Логотип exploitDog
bind:"BDU:2022-04385" OR bind:"CVE-2022-29187"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2022-04385" OR bind:"CVE-2022-29187"

Количество 15

Количество 15

fstec логотип

BDU:2022-04385

около 3 лет назад

Уязвимость распределенной системы управления версиями Git, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии или выполнить произвольные команды

CVSS3: 7.8
EPSS: Низкий
redos логотип

ROS-20240730-06

около 1 года назад

Уязвимость libgit2

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2022-29187

около 3 лет назад

Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2022-29187

около 3 лет назад

Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2022-29187

около 3 лет назад

Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2022-29187

около 3 лет назад

Git is a distributed revision control system. Git prior to versions 2. ...

CVSS3: 7.8
EPSS: Низкий
redos логотип

ROS-20240425-07

больше 1 года назад

Уязвимость git

CVSS3: 7.8
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2022:2550-1

около 3 лет назад

Security update for git

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2537-1

около 3 лет назад

Security update for git

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2535-1

около 3 лет назад

Security update for git

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3494-1

почти 3 года назад

Security update for libgit2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3283-1

почти 3 года назад

Security update for libgit2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3495-1

почти 3 года назад

Security update for libgit2

EPSS: Низкий
oracle-oval логотип

ELSA-2023-2859

больше 2 лет назад

ELSA-2023-2859: git security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-2319

больше 2 лет назад

ELSA-2023-2319: git security and bug fix update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2022-04385

Уязвимость распределенной системы управления версиями Git, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии или выполнить произвольные команды

CVSS3: 7.8
0%
Низкий
около 3 лет назад
redos логотип
ROS-20240730-06

Уязвимость libgit2

CVSS3: 7.8
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2022-29187

Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.

CVSS3: 7.8
0%
Низкий
около 3 лет назад
redhat логотип
CVE-2022-29187

Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.

CVSS3: 7.8
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2022-29187

Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.

CVSS3: 7.8
0%
Низкий
около 3 лет назад
debian логотип
CVE-2022-29187

Git is a distributed revision control system. Git prior to versions 2. ...

CVSS3: 7.8
0%
Низкий
около 3 лет назад
redos логотип
ROS-20240425-07

Уязвимость git

CVSS3: 7.8
10%
Средний
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2022:2550-1

Security update for git

0%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2537-1

Security update for git

0%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2535-1

Security update for git

0%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:3494-1

Security update for libgit2

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:3283-1

Security update for libgit2

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:3495-1

Security update for libgit2

почти 3 года назад
oracle-oval логотип
ELSA-2023-2859

ELSA-2023-2859: git security and bug fix update (MODERATE)

больше 2 лет назад
oracle-oval логотип
ELSA-2023-2319

ELSA-2023-2319: git security and bug fix update (MODERATE)

больше 2 лет назад

Уязвимостей на страницу