<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libgit2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:1570-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-03-24T12:11:55Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-03-24T12:11:55Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-03-24T12:11:55Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libgit2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libgit2 fixes the following issues:

- CVE-2023-22742: Fixed SSH keys verification failure (bsc#1207364).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2023-1570,openSUSE-SLE-15.4-2023-1570</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20231570-1/</URL>
      <Description>Link for SUSE-SU-2023:1570-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2023-March/014158.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:1570-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1207364</URL>
      <Description>SUSE Bug 1207364</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-22742/</URL>
      <Description>SUSE CVE CVE-2023-22742 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.4">
      <Branch Type="Product Name" Name="openSUSE Leap 15.4">
        <FullProductName ProductID="openSUSE Leap 15.4" CPE="cpe:/o:opensuse:leap:15.4">openSUSE Leap 15.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libgit2-26-0.26.8-150000.3.18.1">
      <FullProductName ProductID="libgit2-26-0.26.8-150000.3.18.1">libgit2-26-0.26.8-150000.3.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgit2-26-32bit-0.26.8-150000.3.18.1">
      <FullProductName ProductID="libgit2-26-32bit-0.26.8-150000.3.18.1">libgit2-26-32bit-0.26.8-150000.3.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgit2-26-64bit-0.26.8-150000.3.18.1">
      <FullProductName ProductID="libgit2-26-64bit-0.26.8-150000.3.18.1">libgit2-26-64bit-0.26.8-150000.3.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgit2-devel-0.26.8-150000.3.18.1">
      <FullProductName ProductID="libgit2-devel-0.26.8-150000.3.18.1">libgit2-devel-0.26.8-150000.3.18.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libgit2-26-0.26.8-150000.3.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:libgit2-26-0.26.8-150000.3.18.1">libgit2-26-0.26.8-150000.3.18.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgit2-26-32bit-0.26.8-150000.3.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:libgit2-26-32bit-0.26.8-150000.3.18.1">libgit2-26-32bit-0.26.8-150000.3.18.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libgit2 is a cross-platform, linkable library implementation of Git. When using an SSH remote with the optional libssh2 backend, libgit2 does not perform certificate checking by default. Prior versions of libgit2 require the caller to set the `certificate_check` field of libgit2's `git_remote_callbacks` structure - if a certificate check callback is not set, libgit2 does not perform any certificate checking. This means that by default - without configuring a certificate check callback, clients will not perform validation on the server SSH keys and may be subject to a man-in-the-middle attack. Users are encouraged to upgrade to v1.4.5 or v1.5.1. Users unable to upgrade should ensure that all relevant certificates are manually checked.</Note>
    </Notes>
    <CVE>CVE-2023-22742</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.4:libgit2-26-0.26.8-150000.3.18.1</ProductID>
        <ProductID>openSUSE Leap 15.4:libgit2-26-32bit-0.26.8-150000.3.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20231570-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-22742.html</URL>
        <Description>CVE-2023-22742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207364</URL>
        <Description>SUSE Bug 1207364</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
