Vulnerability Details : CVE-2022-29187
Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.
Vulnerability category: Gain privilege
Exploit prediction scoring system (EPSS) score for CVE-2022-29187
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 8 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-29187
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
[email protected] |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
[email protected] |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
[email protected] |
CWE ids for CVE-2022-29187
-
The product assigns the wrong ownership, or does not properly verify the ownership, of an object or resource.Assigned by: [email protected] (Primary)
-
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.Assigned by:
- [email protected] (Secondary)
- [email protected] (Primary)
References for CVE-2022-29187
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/HVOLER2PIGMHPQMDGG4RDE2KZB74QLA2/
Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/TRZG5CDUQ27OWTPC5MQOR4UASNXHWEZS/
Mailing List;Third Party Advisory
-
https://support.apple.com/kb/HT213496
Third Party Advisory
-
https://lore.kernel.org/git/[email protected]/T/#u
Mailing List;Release Notes;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2022/07/14/1
Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/DIKWISWUDFT2FAITYIA6372BVLH3OOOC/
Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/DDI325LOO2XBDDKLINOAQJEG6MHAURZE/
Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/UDZRZAL7QULOB6V7MKT66MOMWJLBJPX4/
Mailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html
Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/YROCMBWYFKRSS64PO6FUNM6L7LKBUKVW/
Mailing List;Third Party Advisory
-
https://github.blog/2022-04-12-git-security-vulnerability-announced
Third Party Advisory
-
https://github.com/git/git/security/advisories/GHSA-j342-m5hw-rr3v
Third Party Advisory
-
http://seclists.org/fulldisclosure/2022/Nov/1
Mailing List;Third Party Advisory
Products affected by CVE-2022-29187
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
- cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*
- cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*
- cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*
- cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*
- cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*
- cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*
- cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*
- cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*