First published: Fri Oct 05 2018(Updated: )
A flaw was found in git which allows an attacker to execute arbitrary code by crafting a malicious .gitmodules file in a project cloned with --recurse-submodules. References: <a href="https://bugzilla.novell.com/show_bug.cgi?id=1110949">https://bugzilla.novell.com/show_bug.cgi?id=1110949</a> <a href="https://groups.google.com/forum/#!topic/git-packagers/fNLXf6LQC08">https://groups.google.com/forum/#!topic/git-packagers/fNLXf6LQC08</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/git | <2.14.5 | 2.14.5 |
redhat/git | <2.15.3 | 2.15.3 |
redhat/git | <2.16.5 | 2.16.5 |
redhat/git | <2.17.2 | 2.17.2 |
redhat/git | <2.18.1 | 2.18.1 |
redhat/git | <2.19.1 | 2.19.1 |
ubuntu/git | <1:2.17.1-1ubuntu0.3 | 1:2.17.1-1ubuntu0.3 |
ubuntu/git | <1:1.9.1-1ubuntu0.9 | 1:1.9.1-1ubuntu0.9 |
ubuntu/git | <1:2.19.1-1 | 1:2.19.1-1 |
ubuntu/git | <1:2.7.4-0ubuntu1.5 | 1:2.7.4-0ubuntu1.5 |
debian/git | 1:2.30.2-1+deb11u2 1:2.39.2-1.1 1:2.43.0-1 1:2.45.2-1 | |
Git Git-shell | >=2.14.0<2.14.5 | |
Git Git-shell | >=2.15.0<2.15.3 | |
Git Git-shell | >=2.16.0<2.16.5 | |
Git Git-shell | >=2.17.0<2.17.2 | |
Git Git-shell | >=2.18.0<2.18.1 | |
Git Git-shell | >=2.19.0<2.19.1 | |
Red Hat Ansible Tower | =3.3 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =6.7 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =7.3 | |
Red Hat Enterprise Linux | =7.4 | |
Red Hat Enterprise Linux | =7.5 | |
Red Hat Enterprise Linux | =7.6 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =7.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Debian | =9.0 |
https://git.kernel.org/pub/scm/git/git.git/commit/?id=98afac7a7cefdca0d2c4917dd8066a59f7088265
https://git.kernel.org/pub/scm/git/git.git/commit/?id=f6adec4e329ef0e25e14c63b735a5956dc67b8bc
https://git.kernel.org/pub/scm/git/git.git/commit/?id=273c61496f88c6495b886acb1041fe57965151da
https://git.kernel.org/pub/scm/git/git.git/commit/?id=a124133e1e6ab5c7a9fef6d0e6bcb084e3455b46
https://git.kernel.org/pub/scm/git/git.git/commit/?id=1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17456 is a vulnerability in Git that allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character.
The severity of CVE-2018-17456 is critical (9.8).
Git versions before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 are affected by CVE-2018-17456.
To fix CVE-2018-17456, you should update Git to version 2.14.5 or later.
You can find more information about CVE-2018-17456 at the following references: [http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html), [http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html](http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html), [http://www.securityfocus.com/bid/105523](http://www.securityfocus.com/bid/105523).