{"id":"USN-7023-1","summary":"git vulnerabilities","details":"Maxime Escourbiac and Yassine Bengana discovered that Git incorrectly\nhandled some gettext machinery. An attacker could possibly use this issue\nto allows the malicious placement of crafted messages. This issue was fixed\nin Ubuntu 16.04 LTS. (CVE-2023-25815)\n\nIt was discovered that Git incorrectly handled certain submodules.\nAn attacker could possibly use this issue to execute arbitrary code.\nThis issue was fixed in Ubuntu 18.04 LTS. (CVE-2024-32002)\n\nIt was discovered that Git incorrectly handled certain cloned repositories.\nAn attacker could possibly use this issue to execute arbitrary code. This\nissue was fixed in Ubuntu 18.04 LTS. (CVE-2024-32004, CVE-2024-32465)\n\nIt was discovered that Git incorrectly handled local clones with hardlinked\nfiles/directories. An attacker could possibly use this issue to place a\nspecialized repository on their target’s local system. This issue was fixed\nin Ubuntu 18.04 LTS. (CVE-2024-32020)\n\nIt was discovered that Git incorrectly handled certain symlinks. An\nattacker could possibly use this issue to impact availability and\nintegrity creating hardlinked arbitrary files into users repository’s\nobjects/directory. This issue was fixed in Ubuntu 18.04 LTS.\n(CVE-2024-32021)\n","modified":"2026-02-10T04:45:27Z","published":"2024-09-19T03:56:46Z","related":["UBUNTU-CVE-2023-25815","UBUNTU-CVE-2024-32002","UBUNTU-CVE-2024-32004","UBUNTU-CVE-2024-32020","UBUNTU-CVE-2024-32021","UBUNTU-CVE-2024-32465"],"upstream":["CVE-2023-25815","CVE-2024-32002","CVE-2024-32004","CVE-2024-32020","CVE-2024-32021","CVE-2024-32465","UBUNTU-CVE-2023-25815","UBUNTU-CVE-2024-32002","UBUNTU-CVE-2024-32004","UBUNTU-CVE-2024-32020","UBUNTU-CVE-2024-32021","UBUNTU-CVE-2024-32465"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7023-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-25815"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-32002"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-32004"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-32020"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-32021"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-32465"}],"affected":[{"package":{"name":"git","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/git@1:2.7.4-0ubuntu1.10+esm8?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.7.4-0ubuntu1.10+esm8"}]}],"versions":["1:2.5.0-1","1:2.6.2-1","1:2.6.3-1","1:2.6.4-1","1:2.7.0~rc3-1","1:2.7.0-1","1:2.7.3-0ubuntu1","1:2.7.4-0ubuntu1","1:2.7.4-0ubuntu1.1","1:2.7.4-0ubuntu1.2","1:2.7.4-0ubuntu1.3","1:2.7.4-0ubuntu1.4","1:2.7.4-0ubuntu1.5","1:2.7.4-0ubuntu1.6","1:2.7.4-0ubuntu1.7","1:2.7.4-0ubuntu1.8","1:2.7.4-0ubuntu1.9","1:2.7.4-0ubuntu1.10","1:2.7.4-0ubuntu1.10+esm1","1:2.7.4-0ubuntu1.10+esm3","1:2.7.4-0ubuntu1.10+esm4","1:2.7.4-0ubuntu1.10+esm5","1:2.7.4-0ubuntu1.10+esm6","1:2.7.4-0ubuntu1.10+esm7"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"git","binary_version":"1:2.7.4-0ubuntu1.10+esm8"},{"binary_name":"git-all","binary_version":"1:2.7.4-0ubuntu1.10+esm8"},{"binary_name":"git-arch","binary_version":"1:2.7.4-0ubuntu1.10+esm8"},{"binary_name":"git-core","binary_version":"1:2.7.4-0ubuntu1.10+esm8"},{"binary_name":"git-cvs","binary_version":"1:2.7.4-0ubuntu1.10+esm8"},{"binary_name":"git-daemon-run","binary_version":"1:2.7.4-0ubuntu1.10+esm8"},{"binary_name":"git-daemon-sysvinit","binary_version":"1:2.7.4-0ubuntu1.10+esm8"},{"binary_name":"git-el","binary_version":"1:2.7.4-0ubuntu1.10+esm8"},{"binary_name":"git-email","binary_version":"1:2.7.4-0ubuntu1.10+esm8"},{"binary_name":"git-gui","binary_version":"1:2.7.4-0ubuntu1.10+esm8"},{"binary_name":"git-man","binary_version":"1:2.7.4-0ubuntu1.10+esm8"},{"binary_name":"git-mediawiki","binary_version":"1:2.7.4-0ubuntu1.10+esm8"},{"binary_name":"git-svn","binary_version":"1:2.7.4-0ubuntu1.10+esm8"},{"binary_name":"gitk","binary_version":"1:2.7.4-0ubuntu1.10+esm8"},{"binary_name":"gitweb","binary_version":"1:2.7.4-0ubuntu1.10+esm8"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7023-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-25815"}]}}},{"package":{"name":"git","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/git@1:2.17.1-1ubuntu0.18+esm1?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.17.1-1ubuntu0.18+esm1"}]}],"versions":["1:2.14.1-1ubuntu4","1:2.15.1-1ubuntu2","1:2.17.0-1ubuntu1","1:2.17.1-1ubuntu0.1","1:2.17.1-1ubuntu0.3","1:2.17.1-1ubuntu0.4","1:2.17.1-1ubuntu0.5","1:2.17.1-1ubuntu0.6","1:2.17.1-1ubuntu0.7","1:2.17.1-1ubuntu0.8","1:2.17.1-1ubuntu0.9","1:2.17.1-1ubuntu0.10","1:2.17.1-1ubuntu0.11","1:2.17.1-1ubuntu0.12","1:2.17.1-1ubuntu0.13","1:2.17.1-1ubuntu0.14","1:2.17.1-1ubuntu0.15","1:2.17.1-1ubuntu0.16","1:2.17.1-1ubuntu0.17","1:2.17.1-1ubuntu0.18"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"git","binary_version":"1:2.17.1-1ubuntu0.18+esm1"},{"binary_name":"git-all","binary_version":"1:2.17.1-1ubuntu0.18+esm1"},{"binary_name":"git-cvs","binary_version":"1:2.17.1-1ubuntu0.18+esm1"},{"binary_name":"git-daemon-run","binary_version":"1:2.17.1-1ubuntu0.18+esm1"},{"binary_name":"git-daemon-sysvinit","binary_version":"1:2.17.1-1ubuntu0.18+esm1"},{"binary_name":"git-el","binary_version":"1:2.17.1-1ubuntu0.18+esm1"},{"binary_name":"git-email","binary_version":"1:2.17.1-1ubuntu0.18+esm1"},{"binary_name":"git-gui","binary_version":"1:2.17.1-1ubuntu0.18+esm1"},{"binary_name":"git-man","binary_version":"1:2.17.1-1ubuntu0.18+esm1"},{"binary_name":"git-mediawiki","binary_version":"1:2.17.1-1ubuntu0.18+esm1"},{"binary_name":"git-svn","binary_version":"1:2.17.1-1ubuntu0.18+esm1"},{"binary_name":"gitk","binary_version":"1:2.17.1-1ubuntu0.18+esm1"},{"binary_name":"gitweb","binary_version":"1:2.17.1-1ubuntu0.18+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7023-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-32002"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-32004"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-32020"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-32021"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-32465"}]}}}],"schema_version":"1.7.3"}