An update for git is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2021-1105
Final
1.0
1.0
2021-04-07
Initial
2021-04-07
2021-04-07
openEuler SA Tool V1.0
2021-04-07
git security update
An update for git is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1.
Git is a free and open source distributed version control system designed to handle everything from small to very large projects with speed and efficiency. Git is easy to learn and has a tiny footprint with lightning fast performance. It outclasses SCM tools like Subversion, CVS, Perforce, and ClearCase with features like cheap local branching, convenient staging areas, and multiple workflows.
Security Fix(es):
Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and macOS). Note that clean/smudge filters have to be configured for that. Git for Windows configures Git LFS by default, and is therefore vulnerable. The problem has been patched in the versions published on Tuesday, March 9th, 2021. As a workaound, if symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks False`), the described attack won't work. Likewise, if no clean/smudge filters such as Git LFS are configured globally (i.e. _before_ cloning), the attack is foiled. As always, it is best to avoid cloning repositories from untrusted sources. The earliest impacted version is 2.14.2. The fix versions are: 2.30.1, 2.29.3, 2.28.1, 2.27.1, 2.26.3, 2.25.5, 2.24.4, 2.23.4, 2.22.5, 2.21.4, 2.20.5, 2.19.6, 2.18.5, 2.17.62.17.6.(CVE-2021-21300)
An update for git is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
git
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1105
https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-21300
https://nvd.nist.gov/vuln/detail/CVE-2021-21300
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
git-debuginfo-2.27.0-3.oe1.aarch64.rpm
git-debugsource-2.27.0-3.oe1.aarch64.rpm
git-daemon-2.27.0-3.oe1.aarch64.rpm
git-2.27.0-3.oe1.aarch64.rpm
git-daemon-2.27.0-3.oe1.aarch64.rpm
git-2.27.0-3.oe1.aarch64.rpm
git-debuginfo-2.27.0-3.oe1.aarch64.rpm
git-debugsource-2.27.0-3.oe1.aarch64.rpm
git-email-2.27.0-3.oe1.noarch.rpm
perl-Git-SVN-2.27.0-3.oe1.noarch.rpm
git-svn-2.27.0-3.oe1.noarch.rpm
gitk-2.27.0-3.oe1.noarch.rpm
git-web-2.27.0-3.oe1.noarch.rpm
git-gui-2.27.0-3.oe1.noarch.rpm
git-help-2.27.0-3.oe1.noarch.rpm
perl-Git-2.27.0-3.oe1.noarch.rpm
git-gui-2.27.0-3.oe1.noarch.rpm
git-svn-2.27.0-3.oe1.noarch.rpm
gitk-2.27.0-3.oe1.noarch.rpm
git-email-2.27.0-3.oe1.noarch.rpm
git-help-2.27.0-3.oe1.noarch.rpm
perl-Git-SVN-2.27.0-3.oe1.noarch.rpm
git-web-2.27.0-3.oe1.noarch.rpm
perl-Git-2.27.0-3.oe1.noarch.rpm
git-2.27.0-3.oe1.src.rpm
git-2.27.0-3.oe1.src.rpm
git-2.27.0-3.oe1.x86_64.rpm
git-daemon-2.27.0-3.oe1.x86_64.rpm
git-debugsource-2.27.0-3.oe1.x86_64.rpm
git-debuginfo-2.27.0-3.oe1.x86_64.rpm
git-debuginfo-2.27.0-3.oe1.x86_64.rpm
git-2.27.0-3.oe1.x86_64.rpm
git-daemon-2.27.0-3.oe1.x86_64.rpm
git-debugsource-2.27.0-3.oe1.x86_64.rpm
Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and macOS). Note that clean/smudge filters have to be configured for that. Git for Windows configures Git LFS by default, and is therefore vulnerable. The problem has been patched in the versions published on Tuesday, March 9th, 2021. As a workaound, if symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. Likewise, if no clean/smudge filters such as Git LFS are configured globally (i.e. _before_ cloning), the attack is foiled. As always, it is best to avoid cloning repositories from untrusted sources. The earliest impacted version is 2.14.2. The fix versions are: 2.30.1, 2.29.3, 2.28.1, 2.27.1, 2.26.3, 2.25.5, 2.24.4, 2.23.4, 2.22.5, 2.21.4, 2.20.5, 2.19.6, 2.18.5, 2.17.62.17.6.
2021-04-07
CVE-2021-21300
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
High
7.5
AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
git security update
2021-04-07
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1105