First published: Tue Jun 05 2018(Updated: )
Etienne Stalmans discovered that git did not properly validate git submodules files. A remote attacker could possibly use this to craft a git repo that causes arbitrary code execution when "git clone --recurse-submodules" is used. (CVE-2018-11235) It was discovered that an integer overflow existed in git's pathname consistency checking code when used on NTFS filesystems. An attacker could use this to cause a denial of service or expose sensitive information. (CVE-2018-11233)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/git | <1:2.17.1-1ubuntu0.1 | 1:2.17.1-1ubuntu0.1 |
=18.04 | ||
All of | ||
ubuntu/git | <1:2.14.1-1ubuntu4.1 | 1:2.14.1-1ubuntu4.1 |
=17.10 | ||
All of | ||
ubuntu/git | <1:2.7.4-0ubuntu1.4 | 1:2.7.4-0ubuntu1.4 |
=16.04 | ||
All of | ||
ubuntu/git | <1:1.9.1-1ubuntu0.8 | 1:1.9.1-1ubuntu0.8 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this advisory is CVE-2018-11235.
The severity level of this vulnerability is not specified in the advisory.
This vulnerability can allow a remote attacker to craft a git repository that can cause arbitrary code execution when "git clone --recurse-submodules" command is used.
Versions 1.9.1-1ubuntu0.8, 1.7.4-0ubuntu1.4, 1.14.1-1ubuntu4.1, and 1.17.1-1ubuntu0.1 of git on Ubuntu 14.04, 16.04, 17.10, and 18.04 are affected by this vulnerability respectively.
To fix this vulnerability, update git to version 2.17.1-1ubuntu0.1 (for Ubuntu 18.04), 2.14.1-1ubuntu4.1 (for Ubuntu 17.10), 2.7.4-0ubuntu1.4 (for Ubuntu 16.04), or 1.9.1-1ubuntu0.8 (for Ubuntu 14.04).