add protections against malicious git commits that
overwrite git metadata on HFS+ and NTFS filesystems. Some of the
protections are enabled by default but the majority require git config
options to be enabled. Set the core.protectHFS and/or core.protectNTFS git
config variables to "true" if you use HFS+ and/or NTFS filesystems when
pulling from untrusted git trees. Set the core.protectHFS,
core.protectNTFS, and receive.fsckObjects git config variables to "true"
if you host git trees and want to prevent malicious git commits from being
pushed to your server. (LP: #1404035)
- debian/diff/0009-CVE-2014-9390.diff: Check for potentially malicious
paths in git commits. Based on upstream patches.
- debian/rules: Set executable bit on a new test introduced in
0009-CVE-2014-9390.diff
- CVE-2014-9390
-- Tyler Hicks <email address hidden> Tue, 13 Jan 2015 12:42:16 -0600
This bug was fixed in the package git - 1:2.1.0-1ubuntu0.1
--------------- 0-1ubuntu0. 1) utopic-security; urgency=medium
git (1:2.1.
* SECURITY UPDATE: Add protections against malicious git commits that protectNTFS, and receive.fsckObjects git config variables to "true" diff/0009- CVE-2014- 9390.diff: Check for potentially malicious CVE-2014- 9390.diff
overwrite git metadata on HFS+ and NTFS filesystems. Some of the
protections are enabled by default but the majority require git config
options to be enabled. Set the core.protectHFS and/or core.protectNTFS git
config variables to "true" if you use HFS+ and/or NTFS filesystems when
pulling from untrusted git trees. Set the core.protectHFS,
core.
if you host git trees and want to prevent malicious git commits from being
pushed to your server. (LP: #1404035)
- debian/
paths in git commits. Based on upstream patches.
- debian/rules: Set executable bit on a new test introduced in
0009-
- CVE-2014-9390
-- Tyler Hicks <email address hidden> Tue, 13 Jan 2015 12:42:16 -0600