[USN-7626-3] Git regression
[LSN-0113-1] Linux kernel vulnerability
[USN-7626-3] Git regression
==========================================================================
Ubuntu Security Notice USN-7626-3
July 10, 2025
git regression
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
USN-7626-1 introduced a regression in Git
Software Description:
- git: fast, scalable, distributed revision control system
Details:
USN-7626-1 fixed vulnerabilities in Git. The updates for CVE-2025-27613
and CVE-2025-46835 caused Gitk and Git GUI to not work properly on Ubuntu
16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS, and
were disabled in USN-7626-2. The problematic updates for the
aforementioned CVEs have now been corrected and reinstated in this update.
We apologize for the inconvenience.
Original advisory details:
Avi Halachmi discovered that Git incorrectly managed file modification
constraints with Gitk. An attacker could possibly use this issue to create
or write to arbitrary files on the system. (CVE-2025-27613)
Avi Halachmi discovered that Git incorrectly handled arguments when
invoking the Gitk utility. If a user were tricked into cloning a malicious
Git repository, an attacker could possibly use this issue to run arbitrary
commands. This issue only affected Ubuntu 24.04 LTS, Ubuntu 24.10, and
Ubuntu 25.04. (CVE-2025-27614)
Johannes Sixt discovered that Git incorrectly managed file modification
constraints with Git GUI. If a user were tricked into editing a file in a
malicious Git repository, an attacker could possibly use this issue to
create or write to arbitrary files on the system. (CVE-2025-46835)
David Leadbeater discovered that Git incorrectly stripped CRLF characters
when editing configuration files. An attacker could possibly use this
issue to execute arbitrary code. (CVE-2025-48384)
David Leadbeater discovered that Git incorrectly handled verification when
fetching remote Git repositories. An attacker could possibly use this
issue to perform protocol injection, leading to arbitrary code execution.
This issue only affected Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04.
(CVE-2025-48385)
David Leadbeater discovered that Git incorrectly handled memory with the
wincred credential helper. An attacker could possibly use this issue to
cause a denial of service. (CVE-2025-48386)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
git-gui 1:2.34.1-1ubuntu1.15
gitk 1:2.34.1-1ubuntu1.15
Ubuntu 20.04 LTS
git-gui 1:2.25.1-1ubuntu3.14+esm3
Available with Ubuntu Pro
gitk 1:2.25.1-1ubuntu3.14+esm3
Available with Ubuntu Pro
Ubuntu 18.04 LTS
git-gui 1:2.17.1-1ubuntu0.18+esm4
Available with Ubuntu Pro
gitk 1:2.17.1-1ubuntu0.18+esm4
Available with Ubuntu Pro
Ubuntu 16.04 LTS
git-gui 1:2.7.4-0ubuntu1.10+esm11
Available with Ubuntu Pro
gitk 1:2.7.4-0ubuntu1.10+esm11
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7626-3
https://ubuntu.com/security/notices/USN-7626-2
https://ubuntu.com/security/notices/USN-7626-3
https://launchpad.net/bugs/2116251
Package Information:
https://launchpad.net/ubuntu/+source/git/1:2.34.1-1ubuntu1.15
[LSN-0113-1] Linux kernel vulnerability
Linux kernel vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 24.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 14.04 LTS
Summary
Several security issues were fixed in the kernel.
Software Description
- linux - Linux kernel
- linux-aws - Linux kernel for Amazon Web Services (AWS) systems
- linux-azure - Linux kernel for Microsoft Azure Cloud systems
- linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke - Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop - Linux kernel for Google Container Engine (GKE) systems
- linux-ibm - Linux kernel for IBM cloud systems
- linux-oracle - Linux kernel for Oracle Cloud systems
Details
In the Linux kernel, the following vulnerability has been resolved: smb:
client: fix UAF in async decryption Doing an async decryption (large
read) crashes with a slab-use-after-free way down in the crypto API.
(CVE-2024-50047)
In the Linux kernel, the following vulnerability has been resolved:
ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit After
an insertion in TNC, the tree might split and cause a node to change its
znode->parent. (CVE-2024-53171)
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: fix usage slab after free (CVE-2024-56551)
In the Linux kernel, the following vulnerability has been resolved: jfs:
fix array-index-out-of-bounds in jfs_readdir The stbl might contain some
invalid values. (CVE-2024-56596)
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix out-of-bounds access in ‘dcn21_link_encoder_create’
An issue was identified in the dcn21_link_encoder_create function where
an out-of-bounds access could occur when the hpd_source index was used
to reference the link_enc_hpd_regs array. (CVE-2024-56608)
In the Linux kernel, the following vulnerability has been resolved:
jffs2: Prevent rtime decompress memory corruption The rtime
decompression routine does not fully check bounds during the entirety of
the decompression pass and can corrupt memory outside the decompression
buffer if the compressed data is corrupted. (CVE-2024-57850)
Update instructions
The problem can be corrected by updating your kernel livepatch to the
following versions:
Ubuntu 20.04 LTS
aws - 113.1
azure - 113.1
gcp - 113.1
generic - 113.1
gkeop - 113.1
ibm - 113.1
lowlatency - 113.1
oracle - 113.1
Ubuntu 18.04 LTS
aws - 113.1
azure - 113.1
gcp - 113.1
generic - 113.1
lowlatency - 113.1
oracle - 113.1
Ubuntu 24.04 LTS
aws - 113.1
azure - 113.1
gcp - 113.1
generic - 113.1
ibm - 113.1
oracle - 113.1
Ubuntu 16.04 LTS
aws - 113.1
azure - 113.1
gcp - 113.1
generic - 113.1
lowlatency - 113.1
Ubuntu 22.04 LTS
aws - 113.1
azure - 113.1
gcp - 113.1
generic - 113.1
gke - 113.1
ibm - 113.1
oracle - 113.1
Ubuntu 14.04 LTS
generic - 113.1
lowlatency - 113.1
Support Information
Livepatches for supported LTS kernels will receive upgrades for a period
of up to 13 months after the build date of the kernel.
Livepatches for supported HWE kernels which are not based on an LTS
kernel version will receive upgrades for a period of up to 9 months
after the build date of the kernel, or until the end of support for that
kernel’s non-LTS distro release version, whichever is sooner.
References
- CVE-2024-50047
- CVE-2024-53171
- CVE-2024-56551
- CVE-2024-56596
- CVE-2024-56608
- CVE-2024-57850