First published: Fri Apr 08 2022(Updated: )
A vulnerability was found in Git. This flaw occurs due to Git not checking the ownership of directories in a local multi-user system when running commands specified in the local repository configuration. This allows the owner of the repository to cause arbitrary commands to be executed by other users who access the repository.
Credit: 俞晨东 security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/git | <2.30.3 | 2.30.3 |
redhat/git | <2.31.2 | 2.31.2 |
redhat/git | <2.32.1 | 2.32.1 |
redhat/git | <2.33.2 | 2.33.2 |
redhat/git | <2.34.2 | 2.34.2 |
redhat/git | <2.35.2 | 2.35.2 |
redhat/and git | <2.36.0 | 2.36.0 |
redhat/git | <0:2.39.1-1.el8 | 0:2.39.1-1.el8 |
redhat/git | <0:2.39.1-1.el9 | 0:2.39.1-1.el9 |
All of | ||
<2.35.2 | ||
=34 | ||
=35 | ||
=36 | ||
=37 | ||
<13.4 | ||
=10.0 | ||
Git-scm Git | <2.35.2 | |
Microsoft Windows | ||
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Apple Xcode | <13.4 | |
Debian Debian Linux | =10.0 | |
Apple Xcode | <13.4 | 13.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24765 is a logic issue in Git that has been addressed with improved state management.
The vulnerability affects users working on multi-user machines where untrusted parties have write access to the same hard disk.
Untrusted parties could create the folder `C:\.git` on the affected machine, which would be picked up by Git operations.
CVE-2022-24765 has a severity rating of 7.8 (High).
The vulnerability can be fixed by updating Git to version 2.30.3 or above.