git: 0b471aa90f16 - main - security/vuxml: document devel/git CVE-2022-29187
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 12 Jul 2022 22:56:07 UTC
The branch main has been updated by brd (doc, src committer): URL: https://cgit.FreeBSD.org/ports/commit/?id=0b471aa90f162b54fdd63d241f3936d8b85dc5a3 commit 0b471aa90f162b54fdd63d241f3936d8b85dc5a3 Author: Brad Davis <brd@FreeBSD.org> AuthorDate: 2022-07-12 22:53:50 +0000 Commit: Brad Davis <brd@FreeBSD.org> CommitDate: 2022-07-12 22:54:57 +0000 security/vuxml: document devel/git CVE-2022-29187 --- security/vuxml/vuln-2022.xml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml index 7d76745845bf..b3c1221d17e4 100644 --- a/security/vuxml/vuln-2022.xml +++ b/security/vuxml/vuln-2022.xml @@ -1,3 +1,33 @@ + <vuln vid="b99f99f6-021e-11ed-8c6f-000c29ffbb6c"> + <topic>git -- privilege escalation</topic> + <affects> + <package> + <name>git</name> + <range><lt>2.37.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The git project reports:</p> + <blockquote cite="https://lkml.org/lkml/2022/7/12/1137"> + <p>Git is vulnerable to privilege escalation in all platforms. + An unsuspecting user could still be affected by the issue + reported in CVE-2022-24765, for example when navigating as + root into a shared tmp directory that is owned by them, but + where an attacker could create a git repository.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2022-29187</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187</url> + </references> + <dates> + <discovery>2022-07-12</discovery> + <entry>2022-07-12</entry> + </dates> + </vuln> + <vuln vid="830855f3-ffcc-11ec-9d41-d05099c8b5a7"> <topic>mat2 -- directory traversal/arbitrary file read during ZIP file processing</topic> <affects>