5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
40.5%
Debian Security Advisory DSA-5332-1 [email protected]
https://www.debian.org/security/ Aron Xu
January 29, 2023 https://www.debian.org/security/faq
Package : git
CVE ID : CVE-2022-23521 CVE-2022-24765 CVE-2022-29187 CVE-2022-39253
CVE-2022-39260 CVE-2022-41903
Debian Bug : 1014848 1022046 1029114
Multiple issues were found in Git, a distributed revision control system.
An attacker may trigger remote code execution, cause local users into
executing arbitrary commands, leak information from the local filesystem,
and bypass restricted shell.
This update includes two changes of behavior that may affect certain setup:
For the stable distribution (bullseye), these problems have been fixed in
version 1:2.30.2-1+deb11u1.
We recommend that you upgrade your git packages.
For the detailed security status of git please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/git
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 11 | mips64el | git | < 1:2.30.2-1+deb11u1 | git_1:2.30.2-1+deb11u1_mips64el.deb |
Debian | 10 | all | git-svn | < 1:2.20.1-2+deb10u5 | git-svn_1:2.20.1-2+deb10u5_all.deb |
Debian | 11 | armel | git | < 1:2.30.2-1+deb11u1 | git_1:2.30.2-1+deb11u1_armel.deb |
Debian | 11 | all | git-cvs | < 1:2.30.2-1+deb11u1 | git-cvs_1:2.30.2-1+deb11u1_all.deb |
Debian | 11 | all | git-mediawiki | < 1:2.30.2-1+deb11u1 | git-mediawiki_1:2.30.2-1+deb11u1_all.deb |
Debian | 11 | mipsel | git-dbgsym | < 1:2.30.2-1+deb11u1 | git-dbgsym_1:2.30.2-1+deb11u1_mipsel.deb |
Debian | 11 | armhf | git | < 1:2.30.2-1+deb11u1 | git_1:2.30.2-1+deb11u1_armhf.deb |
Debian | 11 | all | git-man | < 1:2.30.2-1+deb11u1 | git-man_1:2.30.2-1+deb11u1_all.deb |
Debian | 11 | ppc64el | git | < 1:2.30.2-1+deb11u1 | git_1:2.30.2-1+deb11u1_ppc64el.deb |
Debian | 11 | amd64 | git | < 1:2.30.2-1+deb11u1 | git_1:2.30.2-1+deb11u1_amd64.deb |
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
40.5%