7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
Severity: Medium
Date : 2022-05-16
CVE-ID : CVE-2022-24765
Package : git
Type : arbitrary command execution
Remote : No
Link : https://security.archlinux.org/AVG-2679
The package git before version 2.35.3-1 is vulnerable to arbitrary
command execution.
Upgrade to 2.35.3-1.
The problem has been fixed upstream in version 2.35.3.
None.
A vulnerability was found in Git. This flaw occurs due to Git not
checking the ownership of directories in a local multi-user system when
running commands specified in the local repository configuration. This
allows the owner of the repository to cause arbitrary commands to be
executed by other users who access the repository.
https://lore.kernel.org/git/[email protected]/
https://security.archlinux.org/CVE-2022-24765
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C