[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114411

 
 

909

 
 

88812

 
 

136

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2018-1035 --- git

ID: oval:org.secpod.oval:def:1600894Date: (C)2018-06-12   (M)2018-07-20
Class: PATCHFamily: unix




In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, code to sanity-check pathnames on NTFS can result in reading out-of-bounds memory.In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.

Platform:
Amazon Linux AMI
Product:
git
Reference:
ALAS-2018-1035
CVE-2018-11235
CVE-2018-11233
CVE    2
CVE-2018-11233
CVE-2018-11235
CPE    19
cpe:/a:git-scm:git:2.15.0:rc0
cpe:/a:git-scm:git:2.15.0:rc1
cpe:/a:git-scm:git:2.14.0
cpe:/a:git-scm:git:2.14.0:rc1
...

© SecPod Technologies