CVE-2016-2315

NameCVE-2016-2315
Descriptionrevision.c in git before 2.7.4 uses an incorrect integer data type, which allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, leading to a heap-based buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-3521-1
Debian Bugs818318

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cgit (PTS)bullseye1.2.3+git2.25.1-1fixed
bookworm1.2.3+git20221219.50.91f2590+git2.39.1-1fixed
sid, trixie1.2.3+git20240802.70.09d24d7+git2.46.0-1fixed
git (PTS)bullseye1:2.30.2-1+deb11u2fixed
bullseye (security)1:2.30.2-1+deb11u3fixed
bookworm, bookworm (security)1:2.39.5-0+deb12u1fixed
trixie1:2.45.2-1fixed
sid1:2.45.2-1.2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cgitsource(unstable)(not affected)
gitsourcewheezy1:1.7.10.4-1+wheezy3DSA-3521-1
gitsourcejessie1:2.1.4-2.1+deb8u2DSA-3521-1
gitsource(unstable)1:2.7.0-1818318

Notes

https://github.com/git/git/commit/34fa79a6cde56d6d428ab0d3160cb094ebad3305 (v2.7.0-rc0)
- cgit <not-affected> (path_name function from embedded git is not called)

Search for package or bug name: Reporting problems