You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa git

Sigurnosni nedostaci programskog paketa git

——————————————————————————–
Fedora Update Notification
FEDORA-2020-4e093619bb
2020-05-01 04:53:46.191444
——————————————————————————–

Name : git
Product : Fedora 30
Version : 2.21.3
Release : 1.fc30
URL : https://git-scm.com/
Summary : Fast Version Control System
Description :
Git is a fast, scalable, distributed revision control system with an
unusually rich command set that provides both high-level operations
and full access to internals.

The git rpm installs common set of tools which are usually using with
small amount of dependencies. To install all git packages, including
tools for integrating with other SCMs, install the git-all meta-package.

——————————————————————————–
Update Information:

Security fix for CVE-2020-5260 and CVE-2020-11008 CVE-2020-5260 – From the
upstream [release
notes](https://www.kernel.org/pub/software/scm/git/docs/RelNotes/2.17.4.txt): >
With a crafted URL that contains a newline in it, the credential > helper
machinery can be fooled to give credential information for > a wrong host. The
attack has been made impossible by forbidding > a newline character in any value
passed via the credential > protocol. CVE-2020-11008 – From the upstream
[release
notes](https://www.kernel.org/pub/software/scm/git/docs/RelNotes/2.17.5.txt):
> With a crafted URL that contains a newline or empty host, or lacks > a scheme,
the credential helper machinery can be fooled into > providing credential
information that is not appropriate for the > protocol in use and host being
contacted. > > Unlike the vulnerability CVE-2020-5260 fixed in v2.17.4, the >
credentials are not for a host of the attacker’s choosing; instead, > they are
for some unspecified host (based on how the configured > credential helper
handles an absent “host” parameter). > > The attack has been made impossible by
refusing to work with > under-specified credential patterns.
——————————————————————————–
ChangeLog:

* Mon Apr 20 2020 Todd Zullinger <tmz@pobox.com> – 2.21.3-1
– update to 2.21.3 (CVE-2020-11008)
* Tue Apr 14 2020 Todd Zullinger <tmz@pobox.com> – 2.21.2-1
– update to 2.21.2 (CVE-2020-5260)
——————————————————————————–
References:

[ 1 ] Bug #1822020 – CVE-2020-5260 git: Crafted URL containing new lines can cause credential leak
https://bugzilla.redhat.com/show_bug.cgi?id=1822020
[ 2 ] Bug #1826001 – CVE-2020-11008 git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak
https://bugzilla.redhat.com/show_bug.cgi?id=1826001
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-4e093619bb’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa mingw-libxml2

Otkriveni su sigurnosni nedostaci u programskom paketu mingw-libxml2 za operacijski sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju rušenje servisa. Savjetuje...

Close