{"id":"USN-5810-4","summary":"git vulnerabilities","details":"USN-5810-1 fixed several vulnerabilities in Git. This update provides\nthe corresponding update for Ubuntu 14.04 ESM.\n\nOriginal advisory details:\n\n Markus Vervier and Eric Sesterhenn discovered that Git incorrectly handled certain\n gitattributes. An attacker could possibly use this issue to cause a crash\n or execute arbitrary code. (CVE-2022-23521)\n\n Joern Schneeweisz discovered that Git incorrectly handled certain commands.\n An attacker could possibly use this issue to cause a crash or execute\n arbitrary code. (CVE-2022-41903)\n","modified":"2026-02-10T04:42:55Z","published":"2023-03-01T14:20:47Z","related":["UBUNTU-CVE-2022-23521","UBUNTU-CVE-2022-41903"],"upstream":["CVE-2022-23521","CVE-2022-41903","UBUNTU-CVE-2022-23521","UBUNTU-CVE-2022-41903"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5810-4"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-23521"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-41903"}],"affected":[{"package":{"name":"git","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/git@1:1.9.1-1ubuntu0.10+esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.9.1-1ubuntu0.10+esm1"}]}],"versions":["1:1.8.3.2-1","1:1.8.4.2-1","1:1.8.4.3-1","1:1.8.4.4-1","1:1.8.5-1","1:1.8.5.1-1","1:1.8.5.2-1","1:1.8.5.2-2","1:1.8.5.3-1","1:1.9~rc1-1","1:1.9.0-1","1:1.9.1-1","1:1.9.1-1ubuntu0.1","1:1.9.1-1ubuntu0.2","1:1.9.1-1ubuntu0.3","1:1.9.1-1ubuntu0.4","1:1.9.1-1ubuntu0.5","1:1.9.1-1ubuntu0.6","1:1.9.1-1ubuntu0.7","1:1.9.1-1ubuntu0.8","1:1.9.1-1ubuntu0.9","1:1.9.1-1ubuntu0.10"],"ecosystem_specific":{"binaries":[{"binary_name":"git","binary_version":"1:1.9.1-1ubuntu0.10+esm1"},{"binary_name":"git-all","binary_version":"1:1.9.1-1ubuntu0.10+esm1"},{"binary_name":"git-arch","binary_version":"1:1.9.1-1ubuntu0.10+esm1"},{"binary_name":"git-bzr","binary_version":"1:1.9.1-1ubuntu0.10+esm1"},{"binary_name":"git-core","binary_version":"1:1.9.1-1ubuntu0.10+esm1"},{"binary_name":"git-cvs","binary_version":"1:1.9.1-1ubuntu0.10+esm1"},{"binary_name":"git-daemon-run","binary_version":"1:1.9.1-1ubuntu0.10+esm1"},{"binary_name":"git-daemon-sysvinit","binary_version":"1:1.9.1-1ubuntu0.10+esm1"},{"binary_name":"git-el","binary_version":"1:1.9.1-1ubuntu0.10+esm1"},{"binary_name":"git-email","binary_version":"1:1.9.1-1ubuntu0.10+esm1"},{"binary_name":"git-gui","binary_version":"1:1.9.1-1ubuntu0.10+esm1"},{"binary_name":"git-man","binary_version":"1:1.9.1-1ubuntu0.10+esm1"},{"binary_name":"git-mediawiki","binary_version":"1:1.9.1-1ubuntu0.10+esm1"},{"binary_name":"git-svn","binary_version":"1:1.9.1-1ubuntu0.10+esm1"},{"binary_name":"gitk","binary_version":"1:1.9.1-1ubuntu0.10+esm1"},{"binary_name":"gitweb","binary_version":"1:1.9.1-1ubuntu0.10+esm1"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5810-4.json","cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"id":"CVE-2022-23521","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-41903","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}]}}}],"schema_version":"1.7.3"}