Users have been asked to upgrade as soon as possible

Jan 14, 2015 15:49 GMT  ·  By

Canonical published some details about a Git vulnerability that has been found and fixed in Ubuntu 14.10, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS operating systems.

Each new Git version usually lands with security fixes and the same happened with the latest branch. The developers explained that Git could have been made to run programs if it received specially crafted changes from a repo.

The security notification published by Canonical details this problem. "Matt Mackall and Augie Fackler discovered that Git incorrectly handled certain filesystem paths. A remote attacker could possibly use this issue to execute arbitrary code if the Git tree is stored in an HFS+ or NTFS filesystem. The remote attacker would need write access to a Git repository that the victim pulls from."

This is the same issue that managed to get Linus Torvalds upset about the poor condition of the HFS+ file system. In any case, if you don't want to use the Software Updater, you can do this from a terminal. Open a terminal and enter the following commands:

code
sudo apt-get update
sudo apt-get dist-upgrade
In general, a standard system update will make all the necessary changes. A reboot of the operating system is not required.