USN-2938-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-2938-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2938-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-2938-1
Related
Published
2016-03-21T19:28:26.265009Z
Modified
2016-03-21T19:28:26.265009Z
Summary
git vulnerabilities
Details

Laël Cellier discovered that Git incorrectly handled path strings in crafted Git repositories. A remote attacker could use this issue to cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking Git. (CVE-2016-2315, CVE-2016-2324)

References

Affected packages

Ubuntu:14.04:LTS / git

Package

Name
git
Purl
pkg:deb/ubuntu/git@1:1.9.1-1ubuntu0.3?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.9.1-1ubuntu0.3

Affected versions

1:1.*

1:1.8.3.2-1
1:1.8.4.2-1
1:1.8.4.3-1
1:1.8.4.4-1
1:1.8.5-1
1:1.8.5.1-1
1:1.8.5.2-1
1:1.8.5.2-2
1:1.8.5.3-1
1:1.9~rc1-1
1:1.9.0-1
1:1.9.1-1
1:1.9.1-1ubuntu0.1
1:1.9.1-1ubuntu0.2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "git-core": "1:1.9.1-1ubuntu0.3",
            "git-daemon-run": "1:1.9.1-1ubuntu0.3",
            "git-email": "1:1.9.1-1ubuntu0.3",
            "git-mediawiki": "1:1.9.1-1ubuntu0.3",
            "git": "1:1.9.1-1ubuntu0.3",
            "git-el": "1:1.9.1-1ubuntu0.3",
            "git-cvs": "1:1.9.1-1ubuntu0.3",
            "git-bzr": "1:1.9.1-1ubuntu0.3",
            "gitk": "1:1.9.1-1ubuntu0.3",
            "git-doc": "1:1.9.1-1ubuntu0.3",
            "git-arch": "1:1.9.1-1ubuntu0.3",
            "git-daemon-sysvinit": "1:1.9.1-1ubuntu0.3",
            "git-svn": "1:1.9.1-1ubuntu0.3",
            "git-gui": "1:1.9.1-1ubuntu0.3",
            "git-man": "1:1.9.1-1ubuntu0.3",
            "gitweb": "1:1.9.1-1ubuntu0.3",
            "git-all": "1:1.9.1-1ubuntu0.3"
        }
    ]
}