MGASA-2022-0396

Source
https://advisories.mageia.org/MGASA-2022-0396.html
Import Source
https://advisories.mageia.org/MGASA-2022-0396.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0396
Related
Published
2022-10-28T06:54:08Z
Modified
2022-10-28T05:54:50Z
Summary
Updated git packages fix security vulnerability
Details

CVE-2022-39253: A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. CVE-2022-39260: Allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap writes. CVE-2022-29187: privilege escalation

References
Credits

Affected packages

Mageia:8 / git

Package

Name
git
Purl
pkg:rpm/mageia/git?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.30.6-1.mga8

Ecosystem specific

{
    "section": "core"
}