From d1cf45ca709d5d293cb79c26d1ec2ea5d6fa9bd5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 19 Oct 2022 12:00:54 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/39xxx/CVE-2022-39253.json | 2 +- 2022/40xxx/CVE-2022-40687.json | 18 ++++++++++++++++++ 2022/42xxx/CVE-2022-42460.json | 18 ++++++++++++++++++ 2022/42xxx/CVE-2022-42462.json | 18 ++++++++++++++++++ 2022/42xxx/CVE-2022-42698.json | 18 ++++++++++++++++++ 2022/42xxx/CVE-2022-42699.json | 18 ++++++++++++++++++ 2022/43xxx/CVE-2022-43461.json | 18 ++++++++++++++++++ 2022/43xxx/CVE-2022-43462.json | 18 ++++++++++++++++++ 2022/43xxx/CVE-2022-43492.json | 18 ++++++++++++++++++ 9 files changed, 145 insertions(+), 1 deletion(-) create mode 100644 2022/40xxx/CVE-2022-40687.json create mode 100644 2022/42xxx/CVE-2022-42460.json create mode 100644 2022/42xxx/CVE-2022-42462.json create mode 100644 2022/42xxx/CVE-2022-42698.json create mode 100644 2022/42xxx/CVE-2022-42699.json create mode 100644 2022/43xxx/CVE-2022-43461.json create mode 100644 2022/43xxx/CVE-2022-43462.json create mode 100644 2022/43xxx/CVE-2022-43492.json diff --git a/2022/39xxx/CVE-2022-39253.json b/2022/39xxx/CVE-2022-39253.json index bb1af2084ee..43d6079e469 100644 --- a/2022/39xxx/CVE-2022-39253.json +++ b/2022/39xxx/CVE-2022-39253.json @@ -56,7 +56,7 @@ "description_data": [ { "lang": "eng", - "value": "Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`. " + "value": "Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`." } ] }, diff --git a/2022/40xxx/CVE-2022-40687.json b/2022/40xxx/CVE-2022-40687.json new file mode 100644 index 00000000000..14a9cfa5825 --- /dev/null +++ b/2022/40xxx/CVE-2022-40687.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-40687", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/42xxx/CVE-2022-42460.json b/2022/42xxx/CVE-2022-42460.json new file mode 100644 index 00000000000..b869656dca5 --- /dev/null +++ b/2022/42xxx/CVE-2022-42460.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-42460", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/42xxx/CVE-2022-42462.json b/2022/42xxx/CVE-2022-42462.json new file mode 100644 index 00000000000..763bc241e57 --- /dev/null +++ b/2022/42xxx/CVE-2022-42462.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-42462", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/42xxx/CVE-2022-42698.json b/2022/42xxx/CVE-2022-42698.json new file mode 100644 index 00000000000..7a2ada0ed93 --- /dev/null +++ b/2022/42xxx/CVE-2022-42698.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-42698", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/42xxx/CVE-2022-42699.json b/2022/42xxx/CVE-2022-42699.json new file mode 100644 index 00000000000..5c6f9ee8415 --- /dev/null +++ b/2022/42xxx/CVE-2022-42699.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-42699", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/43xxx/CVE-2022-43461.json b/2022/43xxx/CVE-2022-43461.json new file mode 100644 index 00000000000..f81d6aba481 --- /dev/null +++ b/2022/43xxx/CVE-2022-43461.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-43461", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/43xxx/CVE-2022-43462.json b/2022/43xxx/CVE-2022-43462.json new file mode 100644 index 00000000000..2b7efa44d8b --- /dev/null +++ b/2022/43xxx/CVE-2022-43462.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-43462", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/43xxx/CVE-2022-43492.json b/2022/43xxx/CVE-2022-43492.json new file mode 100644 index 00000000000..543538f0aa7 --- /dev/null +++ b/2022/43xxx/CVE-2022-43492.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-43492", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file