First published: Thu Aug 31 2023(Updated: )
It was discovered that GitPython did not block insecure options from user inputs in the clone command. An attacker could possibly use this issue to execute arbitrary commands on the host.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3-git | <3.1.30-1ubuntu0.23.04.1 | 3.1.30-1ubuntu0.23.04.1 |
Ubuntu Linux | =23.04 | |
All of | ||
ubuntu/python3-git | <3.1.24-1ubuntu0.1~esm2 | 3.1.24-1ubuntu0.1~esm2 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/python3-git | <3.0.7-1ubuntu0.1~esm2 | 3.0.7-1ubuntu0.1~esm2 |
Ubuntu Linux | =20.04 | |
All of | ||
ubuntu/python-git | <2.1.8-1ubuntu0.1~esm2 | 2.1.8-1ubuntu0.1~esm2 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/python3-git | <2.1.8-1ubuntu0.1~esm2 | 2.1.8-1ubuntu0.1~esm2 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/python-git | <1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm2 | 1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm2 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/python3-git | <1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm2 | 1.0.1+git137-gc8b8379-2.1ubuntu0.1~esm2 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/python-git | <0.3.2~RC1-3ubuntu0.1~esm2 | 0.3.2~RC1-3ubuntu0.1~esm2 |
Ubuntu Linux | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6326-1 is considered high due to the potential for arbitrary command execution on the host.
To fix USN-6326-1, update to the patched versions of the affected packages as specified in the advisory.
USN-6326-1 impacts various versions of the python3-git and python-git packages across multiple Ubuntu releases.
The vulnerability in USN-6326-1 can allow an attacker to execute arbitrary commands on the host machine.
As of now, there are no widely reported exploits publicly available for the vulnerability described in USN-6326-1.