openEuler update for libgit2



Published: 2021-07-27
Risk High
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2020-12278
CVE-2020-12279
CVE-2019-1352
CVE-2019-1353
CWE-ID CWE-706
CWE-20
CWE-276
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
openEuler
Operating systems & Components / Operating system

libgit2-devel
Operating systems & Components / Operating system package or component

libgit2-debugsource
Operating systems & Components / Operating system package or component

libgit2-debuginfo
Operating systems & Components / Operating system package or component

libgit2
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Use of Incorrectly-Resolved Name or Reference

EUVDB-ID: #VU86203

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-12278

CWE-ID: CWE-706 - Use of Incorrectly-Resolved Name or Reference

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to improper handling of equivalent filenames that exist because of NTFS Alternate Data Streams in path.c. A remote attacker can trick the victim into cloning a specially crafted repository and execute arbitrary code on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 20.03 LTS SP2

libgit2-devel: before 0.27.8-5

libgit2-debugsource: before 0.27.8-5

libgit2-debuginfo: before 0.27.8-5

libgit2: before 0.27.8-5

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1282


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Use of Incorrectly-Resolved Name or Reference

EUVDB-ID: #VU86204

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-12279

CWE-ID: CWE-706 - Use of Incorrectly-Resolved Name or Reference

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to improper handling of equivalent filenames that exist because of NTFS short names in checkout.c. A remote attacker can trick the victim into cloning a specially crafted repository and execute arbitrary code on the system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 20.03 LTS SP2

libgit2-devel: before 0.27.8-5

libgit2-debugsource: before 0.27.8-5

libgit2-debuginfo: before 0.27.8-5

libgit2: before 0.27.8-5

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1282


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

EUVDB-ID: #VU23492

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-1352

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insufficient validation of user-supplied input within the Git for Visual Studio. A remote attacker can convince the user to clone a malicious repo and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 20.03 LTS SP2

libgit2-devel: before 0.27.8-5

libgit2-debugsource: before 0.27.8-5

libgit2-debuginfo: before 0.27.8-5

libgit2: before 0.27.8-5

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1282


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Incorrect default permissions

EUVDB-ID: #VU23555

Risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-1353

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists to due none of the NTFS protections are active when accessing a working directory on a regular Windows drive. A local user with access to the system can view contents of files and directories or modify them.

Note: This vulnerability occurs when running Git in the Windows Subsystem for Linux (also known as "WSL").

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 20.03 LTS SP2

libgit2-devel: before 0.27.8-5

libgit2-debugsource: before 0.27.8-5

libgit2-debuginfo: before 0.27.8-5

libgit2: before 0.27.8-5

External links

http://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1282


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###