6.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
Low
0.013 Low
EPSS
Percentile
85.6%
Debian Security Advisory DSA-5332-1 [email protected]
https://www.debian.org/security/ Aron Xu
January 29, 2023 https://www.debian.org/security/faq
Package : git
CVE ID : CVE-2022-23521 CVE-2022-24765 CVE-2022-29187 CVE-2022-39253
CVE-2022-39260 CVE-2022-41903
Debian Bug : 1014848 1022046 1029114
Multiple issues were found in Git, a distributed revision control system.
An attacker may trigger remote code execution, cause local users into
executing arbitrary commands, leak information from the local filesystem,
and bypass restricted shell.
This update includes two changes of behavior that may affect certain setup:
For the stable distribution (bullseye), these problems have been fixed in
version 1:2.30.2-1+deb11u1.
We recommend that you upgrade your git packages.
For the detailed security status of git please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/git
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 11 | mipsel | git | < 1:2.30.2-1+deb11u1 | git_1:2.30.2-1+deb11u1_mipsel.deb |
Debian | 11 | armhf | git-dbgsym | < 1:2.30.2-1+deb11u1 | git-dbgsym_1:2.30.2-1+deb11u1_armhf.deb |
Debian | 11 | armel | git-dbgsym | < 1:2.30.2-1+deb11u1 | git-dbgsym_1:2.30.2-1+deb11u1_armel.deb |
Debian | 10 | all | git-mediawiki | < 1:2.20.1-2+deb10u5 | git-mediawiki_1:2.20.1-2+deb10u5_all.deb |
Debian | 11 | all | gitweb | < 1:2.30.2-1+deb11u1 | gitweb_1:2.30.2-1+deb11u1_all.deb |
Debian | 11 | mipsel | git-dbgsym | < 1:2.30.2-1+deb11u1 | git-dbgsym_1:2.30.2-1+deb11u1_mipsel.deb |
Debian | 11 | ppc64el | git | < 1:2.30.2-1+deb11u1 | git_1:2.30.2-1+deb11u1_ppc64el.deb |
Debian | 10 | all | git-doc | < 1:2.20.1-2+deb10u5 | git-doc_1:2.20.1-2+deb10u5_all.deb |
Debian | 10 | all | git-svn | < 1:2.20.1-2+deb10u5 | git-svn_1:2.20.1-2+deb10u5_all.deb |
Debian | 10 | all | git-email | < 1:2.20.1-2+deb10u5 | git-email_1:2.20.1-2+deb10u5_all.deb |
6.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
Low
0.013 Low
EPSS
Percentile
85.6%