CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
77.3%
USN-6050-1 fixed several vulnerabilities in Git. This update provides
the corresponding updates for CVE-2023-25652 and CVE-2023-29007 on
Ubuntu 16.04 LTS.
Original advisory details:
It was discovered that Git incorrectly handled certain commands.
An attacker could possibly use this issue to overwrite paths.
(CVE-2023-25652)
AndrΓ© Baptista and VΓtor Pinho discovered that Git incorrectly handled
certain configurations. An attacker could possibly use this issue
to achieve arbitrary configuration injection. (CVE-2023-29007)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.04 | noarch | git | <Β 1:2.7.4-0ubuntu1.10+esm7 | UNKNOWN |
Ubuntu | 16.04 | noarch | git | <Β 1:2.7.4-0ubuntu1.10 | UNKNOWN |
Ubuntu | 16.04 | noarch | git-all | <Β 1:2.7.4-0ubuntu1.10 | UNKNOWN |
Ubuntu | 16.04 | noarch | git-arch | <Β 1:2.7.4-0ubuntu1.10 | UNKNOWN |
Ubuntu | 16.04 | noarch | git-core | <Β 1:2.7.4-0ubuntu1.10 | UNKNOWN |
Ubuntu | 16.04 | noarch | git-cvs | <Β 1:2.7.4-0ubuntu1.10 | UNKNOWN |
Ubuntu | 16.04 | noarch | git-daemon-run | <Β 1:2.7.4-0ubuntu1.10 | UNKNOWN |
Ubuntu | 16.04 | noarch | git-daemon-sysvinit | <Β 1:2.7.4-0ubuntu1.10 | UNKNOWN |
Ubuntu | 16.04 | noarch | git-doc | <Β 1:2.7.4-0ubuntu1.10 | UNKNOWN |
Ubuntu | 16.04 | noarch | git-el | <Β 1:2.7.4-0ubuntu1.10 | UNKNOWN |