First published: Mon May 01 2023(Updated: )
It was discovered that Git incorrectly handled certain commands. An attacker could possibly use this issue to overwriting some paths. (CVE-2023-25652) Maxime Escourbiac and Yassine BENGANA discovered that Git incorrectly handled some gettext machinery. An attacker could possibly use this issue to allows the malicious placement of crafted messages. (CVE-2023-25815) André Baptista and Vítor Pinho discovered that Git incorrectly handled certain configurations. An attacker could possibly use this issue to arbitrary configuration injection. (CVE-2023-29007)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/git | <1:2.39.2-1ubuntu1.1 | 1:2.39.2-1ubuntu1.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/git | <1:2.37.2-1ubuntu1.5 | 1:2.37.2-1ubuntu1.5 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/git | <1:2.34.1-1ubuntu1.9 | 1:2.34.1-1ubuntu1.9 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/git | <1:2.25.1-1ubuntu3.11 | 1:2.25.1-1ubuntu3.11 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/git | <1:2.17.1-1ubuntu0.18 | 1:2.17.1-1ubuntu0.18 |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6050-1 is categorized as important due to the potential for path overwriting by an attacker.
To fix USN-6050-1, you should upgrade Git to the latest version specified in your distribution's security notice.
USN-6050-1 affects specific versions of Git on Ubuntu 18.04, 20.04, 22.04, 22.10, and 23.04.
An attacker may exploit USN-6050-1 to overwrite certain paths, potentially leading to unauthorized file modifications.
The vulnerability related to USN-6050-1 was discovered by Maxime Escourbiac and Yassine BENGANA.