[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

243238

 
 

909

 
 

192833

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2018-1035 --- git

ID: oval:org.secpod.oval:def:1600894Date: (C)2018-06-12   (M)2024-02-19
Class: PATCHFamily: unix




In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, code to sanity-check pathnames on NTFS can result in reading out-of-bounds memory.In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.

Platform:
Amazon Linux AMI
Product:
git
Reference:
ALAS-2018-1035
CVE-2018-11235
CVE-2018-11233
CVE    2
CVE-2018-11233
CVE-2018-11235
CPE    2
cpe:/o:amazon:linux
cpe:/a:git:git

© SecPod Technologies