Ubuntu Security Notice USN-723-1 - It was discovered that Git did not properly handle long file paths. If a user were tricked into performing commands on a specially crafted Git repository, an attacker could possibly execute arbitrary code with the privileges of the user invoking the program. It was discovered that the Git web interface (gitweb) did not correctly handle shell metacharacters when processing certain commands. A remote attacker could send specially crafted commands to the Git server and execute arbitrary code with the privileges of the Git web server. This issue only applied to Ubuntu 7.10 and 8.04 LTS. It was discovered that the Git web interface (gitweb) did not properly restrict the diff.external configuration parameter. A local attacker could exploit this issue and execute arbitrary code with the privileges of the Git web server. This issue only applied to Ubuntu 8.04 LTS and 8.10.
17d62f357f88613408934998f6f8acba1f9c1576a46661f6c95411b81a97727f
Gentoo Linux Security Advisory GLSA 200809-16 - Multiple buffer overflow vulnerabilities have been discovered in Git. Multiple boundary errors in the functions diff_addremove() and diff_change() when processing overly long repository path names were reported. Versions less than 1.5.6.4 are affected.
9f837f4290e1e7cffc354d64de8320415eb53ac4fb7f58aca7506f1a89c88e52
Debian Security Advisory 1637-1 - Multiple vulnerabilities have been identified in git-core, the core of the git distributed revision control system. Improper path length limitations in git's diff and grep functions, in combination with maliciously crafted repositories or changes, could enable a stack buffer overflow and potentially the execution of arbitrary code.
107d015f5c3f226f1271496bb2f92ab8af98ac16ee6130409d4eeebad97e1d3d