First published: Fri Oct 12 2018(Updated: )
It was discovered that git did not properly validate git submodule urls or paths. A remote attacker could possibly use this to craft a git repository that causes arbitrary code execution when recursive operations are used.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/git | <1:2.17.1-1ubuntu0.3 | 1:2.17.1-1ubuntu0.3 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/git | <1:2.7.4-0ubuntu1.5 | 1:2.7.4-0ubuntu1.5 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/git | <1:1.9.1-1ubuntu0.9 | 1:1.9.1-1ubuntu0.9 |
Ubuntu OpenSSH Client | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Git vulnerability is USN-3791-1.
The Git vulnerability allows a remote attacker to craft a malicious Git repository that can lead to arbitrary code execution during recursive operations.
The Git vulnerability affects Ubuntu versions 14.04, 16.04, and 18.04 with specific Git package versions installed.
You can find more information about the Git vulnerability at the following references: [CVE-2018-17456](https://ubuntu.com/security/CVE-2018-17456), [Ubuntu Security Notice USN-3791-1](https://launchpad.net/ubuntu/+source/git/1:2.17.1-1ubuntu0.3), [Ubuntu Git Package 2.17.1-1ubuntu0.3](https://launchpad.net/ubuntu/+source/git/1:2.17.1-1ubuntu0.3), [Ubuntu Git Package 2.7.4-0ubuntu1.5](https://launchpad.net/ubuntu/+source/git/1:2.7.4-0ubuntu1.5).
To fix the Git vulnerability, update the Git package to version 2.17.1-1ubuntu0.3 for Ubuntu 18.04, version 2.7.4-0ubuntu1.5 for Ubuntu 16.04, or version 1.9.1-1ubuntu0.9 for Ubuntu 14.04.