openSUSE Security Update : git (openSUSE-2020-123)

critical Nessus Plugin ID 133344

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for git fixes the following issues :

Security issues fixed :

- CVE-2019-1349: Fixed issue on Windows, when submodules are cloned recursively, under certain circumstances Git could be fooled into using the same Git directory twice (bsc#1158787).

- CVE-2019-19604: Fixed a recursive clone followed by a submodule update could execute code contained within the repository without the user explicitly having asked for that (bsc#1158795).

- CVE-2019-1387: Fixed recursive clones that are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones (bsc#1158793).

- CVE-2019-1354: Fixed issue on Windows that refuses to write tracked files with filenames that contain backslashes (bsc#1158792).

- CVE-2019-1353: Fixed issue when run in the Windows Subsystem for Linux while accessing a working directory on a regular Windows drive, none of the NTFS protections were active (bsc#1158791).

- CVE-2019-1352: Fixed issue on Windows was unaware of NTFS Alternate Data Streams (bsc#1158790).

- CVE-2019-1351: Fixed issue on Windows mistakes drive letters outside of the US-English alphabet as relative paths (bsc#1158789).

- CVE-2019-1350: Fixed incorrect quoting of command-line arguments allowed remote code execution during a recursive clone in conjunction with SSH URLs (bsc#1158788).

- CVE-2019-1348: Fixed the --export-marks option of fast-import is exposed also via the in-stream command feature export-marks=... and it allows overwriting arbitrary paths (bsc#1158785).

- Fixes an issue where git send-email failed to authenticate with SMTP server (bsc#1082023)

Bug fixes :

- Add zlib dependency, which used to be provided by openssl-devel, so that package can compile successfully after openssl upgrade to 1.1.1. (bsc#1149792).

This update was imported from the SUSE:SLE-15:Update update project.

Solution

Update the affected git packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1082023

https://bugzilla.opensuse.org/show_bug.cgi?id=1149792

https://bugzilla.opensuse.org/show_bug.cgi?id=1158785

https://bugzilla.opensuse.org/show_bug.cgi?id=1158787

https://bugzilla.opensuse.org/show_bug.cgi?id=1158788

https://bugzilla.opensuse.org/show_bug.cgi?id=1158789

https://bugzilla.opensuse.org/show_bug.cgi?id=1158790

https://bugzilla.opensuse.org/show_bug.cgi?id=1158791

https://bugzilla.opensuse.org/show_bug.cgi?id=1158792

https://bugzilla.opensuse.org/show_bug.cgi?id=1158793

https://bugzilla.opensuse.org/show_bug.cgi?id=1158795

Plugin Details

Severity: Critical

ID: 133344

File Name: openSUSE-2020-123.nasl

Version: 1.4

Type: local

Agent: unix

Published: 1/30/2020

Updated: 3/28/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2019-19604

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2019-1353

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:git, p-cpe:/a:novell:opensuse:git-arch, p-cpe:/a:novell:opensuse:git-core, p-cpe:/a:novell:opensuse:git-core-debuginfo, p-cpe:/a:novell:opensuse:git-credential-gnome-keyring, p-cpe:/a:novell:opensuse:git-credential-gnome-keyring-debuginfo, p-cpe:/a:novell:opensuse:git-credential-libsecret, p-cpe:/a:novell:opensuse:git-credential-libsecret-debuginfo, p-cpe:/a:novell:opensuse:git-cvs, p-cpe:/a:novell:opensuse:git-daemon, p-cpe:/a:novell:opensuse:git-daemon-debuginfo, p-cpe:/a:novell:opensuse:git-debuginfo, p-cpe:/a:novell:opensuse:git-debugsource, p-cpe:/a:novell:opensuse:git-email, p-cpe:/a:novell:opensuse:git-gui, p-cpe:/a:novell:opensuse:git-p4, p-cpe:/a:novell:opensuse:git-svn, p-cpe:/a:novell:opensuse:git-svn-debuginfo, p-cpe:/a:novell:opensuse:git-web, p-cpe:/a:novell:opensuse:gitk, p-cpe:/a:novell:opensuse:perl-authen-sasl, p-cpe:/a:novell:opensuse:perl-net-smtp-ssl, cpe:/o:novell:opensuse:15.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/29/2020

Vulnerability Publication Date: 12/11/2019

Reference Information

CVE: CVE-2019-1348, CVE-2019-1349, CVE-2019-1350, CVE-2019-1351, CVE-2019-1352, CVE-2019-1353, CVE-2019-1354, CVE-2019-1387, CVE-2019-19604