Bug 47989 - git: Multiple issues (4.3)
git: Multiple issues (4.3)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.3
All Linux
: P3 normal (vote)
: UCS 4.3-2-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-10-15 15:13 CEST by Quality Assurance
Modified: 2018-10-17 14:57 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2018-10-15 15:13:40 CEST
New Debian git 1:2.11.0-3+deb9u4 fixes:
This update addresses the following issue:
* arbitrary code execution via .gitmodules (CVE-2018-17456)
Comment 1 Quality Assurance univentionstaff 2018-10-16 08:07:23 CEST
--- mirror/ftp/4.3/unmaintained/4.3-2/source/git_2.11.0-3+deb9u3.dsc
+++ apt/ucs_4.3-0-errata4.3-2/source/git_2.11.0-3+deb9u4.dsc
@@ -1,3 +1,24 @@
+1:2.11.0-3+deb9u4 [Thu, 27 Sep 2018 19:35:44 -0700] Jonathan Nieder <jrnieder@gmail.com>:
+
+  * Fix CVE-2018-17456, arbitrary code execution via submodule URLs
+    and paths in .gitmodules file:
+    - submodule: ban submodule urls that start with a dash
+    - submodule: ban submodule paths that start with a dash
+    - submodule: use "--" to signal end of clone options
+    - fsck: detect submodule urls that start with a dash
+    - fsck: detect submodule paths that start with a dash
+
+    Thanks to joernchen of Phenoelit for discovering and reporting
+    this vulnerability and to Jeff King for fixing it.
+
+  * Correct incomplete shell command injection fix in git cvsimport in
+    1:2.11.0-3+deb9u2.  A malicious CVS server could trigger
+    arbitrary code execution by a user running "git cvsimport".
+    - cvsimport: apply shell-quoting regex globally
+
+    Thanks to littlelailo for discovering this vulnerability and to
+    Jeff King for fixing it.
+
 1:2.11.0-3+deb9u3 [Sun, 27 May 2018 10:48:46 -0700] Jonathan Nieder <jrnieder@gmail.com>:
 
   * Fix CVE-2018-11235, arbitrary code execution via submodule names

<http://10.200.17.11/4.3-2/#748036788753682608>
Comment 2 Philipp Hahn univentionstaff 2018-10-16 13:28:17 CEST
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.3-2] e2bc7697d5 Bug #47989: git 1:2.11.0-3+deb9u4
 doc/errata/staging/git.yaml | 12 ++++++++++++
 1 file changed, 12 insertions(+)
Comment 3 Arvid Requate univentionstaff 2018-10-17 14:57:23 CEST
<http://errata.software-univention.de/ucs/4.3/276.html>