Important CentOS git Security Update


emacs-git-1.7.1-4.el6_7.1.noarch.rpm, emacs-git-, emacs-git-el-1.7.1-4.el6_7.1.noarch.rpm, emacs-git-el-, git-1.7.1-4.el6_7.1.i686.rpm, git-1.7.1-4.el6_7.1.src.rpm, git-1.7.1-4.el6_7.1.x86_64.rpm, git-, git-, git-all-1.7.1-4.el6_7.1.noarch.rpm, git-all-, git-bzr-, git-cvs-1.7.1-4.el6_7.1.noarch.rpm, git-cvs-, git-daemon-1.7.1-4.el6_7.1.i686.rpm, git-daemon-1.7.1-4.el6_7.1.x86_64.rpm, git-daemon-, git-email-1.7.1-4.el6_7.1.noarch.rpm, git-email-, git-gui-1.7.1-4.el6_7.1.noarch.rpm, git-gui-, git-hg-, git-p4-, git-svn-1.7.1-4.el6_7.1.noarch.rpm, git-svn-, gitk-1.7.1-4.el6_7.1.noarch.rpm, gitk-, gitweb-1.7.1-4.el6_7.1.noarch.rpm, gitweb-, perl-Git-1.7.1-4.el6_7.1.noarch.rpm, perl-Git-, perl-Git-SVN-,,
2018-01-18 11:11
2017-07-27 19:10
2017-04-01 19:09
2017-01-05 20:14


Updated git packages that fix two security issues are now available for Red
Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Git is a distributed revision control system with a decentralized
architecture. As opposed to centralized version control systems with a
client-server model, Git ensures that each working copy of a Git repository
is an exact copy with complete revision history. This not only allows the
user to work on and contribute to projects without the need to have
permission to push the changes to their official repositories, but also
makes it possible for the user to work with no network connection.

An integer truncation flaw and an integer overflow flaw, both leading to a
heap-based buffer overflow, were found in the way Git processed certain
path information. A remote attacker could create a specially crafted Git
repository that would cause a Git client or server to crash or, possibly,
execute arbitrary code. (CVE-2016-2315, CVE-2016-2324)

All git users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.
Please see

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 emacs-git emacs-git-1.7.1-4.el6_7.1.noarch.rpm
emacs-git-el emacs-git-el-1.7.1-4.el6_7.1.noarch.rpm
git git-1.7.1-4.el6_7.1.src.rpm
git git-1.7.1-4.el6_7.1.x86_64.rpm
git git-1.7.1-4.el6_7.1.i686.rpm
git-all git-all-1.7.1-4.el6_7.1.noarch.rpm
git-cvs git-cvs-1.7.1-4.el6_7.1.noarch.rpm
git-daemon git-daemon-1.7.1-4.el6_7.1.x86_64.rpm
git-daemon git-daemon-1.7.1-4.el6_7.1.i686.rpm
git-email git-email-1.7.1-4.el6_7.1.noarch.rpm
git-gui git-gui-1.7.1-4.el6_7.1.noarch.rpm
gitk gitk-1.7.1-4.el6_7.1.noarch.rpm
git-svn git-svn-1.7.1-4.el6_7.1.noarch.rpm
gitweb gitweb-1.7.1-4.el6_7.1.noarch.rpm
perl-Git perl-Git-1.7.1-4.el6_7.1.noarch.rpm
7 emacs-git emacs-git-
emacs-git-el emacs-git-el-
git git-
git git-
git-all git-all-
git-bzr git-bzr-
git-cvs git-cvs-
git-daemon git-daemon-
git-email git-email-
git-gui git-gui-
git-hg git-hg-
gitk gitk-
git-p4 git-p4-
git-svn git-svn-
gitweb gitweb-
perl-Git perl-Git-
perl-Git-SVN perl-Git-SVN-