<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for git</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:0123-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-01-29T05:11:28Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-01-29T05:11:28Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-01-29T05:11:28Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for git</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for git fixes the following issues:

Security issues fixed:

- CVE-2019-1349: Fixed issue on Windows, when submodules are cloned recursively, under certain circumstances Git could be fooled into using the same Git directory twice (bsc#1158787).
- CVE-2019-19604: Fixed a recursive clone followed by a submodule update could execute code contained within the repository without the user explicitly having asked for that (bsc#1158795).
- CVE-2019-1387: Fixed recursive clones that are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones (bsc#1158793).
- CVE-2019-1354: Fixed issue on Windows that refuses to write tracked files with filenames that contain backslashes (bsc#1158792).
- CVE-2019-1353: Fixed issue when run in the Windows Subsystem for Linux while accessing a working directory on a regular Windows drive, none of the NTFS protections were active (bsc#1158791).
- CVE-2019-1352: Fixed issue on Windows was unaware of NTFS Alternate Data Streams (bsc#1158790).
- CVE-2019-1351: Fixed issue on Windows mistakes drive letters outside of the US-English alphabet as relative paths (bsc#1158789).
- CVE-2019-1350: Fixed incorrect quoting of command-line arguments allowed remote code execution during a recursive clone in conjunction with SSH URLs (bsc#1158788).
- CVE-2019-1348: Fixed the --export-marks option of fast-import is exposed also via  the in-stream command feature export-marks=... and it allows overwriting arbitrary paths (bsc#1158785).
- Fixes an issue where git send-email failed to authenticate with SMTP server (bsc#1082023)

Bug fixes:

- Add zlib dependency, which used to be provided by openssl-devel, so that package can compile successfully after openssl upgrade to 1.1.1. (bsc#1149792).

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-123</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGTC3VP4MCFQ5HPSFYOHMPVGOI32A7EM/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:0123-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082023</URL>
      <Description>SUSE Bug 1082023</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1149792</URL>
      <Description>SUSE Bug 1149792</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158785</URL>
      <Description>SUSE Bug 1158785</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158787</URL>
      <Description>SUSE Bug 1158787</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158788</URL>
      <Description>SUSE Bug 1158788</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158789</URL>
      <Description>SUSE Bug 1158789</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158790</URL>
      <Description>SUSE Bug 1158790</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158791</URL>
      <Description>SUSE Bug 1158791</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158792</URL>
      <Description>SUSE Bug 1158792</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158793</URL>
      <Description>SUSE Bug 1158793</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158795</URL>
      <Description>SUSE Bug 1158795</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1348/</URL>
      <Description>SUSE CVE CVE-2019-1348 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1349/</URL>
      <Description>SUSE CVE CVE-2019-1349 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1350/</URL>
      <Description>SUSE CVE CVE-2019-1350 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1351/</URL>
      <Description>SUSE CVE CVE-2019-1351 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1352/</URL>
      <Description>SUSE CVE CVE-2019-1352 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1353/</URL>
      <Description>SUSE CVE CVE-2019-1353 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1354/</URL>
      <Description>SUSE CVE CVE-2019-1354 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1387/</URL>
      <Description>SUSE CVE CVE-2019-1387 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19604/</URL>
      <Description>SUSE CVE CVE-2019-19604 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="git-2.16.4-lp151.4.3.1">
      <FullProductName ProductID="git-2.16.4-lp151.4.3.1">git-2.16.4-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="git-arch-2.16.4-lp151.4.3.1">
      <FullProductName ProductID="git-arch-2.16.4-lp151.4.3.1">git-arch-2.16.4-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="git-core-2.16.4-lp151.4.3.1">
      <FullProductName ProductID="git-core-2.16.4-lp151.4.3.1">git-core-2.16.4-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="git-credential-gnome-keyring-2.16.4-lp151.4.3.1">
      <FullProductName ProductID="git-credential-gnome-keyring-2.16.4-lp151.4.3.1">git-credential-gnome-keyring-2.16.4-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="git-credential-libsecret-2.16.4-lp151.4.3.1">
      <FullProductName ProductID="git-credential-libsecret-2.16.4-lp151.4.3.1">git-credential-libsecret-2.16.4-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="git-cvs-2.16.4-lp151.4.3.1">
      <FullProductName ProductID="git-cvs-2.16.4-lp151.4.3.1">git-cvs-2.16.4-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="git-daemon-2.16.4-lp151.4.3.1">
      <FullProductName ProductID="git-daemon-2.16.4-lp151.4.3.1">git-daemon-2.16.4-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="git-doc-2.16.4-lp151.4.3.1">
      <FullProductName ProductID="git-doc-2.16.4-lp151.4.3.1">git-doc-2.16.4-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="git-email-2.16.4-lp151.4.3.1">
      <FullProductName ProductID="git-email-2.16.4-lp151.4.3.1">git-email-2.16.4-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="git-gui-2.16.4-lp151.4.3.1">
      <FullProductName ProductID="git-gui-2.16.4-lp151.4.3.1">git-gui-2.16.4-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="git-p4-2.16.4-lp151.4.3.1">
      <FullProductName ProductID="git-p4-2.16.4-lp151.4.3.1">git-p4-2.16.4-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="git-svn-2.16.4-lp151.4.3.1">
      <FullProductName ProductID="git-svn-2.16.4-lp151.4.3.1">git-svn-2.16.4-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="git-web-2.16.4-lp151.4.3.1">
      <FullProductName ProductID="git-web-2.16.4-lp151.4.3.1">git-web-2.16.4-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gitk-2.16.4-lp151.4.3.1">
      <FullProductName ProductID="gitk-2.16.4-lp151.4.3.1">gitk-2.16.4-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-Authen-SASL-2.16-lp151.3.3.1">
      <FullProductName ProductID="perl-Authen-SASL-2.16-lp151.3.3.1">perl-Authen-SASL-2.16-lp151.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-Net-SMTP-SSL-1.04-lp151.3.3.1">
      <FullProductName ProductID="perl-Net-SMTP-SSL-1.04-lp151.3.3.1">perl-Net-SMTP-SSL-1.04-lp151.3.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="git-2.16.4-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:git-2.16.4-lp151.4.3.1">git-2.16.4-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="git-arch-2.16.4-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:git-arch-2.16.4-lp151.4.3.1">git-arch-2.16.4-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="git-core-2.16.4-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:git-core-2.16.4-lp151.4.3.1">git-core-2.16.4-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="git-credential-gnome-keyring-2.16.4-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:git-credential-gnome-keyring-2.16.4-lp151.4.3.1">git-credential-gnome-keyring-2.16.4-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="git-credential-libsecret-2.16.4-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:git-credential-libsecret-2.16.4-lp151.4.3.1">git-credential-libsecret-2.16.4-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="git-cvs-2.16.4-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:git-cvs-2.16.4-lp151.4.3.1">git-cvs-2.16.4-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="git-daemon-2.16.4-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:git-daemon-2.16.4-lp151.4.3.1">git-daemon-2.16.4-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="git-doc-2.16.4-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:git-doc-2.16.4-lp151.4.3.1">git-doc-2.16.4-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="git-email-2.16.4-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:git-email-2.16.4-lp151.4.3.1">git-email-2.16.4-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="git-gui-2.16.4-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:git-gui-2.16.4-lp151.4.3.1">git-gui-2.16.4-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="git-p4-2.16.4-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:git-p4-2.16.4-lp151.4.3.1">git-p4-2.16.4-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="git-svn-2.16.4-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:git-svn-2.16.4-lp151.4.3.1">git-svn-2.16.4-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="git-web-2.16.4-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:git-web-2.16.4-lp151.4.3.1">git-web-2.16.4-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="gitk-2.16.4-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:gitk-2.16.4-lp151.4.3.1">gitk-2.16.4-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-Authen-SASL-2.16-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:perl-Authen-SASL-2.16-lp151.3.3.1">perl-Authen-SASL-2.16-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-Net-SMTP-SSL-1.04-lp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:perl-Net-SMTP-SSL-1.04-lp151.3.3.1">perl-Net-SMTP-SSL-1.04-lp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. The --export-marks option of git fast-import is exposed also via the in-stream command feature export-marks=... and it allows overwriting arbitrary paths.</Note>
    </Notes>
    <CVE>CVE-2019-1348</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:git-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-arch-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-core-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-gnome-keyring-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-libsecret-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-cvs-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-daemon-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-doc-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-email-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-gui-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-p4-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-svn-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-web-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:gitk-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Authen-SASL-2.16-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Net-SMTP-SSL-1.04-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGTC3VP4MCFQ5HPSFYOHMPVGOI32A7EM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1348.html</URL>
        <Description>CVE-2019-1348</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158785</URL>
        <Description>SUSE Bug 1158785</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1350, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387.</Note>
    </Notes>
    <CVE>CVE-2019-1349</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:git-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-arch-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-core-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-gnome-keyring-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-libsecret-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-cvs-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-daemon-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-doc-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-email-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-gui-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-p4-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-svn-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-web-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:gitk-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Authen-SASL-2.16-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Net-SMTP-SSL-1.04-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGTC3VP4MCFQ5HPSFYOHMPVGOI32A7EM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1349.html</URL>
        <Description>CVE-2019-1349</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158785</URL>
        <Description>SUSE Bug 1158785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158787</URL>
        <Description>SUSE Bug 1158787</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387.</Note>
    </Notes>
    <CVE>CVE-2019-1350</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:git-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-arch-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-core-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-gnome-keyring-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-libsecret-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-cvs-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-daemon-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-doc-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-email-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-gui-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-p4-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-svn-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-web-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:gitk-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Authen-SASL-2.16-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Net-SMTP-SSL-1.04-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGTC3VP4MCFQ5HPSFYOHMPVGOI32A7EM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1350.html</URL>
        <Description>CVE-2019-1350</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158785</URL>
        <Description>SUSE Bug 1158785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158788</URL>
        <Description>SUSE Bug 1158788</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A tampering vulnerability exists when Git for Visual Studio improperly handles virtual drive paths, aka 'Git for Visual Studio Tampering Vulnerability'.</Note>
    </Notes>
    <CVE>CVE-2019-1351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:git-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-arch-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-core-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-gnome-keyring-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-libsecret-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-cvs-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-daemon-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-doc-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-email-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-gui-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-p4-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-svn-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-web-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:gitk-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Authen-SASL-2.16-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Net-SMTP-SSL-1.04-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGTC3VP4MCFQ5HPSFYOHMPVGOI32A7EM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1351.html</URL>
        <Description>CVE-2019-1351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158785</URL>
        <Description>SUSE Bug 1158785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158789</URL>
        <Description>SUSE Bug 1158789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1354, CVE-2019-1387.</Note>
    </Notes>
    <CVE>CVE-2019-1352</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:git-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-arch-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-core-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-gnome-keyring-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-libsecret-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-cvs-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-daemon-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-doc-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-email-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-gui-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-p4-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-svn-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-web-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:gitk-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Authen-SASL-2.16-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Net-SMTP-SSL-1.04-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGTC3VP4MCFQ5HPSFYOHMPVGOI32A7EM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1352.html</URL>
        <Description>CVE-2019-1352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158785</URL>
        <Description>SUSE Bug 1158785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158787</URL>
        <Description>SUSE Bug 1158787</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158790</URL>
        <Description>SUSE Bug 1158790</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. When running Git in the Windows Subsystem for Linux (also known as "WSL") while accessing a working directory on a regular Windows drive, none of the NTFS protections were active.</Note>
    </Notes>
    <CVE>CVE-2019-1353</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:git-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-arch-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-core-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-gnome-keyring-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-libsecret-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-cvs-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-daemon-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-doc-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-email-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-gui-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-p4-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-svn-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-web-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:gitk-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Authen-SASL-2.16-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Net-SMTP-SSL-1.04-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGTC3VP4MCFQ5HPSFYOHMPVGOI32A7EM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1353.html</URL>
        <Description>CVE-2019-1353</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158785</URL>
        <Description>SUSE Bug 1158785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158791</URL>
        <Description>SUSE Bug 1158791</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1352, CVE-2019-1387.</Note>
    </Notes>
    <CVE>CVE-2019-1354</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:git-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-arch-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-core-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-gnome-keyring-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-libsecret-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-cvs-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-daemon-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-doc-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-email-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-gui-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-p4-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-svn-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-web-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:gitk-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Authen-SASL-2.16-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Net-SMTP-SSL-1.04-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGTC3VP4MCFQ5HPSFYOHMPVGOI32A7EM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1354.html</URL>
        <Description>CVE-2019-1354</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158785</URL>
        <Description>SUSE Bug 1158785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158792</URL>
        <Description>SUSE Bug 1158792</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. Recursive clones are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones.</Note>
    </Notes>
    <CVE>CVE-2019-1387</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:git-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-arch-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-core-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-gnome-keyring-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-libsecret-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-cvs-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-daemon-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-doc-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-email-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-gui-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-p4-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-svn-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-web-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:gitk-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Authen-SASL-2.16-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Net-SMTP-SSL-1.04-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGTC3VP4MCFQ5HPSFYOHMPVGOI32A7EM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1387.html</URL>
        <Description>CVE-2019-1387</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158785</URL>
        <Description>SUSE Bug 1158785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158793</URL>
        <Description>SUSE Bug 1158793</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository.</Note>
    </Notes>
    <CVE>CVE-2019-19604</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:git-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-arch-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-core-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-gnome-keyring-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-credential-libsecret-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-cvs-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-daemon-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-doc-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-email-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-gui-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-p4-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-svn-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:git-web-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:gitk-2.16.4-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Authen-SASL-2.16-lp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:perl-Net-SMTP-SSL-1.04-lp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGTC3VP4MCFQ5HPSFYOHMPVGOI32A7EM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19604.html</URL>
        <Description>CVE-2019-19604</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158785</URL>
        <Description>SUSE Bug 1158785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158795</URL>
        <Description>SUSE Bug 1158795</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
