wsD5BAABCAAjFiEEkd98mdFcnQdP7vQkuGrtzot7pOcFAmbrwToFAwAAAAAACgkQuGrtzot7pOf9
HAv+NG1db0HqUB/QbLs92ZxwnRy7btMYvygbjr7pUt5Zfi7iCXc/Gs+mcTQOGZDx/wdRiTNM4W03
BlZR3ktJQN/LlkHwH8AkJnKO7JJjKUQ69UgaMYLZ2BwE0IKrikuYFcv40fXl9gYaYyrKTGvZ00dL
Kn7EHVuyQnRVGivGP0Y6Iwpgn0Ws4vRLrK2C0C8LOxTfmGgIaJBqwd3AMfH5TeQwxcpJL3GRUTUh
02geKw5ML7CPraqXfxTSQYiqa+CKkB5qw1cuXdJbwrGZ6xWj9paC22r82FEQ8JjPOVUUYR0tSkWW
iOMWnglT9v2bEyMJUhhIM6qPZCVPIgD3RteZ3TWTgINJazOiC/IQ6Zt5letPlTFugHj3jQWEuvWZ
noJhL0KwrcXn0Blsy/ZHCPFdgeBebacE/HWLDF1FCZohdMXCda4rgiPCq/w6zPSwym3ZmQuNqEAa
kiWvGJX2ttun9e4gcneYnKnjqZaBW+2I/f4HsCM0IR4CzuIP7+Ds+URCOeyZ
=J7tq
-----END PGP SIGNATURE-----
========================================================================== Ubuntu Security Notice USN-7023-1 September 19, 2024 git vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in Git. Software Description: - git: fast, scalable, distributed revision control system Details: Maxime Escourbiac and Yassine Bengana discovered that Git incorrectly handled some gettext machinery. An attacker could possibly use this issue to allows the malicious placement of crafted messages. This issue was fixed in Ubuntu 16.04 LTS. (CVE-2023-25815) It was discovered that Git incorrectly handled certain submodules. An attacker could possibly use this issue to execute arbitrary code. This issue was fixed in Ubuntu 18.04 LTS. (CVE-2024-32002) It was discovered that Git incorrectly handled certain cloned repositories. An attacker could possibly use this issue to execute arbitrary code. This issue was fixed in Ubuntu 18.04 LTS. (CVE-2024-32004, CVE-2024-32465) It was discovered that Git incorrectly handled local clones with hardlinked files/directories. An attacker could possibly use this issue to place a specialized repository on their target's local system. This issue was fixed in Ubuntu 18.04 LTS. (CVE-2024-32020) It was discovered that Git incorrectly handled certain symlinks. An attacker could possibly use this issue to impact availability and integrity creating hardlinked arbitrary files into users repository's objects/directory. This issue was fixed in Ubuntu 18.04 LTS. (CVE-2024-32021) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS git 1:2.17.1-1ubuntu0.18+esm1 Available with Ubuntu Pro Ubuntu 16.04 LTS git 1:2.7.4-0ubuntu1.10+esm8 Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7023-1 CVE-2023-25815, CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465
No comments:
Post a Comment