SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Git Vendors:   kernel.org
(Oracle Issues Fix for Oracle Linux) Git Submodule Name Validation Flaw Lets Remote Users Execute Arbitrary Code on the Target System
SecurityTracker Alert ID:  1041165
SecurityTracker URL:  http://securitytracker.com/id/1041165
CVE Reference:   CVE-2018-11235   (Links to External Site)
Date:  Jun 21 2018
Impact:   Disclosure of system information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Two vulnerabilities were reported in Git. A remote user can execute arbitrary code on the target system. A user can obtain portions of system memory.

The software does not properly validate submodule "names" supplied via the untrusted .gitmodules file when appending them to the '$GIT_DIR/modules' directory. A remote repository can return specially crafted data to create or overwrite files on the target user's system when the repository is cloned, causing arbitrary code to be executed on the target user's system [CVE-2018-11235].

Etienne Stalmans reported this vulnerability.

A use can exploit an input validation flaw in processing path names on NTFS-based systems to read random memory contents [CVE-2018-11233].

Impact:   A remote user can execute arbitrary code on the target system.

A user can obtain portions of system memory.

Solution:   Oracle has issued a fix for CVE-2018-11235.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2018-1957.html

Vendor URL:  linux.oracle.com/errata/ELSA-2018-1957.html (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  7

Message History:   This archive entry is a follow-up to the message listed below.
May 29 2018 Git Submodule Name Validation Flaw Lets Remote Users Execute Arbitrary Code on the Target System



 Source Message Contents

Subject:  [El-errata] ELSA-2018-1957 Important: Oracle Linux 7 git security update

Oracle Linux Security Advisory ELSA-2018-1957

http://linux.oracle.com/errata/ELSA-2018-1957.html

The following updated rpms for Oracle Linux 7 have been uploaded to the 
Unbreakable Linux Network:

x86_64:
emacs-git-1.8.3.1-14.el7_5.noarch.rpm
emacs-git-el-1.8.3.1-14.el7_5.noarch.rpm
git-1.8.3.1-14.el7_5.x86_64.rpm
git-all-1.8.3.1-14.el7_5.noarch.rpm
git-bzr-1.8.3.1-14.el7_5.noarch.rpm
git-cvs-1.8.3.1-14.el7_5.noarch.rpm
git-daemon-1.8.3.1-14.el7_5.x86_64.rpm
git-email-1.8.3.1-14.el7_5.noarch.rpm
git-gui-1.8.3.1-14.el7_5.noarch.rpm
git-hg-1.8.3.1-14.el7_5.noarch.rpm
git-p4-1.8.3.1-14.el7_5.noarch.rpm
git-svn-1.8.3.1-14.el7_5.x86_64.rpm
gitk-1.8.3.1-14.el7_5.noarch.rpm
gitweb-1.8.3.1-14.el7_5.noarch.rpm
perl-Git-1.8.3.1-14.el7_5.noarch.rpm
perl-Git-SVN-1.8.3.1-14.el7_5.noarch.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/git-1.8.3.1-14.el7_5.src.rpm



Description of changes:

[1.8.3.1-14]
- Backport fix for CVE-2018-1123
- Thanks to Jonathan Nieder <jrnieder@gmail.com> for backporting to 2.1.x
   and to Steve Beattie <sbeattie@ubuntu.com> for backporting to 1.9.1


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC