Lucene search

K
slackwareSlackware Linux ProjectSSA-2022-104-01
HistoryApr 14, 2022 - 9:20 p.m.

[slackware-security] git

2022-04-1421:20:42
Slackware Linux Project
www.slackware.com
26

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0005 Low

EPSS

Percentile

15.6%

New git packages are available for Slackware 14.0, 14.1, 14.2, 15.0,
and -current to fix a security issue.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/git-2.35.3-i586-1_slack15.0.txz: Upgraded.
This update fixes a security issue where a Git worktree created by another
user might be able to execute arbitrary code.
For more information, see:
https://vulners.com/cve/CVE-2022-24765
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/git-2.30.4-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/git-2.30.4-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/git-2.30.4-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/git-2.30.4-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/git-2.30.4-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/git-2.30.4-x86_64-1_slack14.2.txz

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/git-2.35.3-i586-1_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/git-2.35.3-x86_64-1_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/git-2.35.3-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/d/git-2.35.3-x86_64-1.txz

MD5 signatures:

Slackware 14.0 package:
6b17a4ecf0741281d1e279fcc54a80e3 git-2.30.4-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
39a11751fbbc5eaab6894a504962aaff git-2.30.4-x86_64-1_slack14.0.txz

Slackware 14.1 package:
ce59b30a1e570c22f42b712f8c413150 git-2.30.4-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
0b7e13d6531e82cc5b9f10d5e6e75d22 git-2.30.4-x86_64-1_slack14.1.txz

Slackware 14.2 package:
c882324d443fb463b2e4d71a766eaa31 git-2.30.4-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
4191b49059a6ca1819901b7f151e66f1 git-2.30.4-x86_64-1_slack14.2.txz

Slackware 15.0 package:
d269fef1e5e6525357aa8fd09e518109 git-2.35.3-i586-1_slack15.0.txz

Slackware x86_64 15.0 package:
780cf61ba865d4358cf9956360781a09 git-2.35.3-x86_64-1_slack15.0.txz

Slackware -current package:
363c631c7a142afdc290039639f5d31f d/git-2.35.3-i586-1.txz

Slackware x86_64 -current package:
5f0a6807cdf459b5d9418ea4412e7c2a d/git-2.35.3-x86_64-1.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg git-2.35.3-i586-1_slack15.0.txz

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0005 Low

EPSS

Percentile

15.6%