Pardus: Git Privilege Escalation


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Pardus: Git Privilege Escalation
# 1  
Old 12-24-2008
Pardus: Git Privilege Escalation

LinuxSecurity.com: A security issue has been reported in GIT, which can be exploited by malicious, local users to gain escalated privileges.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
GIT-HTTP-FETCH(1)						    Git Manual							 GIT-HTTP-FETCH(1)

NAME
git-http-fetch - Download from a remote Git repository via HTTP SYNOPSIS
git http-fetch [-c] [-t] [-a] [-d] [-v] [-w filename] [--recover] [--stdin] <commit> <url> DESCRIPTION
Downloads a remote Git repository via HTTP. NOTE: use of this command without -a is deprecated. The -a behaviour will become the default in a future release. OPTIONS
commit-id Either the hash or the filename under [URL]/refs/ to pull. -c Get the commit objects. -t Get trees associated with the commit objects. -a Get all the objects. -v Report what is downloaded. -w <filename> Writes the commit-id into the filename under $GIT_DIR/refs/<filename> on the local end after the transfer is complete. --stdin Instead of a commit id on the command line (which is not expected in this case), git http-fetch expects lines on stdin in the format <commit-id>[' '<filename-as-in--w>] --recover Verify that everything reachable from target is fetched. Used after an earlier fetch is interrupted. GIT
Part of the git(1) suite Git 1.8.5.3 01/14/2014 GIT-HTTP-FETCH(1)