7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.009 Low
EPSS
Percentile
82.0%
Debian Security Advisory DSA-4212-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
May 29, 2018 https://www.debian.org/security/faq
Package : git
CVE ID : CVE-2018-11235
Etienne Stalmans discovered that git, a fast, scalable, distributed
revision control system, is prone to an arbitrary code execution
vulnerability exploitable via specially crafted submodule names in a
.gitmodules file.
For the oldstable distribution (jessie), this problem has been fixed
in version 1:2.1.4-2.1+deb8u6.
For the stable distribution (stretch), this problem has been fixed in
version 1:2.11.0-3+deb9u3.
We recommend that you upgrade your git packages.
For the detailed security status of git please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/git
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | all | git-daemon-sysvinit | < 1:2.11.0-3+deb9u3 | git-daemon-sysvinit_1:2.11.0-3+deb9u3_all.deb |
Debian | 9 | all | git-mediawiki | < 1:2.11.0-3+deb9u3 | git-mediawiki_1:2.11.0-3+deb9u3_all.deb |
Debian | 8 | all | git-gui | < 1:2.1.4-2.1+deb8u6 | git-gui_1:2.1.4-2.1+deb8u6_all.deb |
Debian | 9 | all | git-gui | < 1:2.11.0-3+deb9u3 | git-gui_1:2.11.0-3+deb9u3_all.deb |
Debian | 9 | all | git | < 1:2.11.0-3+deb9u3 | git_1:2.11.0-3+deb9u3_all.deb |
Debian | 8 | all | git-man | < 1:2.1.4-2.1+deb8u6 | git-man_1:2.1.4-2.1+deb8u6_all.deb |
Debian | 9 | all | git-man | < 1:2.11.0-3+deb9u3 | git-man_1:2.11.0-3+deb9u3_all.deb |
Debian | 8 | all | git-core | < 1:2.1.4-2.1+deb8u6 | git-core_1:2.1.4-2.1+deb8u6_all.deb |
Debian | 9 | all | git-daemon-run | < 1:2.11.0-3+deb9u3 | git-daemon-run_1:2.11.0-3+deb9u3_all.deb |
Debian | 8 | armel | git | < 1:2.1.4-2.1+deb8u6 | git_1:2.1.4-2.1+deb8u6_armel.deb |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.009 Low
EPSS
Percentile
82.0%