Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 11 submissions in the queue.
posted by Blackmoore on Monday December 22 2014, @08:00PM   Printer-friendly
from the get-out-the-ddt dept.

Found on Ars Technica — "Critical Git bug allows malicious code execution on client machines":

Developers who use the official Git client and related software are being urged to install a security update that kills a bug that could allow attackers to hijack end-user computers.

The critical vulnerability affects all Windows- and Mac-based versions of the official Git client and related software that interacts with Git repositories, according to an advisory published Thursday. The bug can be exploited to give remote code execution when the client software accesses booby-trapped Git repositories.

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by Nerdfest on Monday December 22 2014, @09:32PM

    by Nerdfest (80) on Monday December 22 2014, @09:32PM (#128481)

    I don't these vulnerabilities are found due to being targeted, or at least not that I'm aware of. I don't recall seeing 'active exploits' mentioned in any of them, but that could be just bad reporting. I think they're being discovered because people are actively looking for them more these days, especially after the SSL debacle.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 2) by dyingtolive on Monday December 22 2014, @09:36PM

    by dyingtolive (952) on Monday December 22 2014, @09:36PM (#128484)

    Your theory is more optimistic all around. I think I prefer it.

    --
    Don't blame me, I voted for moose wang!