Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1637-1 | New git-core packages fix buffer overflow |
![]() |
EUVD-2008-3532 | Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep. |
![]() |
USN-723-1 | Git vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T09:45:18.573Z
Reserved: 2008-08-07T00:00:00
Link: CVE-2008-3546

No data.

Status : Deferred
Published: 2008-08-07T21:41:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-3546

No data.

No data.