First published: Fri Nov 23 2018(Updated: )
Git before 2.19.2 on Linux and UNIX executes commands from the current working directory (as if '.' were at the end of $PATH) in certain cases involving the run_command() API and run-command.c, because there was a dangerous change from execvp to execv during 2017.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/git | <2.19.2 | 2.19.2 |
ubuntu/git | <1:2.17.1-1ubuntu0.4 | 1:2.17.1-1ubuntu0.4 |
ubuntu/git | <1:2.19.1-1ubuntu1.1 | 1:2.19.1-1ubuntu1.1 |
ubuntu/git | <1:2.19.2-1 | 1:2.19.2-1 |
debian/git | 1:2.30.2-1+deb11u2 1:2.39.2-1.1 1:2.43.0-1 1:2.45.2-1 | |
All of | ||
Git Git-shell | <2.19.2 | |
Linux Kernel | ||
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Git Git-shell | <2.19.2 | |
Linux Kernel |
https://git.kernel.org/pub/scm/git/git.git/commit/?id=321fd82389742398d2924640ce3a61791fd27d60
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Git vulnerability is CVE-2018-19486.
The severity of CVE-2018-19486 is critical with a CVSS score of 9.8.
CVE-2018-19486 affects Linux and UNIX operating systems.
The recommended version to fix CVE-2018-19486 is Git 2.19.2.
You can find more information about CVE-2018-19486 on the following websites: [Security Focus](http://www.securityfocus.com/bid/106020), [Security Tracker](http://www.securitytracker.com/id/1042166), [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2018:3800).