This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU23492
Risk: High
CVSSv3.1:
CVE-ID: CVE-2019-1352
CWE-ID:
CWE-20 - Improper Input Validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insufficient validation of user-supplied input within the Git for Visual Studio. A remote attacker can convince the user to clone a malicious repo and execute arbitrary code on the target system.
MitigationUpdate the affected package libgit2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP2-LTSS
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3 - 15.4
libgit2-devel: before 0.26.8-150000.3.15.1
libgit2-debugsource: before 0.26.8-150000.3.15.1
libgit2-26-32bit-debuginfo: before 0.26.8-150000.3.15.1
libgit2-26-32bit: before 0.26.8-150000.3.15.1
libgit2-26-debuginfo: before 0.26.8-150000.3.15.1
libgit2-26: before 0.26.8-150000.3.15.1
http://www.suse.com/support/update/announcement/2022/suse-su-20223495-1/
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU62258
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-24765
CWE-ID:
CWE-426 - Untrusted Search Path
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application uses by default the C:\.git
folder. A local user with ability to write files into the said directory can place a malicious file into it and execute it with elevated privileges.
Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash.
MitigationUpdate the affected package libgit2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP2-LTSS
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3 - 15.4
libgit2-devel: before 0.26.8-150000.3.15.1
libgit2-debugsource: before 0.26.8-150000.3.15.1
libgit2-26-32bit-debuginfo: before 0.26.8-150000.3.15.1
libgit2-26-32bit: before 0.26.8-150000.3.15.1
libgit2-26-debuginfo: before 0.26.8-150000.3.15.1
libgit2-26: before 0.26.8-150000.3.15.1
http://www.suse.com/support/update/announcement/2022/suse-su-20223495-1/
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU65287
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-29187
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions. A remote user can bypass implemented security restrictions and privilege escalation on the system when navigating as root into a shared tmp directory owned by the victim, but where an attacker can create a git repository.
MitigationUpdate the affected package libgit2 to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 6 - 7.1
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15-SP2
SUSE Linux Enterprise Server: 15-LTSS - 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing: 15-ESPOS - 15-SP2-LTSS
SUSE CaaS Platform: 4.0
openSUSE Leap: 15.3 - 15.4
libgit2-devel: before 0.26.8-150000.3.15.1
libgit2-debugsource: before 0.26.8-150000.3.15.1
libgit2-26-32bit-debuginfo: before 0.26.8-150000.3.15.1
libgit2-26-32bit: before 0.26.8-150000.3.15.1
libgit2-26-debuginfo: before 0.26.8-150000.3.15.1
libgit2-26: before 0.26.8-150000.3.15.1
http://www.suse.com/support/update/announcement/2022/suse-su-20223495-1/
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?