Arch Linux Security Advisory ASA-202004-21
=========================================
Severity: High
Date    : 2020-04-22
CVE-ID  : CVE-2020-11008
Package : git
Type    : information disclosure
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1138

Summary
======
The package git before version 2.26.2-1 is vulnerable to information
disclosure.

Resolution
=========
Upgrade to 2.26.2-1.

# pacman -Syu "git>=2.26.2-1"

The problem has been fixed upstream in version 2.26.2.

Workaround
=========
None.

Description
==========
A vulnerability has been found in git before 2.26.2. With a crafted URL
that contains a newline or empty host, or lacks a scheme, the
credential helper machinery can be fooled into providing credential
information that is not appropriate for the protocol in use and host
being contacted.

Unlike the vulnerability CVE-2020-5260 fixed in v2.26.1, the
credentials are not for a host of the attacker's choosing; instead,
they are for some unspecified host (based on how the configured
credential helper handles an absent "host" parameter).

The attack has been made impossible by refusing to work with under-specified credential patterns.

Impact
=====
A remote attacker might be able to retrieve passwords or other
credentials by tricking a user into cloning from a crafted URL, either
directly or via Git submodules, or package systems built around Git.

References
=========
https://github.com/git/git/security/advisories/GHSA-hjc9-x69f-jqj7
https://github.com/git/git/compare/v2.17.4...v2.17.5
https://security.archlinux.org/CVE-2020-11008

ArchLinux: 202004-21: git: information disclosure

April 30, 2020

Summary

A vulnerability has been found in git before 2.26.2. With a crafted URL that contains a newline or empty host, or lacks a scheme, the credential helper machinery can be fooled into providing credential information that is not appropriate for the protocol in use and host being contacted. Unlike the vulnerability CVE-2020-5260 fixed in v2.26.1, the credentials are not for a host of the attacker's choosing; instead, they are for some unspecified host (based on how the configured credential helper handles an absent "host" parameter).
The attack has been made impossible by refusing to work with under-specified credential patterns.

Resolution

Upgrade to 2.26.2-1. # pacman -Syu "git>=2.26.2-1"
The problem has been fixed upstream in version 2.26.2.

References

https://github.com/git/git/security/advisories/GHSA-hjc9-x69f-jqj7 https://github.com/git/git/compare/v2.17.4...v2.17.5 https://security.archlinux.org/CVE-2020-11008

Severity
Package : git
Type : information disclosure
Remote : Yes
Link : https://security.archlinux.org/AVG-1138

Workaround

None.

Related News