{"affected":[{"ecosystem_specific":{"binaries":[{"git-core":"2.16.4-3.3.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15","name":"git","purl":"pkg:rpm/suse/git&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.16.4-3.3.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"git":"2.16.4-3.3.2","git-arch":"2.16.4-3.3.2","git-cvs":"2.16.4-3.3.2","git-daemon":"2.16.4-3.3.2","git-doc":"2.16.4-3.3.2","git-email":"2.16.4-3.3.2","git-gui":"2.16.4-3.3.2","git-svn":"2.16.4-3.3.2","git-web":"2.16.4-3.3.2","gitk":"2.16.4-3.3.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15","name":"git","purl":"pkg:rpm/suse/git&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.16.4-3.3.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for git to version 2.16.4 fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2018-11233: Path sanity-checks on NTFS allowed attackers to read arbitrary memory (bsc#1095218)\n- CVE-2018-11235: Arbitrary code execution when recursively cloning a malicious repository (bsc#1095219)\n","id":"SUSE-SU-2018:1872-1","modified":"2018-07-03T16:09:37Z","published":"2018-07-03T16:09:37Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20181872-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1095218"},{"type":"REPORT","url":"https://bugzilla.suse.com/1095219"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-11233"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-11235"}],"related":["CVE-2018-11233","CVE-2018-11235"],"summary":"Security update for git","upstream":["CVE-2018-11233","CVE-2018-11235"]}