Cyber Security News

Critical SUSE Linux Distro Injection Vulnerability Allow Attackers Exploits “go-git” Library

A significant security vulnerability, designated CVE-2025-21613, has been discovered in the go-git library, used for Git version control in pure Go applications.

This issue affects all versions before 5.13.0 and is characterized by an argument injection vulnerability, enabling potential attackers to modify git-upload-pack flags when utilizing the file transport protocol.

This protocol is particularly vulnerable since it interacts with Git binaries, making it an attractive target for exploitation.

The vulnerability has been rated with important severity based on its exploitability and impact.

The affected Amazon SSM Agent has been updated to version 3.3.1611.0, which resolves the vulnerability. The update ensures secure handling of inputs, mitigating the risk of exploitation.

The CVSS scores indicate a high likelihood of exploitation with severe consequences for confidentiality, integrity, and availability.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Affected SUSE Products

The following table summarizes the SUSE products impacted by this vulnerability, along with recommendations for mitigation:

ProductVersionStatusNotes
SUSE Linux Enterprise Server 12All versionsAffectedUpgrade to 5.13.0 or later.
SUSE Linux Enterprise High Performance Computing 12All versionsAffectedUpgrade to 5.13.0 or later.
openSUSE Leap 15.6All versionsAffectedUpgrade to 5.13.0 or later.
SUSE Linux Enterprise Module for Public Cloud 12All versionsAffectedUpgrade recommended.

To safeguard systems, users are advised to upgrade to go-git version 5.13.0 or later to eliminate the vulnerability.

Several SUSE security advisories have been issued regarding this vulnerability:

Advisory IDPublication DateDescription
SUSE-SU-2025:0060-1January 10, 2025Initial patch release.
SUSE-SU-2025:0191-1January 20, 2025Additional updates.
openSUSE-SU-2025:14624-1January 10, 2025Patch for openSUSE Leap.
openSUSE-SU-2025:14654-1January 17, 2025Update for affected packages.
openSUSE-SU-2025:14658-1January 18, 2025Further security enhancements.

The discovery of CVE-2025-21613 in the go-git library presents significant risks to a variety of SUSE products and applications.

Users should prioritize immediate updates to safeguard against potential exploitation.

Ongoing monitoring of security advisories and updates is crucial for maintaining system integrity and security in the face of evolving threats.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887)

A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical vulnerability…

4 hours ago

Brave Browser Vulnerability Allows Malicious Website Appears as Trusted One

A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to masquerade…

8 hours ago

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message circulating…

9 hours ago

Gootloader Malware Employs Blackhat SEO Techniques To Attack Victims

The Gootloader malware family employs sophisticated social engineering tactics to infiltrate computers. By leveraging compromised…

9 hours ago

Apache CXF Vulnerability Triggers DoS Attack

Colm O hEigeartaigh announced a critical vulnerability affecting various versions of Apache CXF, a widely-used…

10 hours ago

Microsoft Rolls Out New Administrator Protection Feature Under Windows Security

Microsoft has announced the release of Windows 11 Insider Preview Build 27774 to the Canary…

10 hours ago