Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 2 Jun 2018 20:51:49 +0000 (UTC)
From:      Joseph Mingrone <jrm@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r471404 - head/security/vuxml
Message-ID:  <201806022051.w52KpnY1084315@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: jrm
Date: Sat Jun  2 20:51:48 2018
New Revision: 471404
URL: https://svnweb.freebsd.org/changeset/ports/471404

Log:
  security/vuxml: Document devel/git CVEs (2018-11233 and 2018-11235)

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sat Jun  2 20:22:16 2018	(r471403)
+++ head/security/vuxml/vuln.xml	Sat Jun  2 20:51:48 2018	(r471404)
@@ -58,6 +58,45 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="c7a135f4-66a4-11e8-9e63-3085a9a47796">
+    <topic>Git -- Fix memory out-of-bounds and remote code execution vulnerabilities (CVE-2018-11233 and CVE-2018-11235)</topic>
+    <affects>
+      <package>
+	<name>git</name>
+	<name>git-lite</name>
+	<range><lt>2.17.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Git community  reports:</p>
+	<blockquote cite="https://marc.info/?l=git&amp;m=152761328506724&amp;=2">;
+	  <ul><li>In affected versions of Git, code to sanity-check pathnames on
+	    NTFS can result in reading out-of-bounds memory.</li>
+	    <li>In affected versions of Git, remote code execution can
+	    occur. With a crafted .gitmodules file, a malicious project can
+	    execute an arbitrary script on a machine that runs "git clone
+	    --recurse-submodules" because submodule "names" are obtained from
+	    this file, and then appended to $GIT_DIR/modules, leading to
+	    directory traversal with "../" in a name. Finally, post-checkout
+	    hooks from a submodule are executed, bypassing the intended design
+	    in which hooks are not obtained from a remote server.</li>
+	 </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11233</url>;
+      <cvename>CVE-2018-11233</cvename>
+      <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235</url>;
+      <cvename>CVE-2018-11235</cvename>
+    </references>
+    <dates>
+      <discovery>2018-05-29</discovery>
+      <entry>2018-06-02</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="7fc3e827-64a5-11e8-aedb-00224d821998">
     <topic>strongswan -- Fix Denial-of-Service Vulnerability strongSwan (CVE-2018-10811, CVE-2018-5388)</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201806022051.w52KpnY1084315>