CVE-2018-17456
Publication date 6 October 2018
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive “git clone” of a superproject if a .gitmodules file has a URL field beginning with a ‘-’ character.
Status
Package | Ubuntu Release | Status |
---|---|---|
git | 18.04 LTS bionic |
Fixed 1:2.17.1-1ubuntu0.3
|
16.04 LTS xenial |
Fixed 1:2.7.4-0ubuntu1.5
|
|
14.04 LTS trusty |
Fixed 1:1.9.1-1ubuntu0.9
|
Patch details
Package | Patch details |
---|---|
git |
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3791-1
- Git vulnerability
- 12 October 2018