Filtered by vendor Cygwin
Subscribe
Total
3 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-29468 | 1 Cygwin | 1 Git | 2021-05-11 | 6.8 MEDIUM | 8.8 HIGH |
Cygwin Git is a patch set for the git command line tool for the cygwin environment. A specially crafted repository that contains symbolic links as well as files with backslash characters in the file name may cause just-checked out code to be executed while checking out a repository using Git on Cygwin. The problem will be patched in the Cygwin Git v2.31.1-2 release. At time of writing, the vulnerability is present in the upstream Git source code; any Cygwin user who compiles Git for themselves from upstream sources should manually apply a patch to mitigate the vulnerability. As mitigation users should not clone or pull from repositories from untrusted sources. CVE-2019-1354 was an equivalent vulnerability in Git for Visual Studio. | |||||
CVE-2017-7523 | 1 Cygwin | 1 Cygwin | 2019-10-09 | 5.0 MEDIUM | 7.5 HIGH |
Cygwin versions 1.7.2 up to and including 1.8.0 are vulnerable to buffer overflow vulnerability in wcsxfrm/wcsxfrm_l functions resulting into denial-of-service by crashing the process or potential hijack of the process running with administrative privileges triggered by specially crafted input string. | |||||
CVE-2016-3067 | 1 Cygwin | 1 Cygwin | 2017-04-27 | 7.5 HIGH | 9.8 CRITICAL |
Cygwin before 2.5.0 does not properly handle updating permissions when changing users, which allows attackers to gain privileges. |