Some vulnerabilities have been reported in GIT, which can potentially be exploited by malicious people to compromise a user's system.
The vulnerabilities are caused due to boundary errors in various functions when processing overly long repository pathnames. These can be exploited to cause stack-based buffer overflows by tricking a user into running e.g. "git-diff" or "git-grep" against a repository containing pathnames that are larger than the "PATH_MAX" value on the user's system.
Successful exploitation may allow execution of arbitrary code.
The vulnerabilities are reported in version 184.108.40.206. Prior versions may also be affected.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com