CVE-2018-11235
30.05.2018, 04:29
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.
Vendor | Product | Version |
---|---|---|
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 17.10 |
canonical | ubuntu_linux | 18.04 |
redhat | enterprise_linux | 7.0 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_eus | 7.5 |
redhat | enterprise_linux_workstation | 7.0 |
git-scm | git | 𝑥 ≤ 2.13.6 |
git-scm | git | 2.14.0 ≤ 𝑥 ≤ 2.14.3 |
git-scm | git | 2.15.0 ≤ 𝑥 ≤ 2.15.1 |
git-scm | git | 2.16.0 ≤ 𝑥 ≤ 2.16.3 |
git-scm | git | 2.17.0 |
gitforwindows | git | 𝑥 ≤ 2.17.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References