* SECURITY UPDATE: Fix denial of service or possible arbitrary remote code
execution (LP: #1557787)
- debian/diff/0013-CVE-2016-2315.patch: Be explicit about the amount of
memory being copied
- CVE-2016-2315
* SECURITY UPDATE: Fix denial of service or possible arbitrary remote code
execution
- debian/diff/0014-CVE-2016-2324.patch: Use the correct type and maximum
size checks when calculating string lengths to prevent integer overflow
- CVE-2016-2324
This bug was fixed in the package git - 1:2.5.0-1ubuntu0.2
--------------- 0-1ubuntu0. 2) wily-security; urgency=medium
git (1:2.5.
* SECURITY UPDATE: Fix denial of service or possible arbitrary remote code diff/0013- CVE-2016- 2315.patch: Be explicit about the amount of diff/0014- CVE-2016- 2324.patch: Use the correct type and maximum
execution (LP: #1557787)
- debian/
memory being copied
- CVE-2016-2315
* SECURITY UPDATE: Fix denial of service or possible arbitrary remote code
execution
- debian/
size checks when calculating string lengths to prevent integer overflow
- CVE-2016-2324
-- Tyler Hicks <email address hidden> Mon, 21 Mar 2016 09:40:02 -0500