<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for git is now available for openEuler-20.03-LTS-SP4</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-1792</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-07-11</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-07-11</InitialReleaseDate>
		<CurrentReleaseDate>2025-07-11</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-07-11</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">git security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for git is now available for openEuler-20.03-LTS-SP4</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Security Fix(es):

Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.(CVE-2025-48384)

Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. The wincred credential helper uses a static buffer (target) as a unique key for storing and comparing against internal storage. This credential helper does not properly bounds check the available space remaining in the buffer before appending to it with wcsncat(), leading to potential buffer overflows. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.(CVE-2025-48386)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for git is now available for openEuler-20.03-LTS-SP4.

openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">git</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1792</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-48384</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-48386</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-48384</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-48386</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="git-email-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">git-email-2.27.0-24.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="git-gui-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">git-gui-2.27.0-24.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="git-help-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">git-help-2.27.0-24.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="git-svn-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">git-svn-2.27.0-24.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="git-web-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">git-web-2.27.0-24.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="gitk-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">gitk-2.27.0-24.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="perl-Git-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">perl-Git-2.27.0-24.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="perl-Git-SVN-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">perl-Git-SVN-2.27.0-24.oe2003sp4.noarch.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="git-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">git-2.27.0-24.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="git-daemon-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">git-daemon-2.27.0-24.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="git-debuginfo-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">git-debuginfo-2.27.0-24.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="git-debugsource-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">git-debugsource-2.27.0-24.oe2003sp4.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="git-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">git-2.27.0-24.oe2003sp4.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="git-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">git-2.27.0-24.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="git-daemon-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">git-daemon-2.27.0-24.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="git-debuginfo-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">git-debuginfo-2.27.0-24.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="git-debugsource-2.27.0-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">git-debugsource-2.27.0-24.oe2003sp4.x86_64.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.</Note>
		</Notes>
		<ReleaseDate>2025-07-11</ReleaseDate>
		<CVE>CVE-2025-48384</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.0</BaseScore>
				<Vector>AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>git security update</Description>
				<DATE>2025-07-11</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1792</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. The wincred credential helper uses a static buffer (target) as a unique key for storing and comparing against internal storage. This credential helper does not properly bounds check the available space remaining in the buffer before appending to it with wcsncat(), leading to potential buffer overflows. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.</Note>
		</Notes>
		<ReleaseDate>2025-07-11</ReleaseDate>
		<CVE>CVE-2025-48386</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.3</BaseScore>
				<Vector>AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>git security update</Description>
				<DATE>2025-07-11</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1792</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>