CVE-2024-32004
Publication date 14 May 2024
Last updated 19 September 2024
Ubuntu priority
Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, an attacker can prepare a local repository in such a way that, when cloned, will execute arbitrary code during the operation. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. As a workaround, avoid cloning repositories from untrusted sources.
Status
Package | Ubuntu Release | Status |
---|---|---|
git | 24.04 LTS noble |
Fixed 1:2.43.0-1ubuntu7.1
|
22.04 LTS jammy |
Fixed 1:2.34.1-1ubuntu1.11
|
|
20.04 LTS focal |
Fixed 1:2.25.1-1ubuntu3.12
|
|
18.04 LTS bionic |
Fixed 1:2.17.1-1ubuntu0.18+esm1
|
|
16.04 LTS xenial |
Not affected
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProReferences
Related Ubuntu Security Notices (USN)
- USN-6793-1
- Git vulnerabilities
- 28 May 2024
- USN-7023-1
- Git vulnerabilities
- 19 September 2024