First published: Tue May 29 2018(Updated: )
A flaw was found in git which allows arbitrary code to be executed when running 'git clone --recurse-submodules` (or the deprecated 'git clone --recursive' synonym). A malicious repository can include a .gitmodules submodule config file which points outside of the repository. When git clones such a repository it can be tricked into running hooks within the cloned submodule, which is under the control of the attacker. References: <a href="https://public-inbox.org/git/xmqqy3g2flb6.fsf@gitster-ct.c.googlers.com/">https://public-inbox.org/git/xmqqy3g2flb6.fsf@gitster-ct.c.googlers.com/</a> <a href="https://www.edwardthomson.com/blog/upgrading_git_for_cve2018_11235.html">https://www.edwardthomson.com/blog/upgrading_git_for_cve2018_11235.html</a> <a href="https://news.ycombinator.com/item?id=17181238">https://news.ycombinator.com/item?id=17181238</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/git | <2.13.7 | 2.13.7 |
redhat/git | <2.14.4 | 2.14.4 |
redhat/git | <2.15.2 | 2.15.2 |
redhat/git | <2.16.4 | 2.16.4 |
redhat/git | <2.17.1 | 2.17.1 |
ubuntu/git | <1:2.17.1-1 | 1:2.17.1-1 |
ubuntu/git | <1:2.7.4-0ubuntu1.4 | 1:2.7.4-0ubuntu1.4 |
ubuntu/git | <1:2.14.1-1ubuntu4.1 | 1:2.14.1-1ubuntu4.1 |
ubuntu/git | <1:2.17.1-1ubuntu0.1 | 1:2.17.1-1ubuntu0.1 |
ubuntu/git | <1:1.9.1-1ubuntu0.8 | 1:1.9.1-1ubuntu0.8 |
=8.0 | ||
=9.0 | ||
=14.04 | ||
=16.04 | ||
=17.10 | ||
=18.04 | ||
=7.0 | ||
=7.0 | ||
=7.0 | ||
=7.5 | ||
=7.0 | ||
<=2.13.6 | ||
>=2.14.0<=2.14.3 | ||
>=2.15.0<=2.15.1 | ||
>=2.16.0<=2.16.3 | ||
=2.17.0 | ||
<=2.17.1 | ||
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Git-scm Git | <=2.13.6 | |
Git-scm Git | >=2.14.0<=2.14.3 | |
Git-scm Git | >=2.15.0<=2.15.1 | |
Git-scm Git | >=2.16.0<=2.16.3 | |
Git-scm Git | =2.17.0 | |
Gitforwindows Git | <=2.17.1 | |
debian/git | 1:2.20.1-2+deb10u3 1:2.20.1-2+deb10u8 1:2.30.2-1+deb11u2 1:2.39.2-1.1 1:2.43.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11235 is a vulnerability in Git versions before 2.17.1 that allows remote code execution.
CVE-2018-11235 has a severity rating of 7.8, which is categorized as high.
Git versions before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1 are affected by CVE-2018-11235.
To fix CVE-2018-11235, you should update Git to version 2.17.1 or later.
You can find more information about CVE-2018-11235 at the following references: [http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html), [http://www.securityfocus.com/bid/104345](http://www.securityfocus.com/bid/104345), [http://www.securitytracker.com/id/1040991](http://www.securitytracker.com/id/1040991).