CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
90.4%
Medium
Canonical Ubuntu
Markus Vervier and Eric Sesterhenn discovered that Git incorrectly handled certain gitattributes. An attacker could possibly use this issue to cause a crash or execute arbitrary code. (CVE-2022-23521) Joern Schneeweisz discovered that Git incorrectly handled certain commands. An attacker could possibly use this issue to cause a crash or execute arbitrary code. (CVE-2022-41903) Update Instructions: Run sudo pro fix USN-5810-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: git – 1:2.17.1-1ubuntu0.14 gitweb – 1:2.17.1-1ubuntu0.14 git-all – 1:2.17.1-1ubuntu0.14 git-daemon-sysvinit – 1:2.17.1-1ubuntu0.14 git-el – 1:2.17.1-1ubuntu0.14 gitk – 1:2.17.1-1ubuntu0.14 git-gui – 1:2.17.1-1ubuntu0.14 git-mediawiki – 1:2.17.1-1ubuntu0.14 git-daemon-run – 1:2.17.1-1ubuntu0.14 git-man – 1:2.17.1-1ubuntu0.14 git-doc – 1:2.17.1-1ubuntu0.14 git-svn – 1:2.17.1-1ubuntu0.14 git-cvs – 1:2.17.1-1ubuntu0.14 git-email – 1:2.17.1-1ubuntu0.14 No subscription required
CVEs contained in this USN include: CVE-2022-23521, CVE-2022-41903.
Severity is medium unless otherwise noted.
Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:
2023-02-23: Initial vulnerability report published.
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
90.4%