Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-29187
HistoryJul 12, 2022 - 12:00 a.m.

CVE-2022-29187

2022-07-1200:00:00
ubuntu.com
ubuntu.com
16

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0005 Low

EPSS

Percentile

15.6%

Git is a distributed revision control system. Git prior to versions 2.37.1,
2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable
to privilege escalation in all platforms. An unsuspecting user could still
be affected by the issue reported in CVE-2022-24765, for example when
navigating as root into a shared tmp directory that is owned by them, but
where an attacker could create a git repository. Versions 2.37.1, 2.36.2,
2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this
issue. The simplest way to avoid being affected by the exploit described in
the example is to avoid running git as root (or an Administrator in
Windows), and if needed to reduce its use to a minimum. While a generic
workaround is not possible, a system could be hardened from the exploit
described in the example by removing any such repository if it exists
already and creating one as root to block any future attacks.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchgit< 1:2.17.1-1ubuntu0.12UNKNOWN
ubuntu20.04noarchgit< 1:2.25.1-1ubuntu3.5UNKNOWN
ubuntu21.10noarchgit< 1:2.32.0-1ubuntu1.3UNKNOWN
ubuntu22.04noarchgit< 1:2.34.1-1ubuntu1.4UNKNOWN
ubuntu22.10noarchgit< 1:2.36.1-1ubuntu2UNKNOWN
ubuntu23.04noarchgit< 1:2.36.1-1ubuntu2UNKNOWN
ubuntu23.10noarchgit< 1:2.36.1-1ubuntu2UNKNOWN
ubuntu16.04noarchgit< anyUNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0005 Low

EPSS

Percentile

15.6%