Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:AA695C18E58815C20B5513A41FAEAAE9
HistoryJun 14, 2018 - 12:00 a.m.

USN-3671-1: Git vulnerabilities | Cloud Foundry

2018-06-1400:00:00
Cloud Foundry
www.cloudfoundry.org
29

0.018 Low

EPSS

Percentile

88.1%

Severity

High

Vendor

Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 14.04

Description

Etienne Stalmans discovered that git did not properly validate git submodules files. A remote attacker could possibly use this to craft a git repo that causes arbitrary code execution when โ€œgit clone โ€“recurse-submodulesโ€ is used. (CVE-2018-11235)

It was discovered that an integer overflow existed in gitโ€™s pathname sanity checking code when used on NTFS filesystems. An attacker could use this to cause a denial of service or expose sensitive information. (CVE-2018-11233)

Affected Cloud Foundry Products and Versions

Severity is high unless otherwise noted.

  • All versions of Cloud Foundry cflinuxfs2 prior to 1.213.0

Mitigation

OSS users are strongly encouraged to follow one of the mitigations below:

  • The Cloud Foundry project recommends that Cloud Foundry deployments run with cflinuxfs2 version 1.213.0 or later.

References