CVE-2018-1000021
Publication date 9 February 2018
Last updated 17 February 2025
Ubuntu priority
Cvss 3 Severity Score
GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack).
Status
Package | Ubuntu Release | Status |
---|---|---|
git | 24.10 oracular | Ignored |
24.04 LTS noble | Ignored | |
22.04 LTS jammy | Ignored | |
20.04 LTS focal | Ignored | |
18.04 LTS bionic | Ignored | |
16.04 LTS xenial | Ignored will not fix | |
14.04 LTS trusty | Not in release |
Notes
mdeslaur
This is really an issue with terminal emulators that allow executing arbitrary code by displaying ANSI escape sequences. Terminal emulators in Ubuntu do not allow executing arbitrary code, so this issue is moot. It is unlikely that git will ever fix this CVE to protect against vulnerable terminal emulators. As of 2025-02-17, this issue has never been fixed in git, and is unlikely to ever be, marking as ignored in Ubuntu.
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | Low |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L |