CVE-2018-1000021

Publication date 9 February 2018

Last updated 17 February 2025


Ubuntu priority

Cvss 3 Severity Score

5.0 · Medium

Score breakdown

GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack).

Read the notes from the security team

Status

Package Ubuntu Release Status
git 24.10 oracular Ignored
24.04 LTS noble Ignored
23.10 mantic Ignored end of life, was needed
23.04 lunar Ignored end of life, was needed
22.10 kinetic Ignored end of life, was needed
22.04 LTS jammy Ignored
21.10 impish Ignored end of life
21.04 hirsute Ignored end of life
20.10 groovy Ignored end of life
20.04 LTS focal Ignored
19.10 eoan Ignored end of life
19.04 disco Ignored end of life
18.10 cosmic Ignored end of life
18.04 LTS bionic Ignored
17.10 artful Ignored end of life
16.04 LTS xenial Ignored will not fix
14.04 LTS trusty Not in release

Notes


mdeslaur

This is really an issue with terminal emulators that allow executing arbitrary code by displaying ANSI escape sequences. Terminal emulators in Ubuntu do not allow executing arbitrary code, so this issue is moot. It is unlikely that git will ever fix this CVE to protect against vulnerable terminal emulators. As of 2025-02-17, this issue has never been fixed in git, and is unlikely to ever be, marking as ignored in Ubuntu.

Severity score breakdown

Parameter Value
Base score 5.0 · Medium
Attack vector Network
Attack complexity High
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality Low
Integrity impact Low
Availability impact Low
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L