USN-3287-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-3287-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3287-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3287-1
Related
Published
2017-05-15T13:52:14.668032Z
Modified
2017-05-15T13:52:14.668032Z
Summary
git vulnerability
Details

Timo Schmid discovered that the Git restricted shell incorrectly filtered allowed commands. A remote attacker could possibly use this issue to run an interactive pager and access sensitive information.

References

Affected packages

Ubuntu:14.04:LTS / git

Package

Name
git
Purl
pkg:deb/ubuntu/git@1:1.9.1-1ubuntu0.5?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.9.1-1ubuntu0.5

Affected versions

1:1.*

1:1.8.3.2-1
1:1.8.4.2-1
1:1.8.4.3-1
1:1.8.4.4-1
1:1.8.5-1
1:1.8.5.1-1
1:1.8.5.2-1
1:1.8.5.2-2
1:1.8.5.3-1
1:1.9~rc1-1
1:1.9.0-1
1:1.9.1-1
1:1.9.1-1ubuntu0.1
1:1.9.1-1ubuntu0.2
1:1.9.1-1ubuntu0.3
1:1.9.1-1ubuntu0.4

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "git-core": "1:1.9.1-1ubuntu0.5",
            "git-daemon-run": "1:1.9.1-1ubuntu0.5",
            "git-email": "1:1.9.1-1ubuntu0.5",
            "git-mediawiki": "1:1.9.1-1ubuntu0.5",
            "git": "1:1.9.1-1ubuntu0.5",
            "git-el": "1:1.9.1-1ubuntu0.5",
            "git-cvs": "1:1.9.1-1ubuntu0.5",
            "git-bzr": "1:1.9.1-1ubuntu0.5",
            "gitk": "1:1.9.1-1ubuntu0.5",
            "git-doc": "1:1.9.1-1ubuntu0.5",
            "git-arch": "1:1.9.1-1ubuntu0.5",
            "git-daemon-sysvinit": "1:1.9.1-1ubuntu0.5",
            "git-svn": "1:1.9.1-1ubuntu0.5",
            "git-gui": "1:1.9.1-1ubuntu0.5",
            "git-man": "1:1.9.1-1ubuntu0.5",
            "gitweb": "1:1.9.1-1ubuntu0.5",
            "git-all": "1:1.9.1-1ubuntu0.5"
        }
    ]
}

Ubuntu:16.04:LTS / git

Package

Name
git
Purl
pkg:deb/ubuntu/git@1:2.7.4-0ubuntu1.1?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.7.4-0ubuntu1.1

Affected versions

1:2.*

1:2.5.0-1
1:2.6.2-1
1:2.6.3-1
1:2.6.4-1
1:2.7.0~rc3-1
1:2.7.0-1
1:2.7.3-0ubuntu1
1:2.7.4-0ubuntu1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "git-core": "1:2.7.4-0ubuntu1.1",
            "git-daemon-run": "1:2.7.4-0ubuntu1.1",
            "git-email": "1:2.7.4-0ubuntu1.1",
            "git-mediawiki": "1:2.7.4-0ubuntu1.1",
            "git": "1:2.7.4-0ubuntu1.1",
            "git-el": "1:2.7.4-0ubuntu1.1",
            "git-cvs": "1:2.7.4-0ubuntu1.1",
            "git-doc": "1:2.7.4-0ubuntu1.1",
            "gitk": "1:2.7.4-0ubuntu1.1",
            "git-arch": "1:2.7.4-0ubuntu1.1",
            "git-daemon-sysvinit": "1:2.7.4-0ubuntu1.1",
            "git-svn": "1:2.7.4-0ubuntu1.1",
            "git-gui": "1:2.7.4-0ubuntu1.1",
            "git-man": "1:2.7.4-0ubuntu1.1",
            "gitweb": "1:2.7.4-0ubuntu1.1",
            "git-all": "1:2.7.4-0ubuntu1.1"
        }
    ]
}