Lucene search

K
openvasCopyright (C) 2021 Greenbone AGOPENVAS:13614125623114202125551
HistoryJul 30, 2021 - 12:00 a.m.

SUSE: Security Advisory (SUSE-SU-2021:2555-1)

2021-07-3000:00:00
Copyright (C) 2021 Greenbone AG
plugins.openvas.org

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.903 High

EPSS

Percentile

98.8%

The remote host is missing an update for the

# SPDX-FileCopyrightText: 2021 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.1.4.2021.2555.1");
  script_cve_id("CVE-2021-21300");
  script_tag(name:"creation_date", value:"2021-07-30 02:23:55 +0000 (Fri, 30 Jul 2021)");
  script_version("2024-02-02T14:37:50+0000");
  script_tag(name:"last_modification", value:"2024-02-02 14:37:50 +0000 (Fri, 02 Feb 2024)");
  script_tag(name:"cvss_base", value:"5.1");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:H/Au:N/C:P/I:P/A:P");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2021-03-16 16:59:54 +0000 (Tue, 16 Mar 2021)");

  script_name("SUSE: Security Advisory (SUSE-SU-2021:2555-1)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2021 Greenbone AG");
  script_family("SuSE Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/suse_sles", "ssh/login/rpms", re:"ssh/login/release=(SLES15\.0SP3)");

  script_xref(name:"Advisory-ID", value:"SUSE-SU-2021:2555-1");
  script_xref(name:"URL", value:"https://www.suse.com/support/update/announcement/2021/suse-su-20212555-1/");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'git' package(s) announced via the SUSE-SU-2021:2555-1 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"This update for git fixes the following issues:

Update from version 2.26.2 to version 2.31.1 (jsc#SLE-18152)

Security fixes:

CVE-2021-21300: On case-insensitive file systems with support for
 symbolic links, if Git is configured globally to apply delay-capable
 clean/smudge filters (such as Git LFS), Git could run remote code during
 a clone. (bsc#1183026)

Non security changes:

Add `sysusers` file to create `git-daemon` user.

Remove `perl-base` and `openssh-server` dependency on `git-core`and
 provide a `perl-Git` package. (jsc#SLE-17838)

`fsmonitor` bug fixes

Fix `git bisect` to take an annotated tag as a good/bad endpoint

Fix a corner case in `git mv` on case insensitive systems

Require only `openssh-clients` where possible (like Tumbleweed or SUSE
 Linux Enterprise >= 15 SP3). (bsc#1183580)

Drop `rsync` requirement, not necessary anymore.

Use of `pack-redundant` command is discouraged and will trigger a
 warning. The replacement is `repack -d`.

The `--format=%(trailers)` mechanism gets enhanced to make it easier to
 design output for machine consumption.

No longer give message to choose between rebase or merge upon pull if
 the history `fast-forwards`.

The configuration variable `core.abbrev` can be set to `no` to force no
 abbreviation regardless of the hash algorithm

`git rev-parse` can be explicitly told to give output as absolute or
 relative path with the `--path-format=(absolute<pipe>relative)` option.

Bash completion update to make it easier for end-users to add completion
 for their custom `git` subcommands.

`git maintenance` learned to drive scheduled maintenance on platforms
 whose native scheduling methods are not 'cron'.

After expiring a reflog and making a single commit, the reflog for the
 branch would record a single entry that knows both `@{0}` and `@{1}`,
 but we failed to answer 'what commit were we on?', i.e. `@{1}`

`git bundle` learns `--stdin` option to read its refs from the standard
 input. Also, it now does not lose refs when they point at the same
 object.

`git log` learned a new `--diff-merges=` option.

`git ls-files` can and does show multiple entries when the index is
 unmerged, which is a source for confusion unless `-s/-u` option is in
 use. A new option `--deduplicate` has been introduced.

`git worktree list` now annotates worktrees as prunable, shows locked
 and prunable attributes in `--porcelain mode`, and gained a `--verbose`
 option.

`git clone` tries to locally check out the branch pointed at by HEAD of
 the remote repository after it is done, but the protocol did not convey
 the information necessary to do so when copying an empty repository. The
 protocol v2 learned how to do so.

There are other ways than `..` for a single token to denote a `commit
 range', namely `^!` and `^-`, but `git range-diff` did not
 understand them.

The `git range-diff` command learned `--(left<pipe>right)-only` option to
 show ... [Please see the references for more information on the vulnerabilities]");

  script_tag(name:"affected", value:"'git' package(s) on SUSE Linux Enterprise Module for Basesystem 15-SP3, SUSE Linux Enterprise Module for Development Tools 15-SP3.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "SLES15.0SP3") {

  if(!isnull(res = isrpmvuln(pkg:"git-core", rpm:"git-core~2.31.1~10.3.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"git-core-debuginfo", rpm:"git-core-debuginfo~2.31.1~10.3.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"git-debuginfo", rpm:"git-debuginfo~2.31.1~10.3.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"git-debugsource", rpm:"git-debugsource~2.31.1~10.3.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"perl-Git", rpm:"perl-Git~2.31.1~10.3.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"git", rpm:"git~2.31.1~10.3.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"git-arch", rpm:"git-arch~2.31.1~10.3.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"git-cvs", rpm:"git-cvs~2.31.1~10.3.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"git-daemon", rpm:"git-daemon~2.31.1~10.3.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"git-daemon-debuginfo", rpm:"git-daemon-debuginfo~2.31.1~10.3.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"git-doc", rpm:"git-doc~2.31.1~10.3.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"git-email", rpm:"git-email~2.31.1~10.3.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"git-gui", rpm:"git-gui~2.31.1~10.3.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"git-svn", rpm:"git-svn~2.31.1~10.3.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"git-web", rpm:"git-web~2.31.1~10.3.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"gitk", rpm:"gitk~2.31.1~10.3.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.903 High

EPSS

Percentile

98.8%