- Canonical Ubuntu 18.04
- Canonical Ubuntu 22.04
It was discovered that Git incorrectly handled certain commands. An attacker could possibly use this issue to overwriting some paths. (CVE-2023-25652) Maxime Escourbiac and Yassine BENGANA discovered that Git incorrectly handled some gettext machinery. An attacker could possibly use this issue to allows the malicious placement of crafted messages. (CVE-2023-25815) André Baptista and Vítor Pinho discovered that Git incorrectly handled certain configurations. An attacker could possibly use this issue to arbitrary configuration injection. (CVE-2023-29007) Update Instructions: Run `sudo pro fix USN-6050-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: git – 1:2.17.1-1ubuntu0.18 gitweb – 1:2.17.1-1ubuntu0.18 git-all – 1:2.17.1-1ubuntu0.18 git-daemon-sysvinit – 1:2.17.1-1ubuntu0.18 git-el – 1:2.17.1-1ubuntu0.18 gitk – 1:2.17.1-1ubuntu0.18 git-gui – 1:2.17.1-1ubuntu0.18 git-mediawiki – 1:2.17.1-1ubuntu0.18 git-daemon-run – 1:2.17.1-1ubuntu0.18 git-man – 1:2.17.1-1ubuntu0.18 git-doc – 1:2.17.1-1ubuntu0.18 git-svn – 1:2.17.1-1ubuntu0.18 git-cvs – 1:2.17.1-1ubuntu0.18 git-email – 1:2.17.1-1ubuntu0.18 No subscription required
CVEs contained in this USN include: CVE-2023-25652, CVE-2023-29007, CVE-2023-25815.
Affected Cloud Foundry Products and Versions
Severity is medium unless otherwise noted.
- All versions prior to 0.365.0
- All versions prior to 1.9.0
- CF Deployment
- All versions prior to 30.0.0
Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:
- Upgrade all versions to 0.365.0 or greater
- Upgrade all versions to 1.9.0 or greater
- CF Deployment
- Upgrade all versions to 30.0.0 or greater
2023-06-30: Initial vulnerability report published.