In Git prior to 2.13.7, 2.14.x prior to 2.14.4, 2.15.x prior to 2.15.2, 2.16.x prior to 2.16.4, and 2.17.x prior to 2.17.1, code to sanity-check pathnames on NTFS can result in reading out-of-bounds memory.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
canonical ubuntu linux 18.04 |
||
canonical ubuntu linux 17.10 |
||
canonical ubuntu linux 16.04 |
||
canonical ubuntu linux 14.04 |
||
git-scm git |
||
git-scm git 2.17.0 |
Best git patching y'all
A new version of Git has been emitted to ward off attempts to exploit a potential arbitrary code execution vulnerability – which can be triggered by merely cloning a malicious repository. The security hole, CVE-2018-11235, reported by Etienne Stalmans, stems from a flaw in Git whereby sub-module names supplied by the .gitmodules file are not properly validated when appended to $GIT_DIR/modules. Including "../" in a name could result in directory hopping. Post-checkout hooks could then be execu...