<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2022-0005</id>
    <title>An update for git is now available for HCE 1.1</title>
    <severity>Important</severity>
    <release>HCE 1.1</release>
    <issued date="2022-10-18 09:08:02"/>
    <updated date="2022-10-18 09:08:02"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-40330" id="CVE-2021-40330" title="CVE-2021-40330 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-14867" id="CVE-2017-14867" title="CVE-2017-14867 Base Score: 8.8 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

git_connect_git in connect.c in Git before 2.30.1 allows a repository path to contain a newline character, which may result in unexpected cross-protocol requests, as demonstrated by the git://localhost:1234/%0d%0a%0d%0aGET%20/%20HTTP/1.1 substring. (CVE-2021-40330)

Git before 2.10.5, 2.11.x before 2.11.4, 2.12.x before 2.12.5, 2.13.x before 2.13.6, and 2.14.x before 2.14.2 uses unsafe Perl scripts to support subcommands such as cvsserver, which allows attackers to execute arbitrary OS commands via shell metacharacters in a module name. The vulnerable code is reachable via git-shell even without CVS support. (CVE-2017-14867)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="git">
        <name>HCE 1.1</name>
        <package arch="x86_64" name="git" version="1.8.3.1" release="24.hce1c">
          <filename>git-1.8.3.1-24.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="perl-Git" version="1.8.3.1" release="24.hce1c">
          <filename>perl-Git-1.8.3.1-24.hce1c.noarch.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
