--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2020-4e093619bb
2020-05-01 04:53:46.191444
--------------------------------------------------------------------------------Name        : git
Product     : Fedora 30
Version     : 2.21.3
Release     : 1.fc30
URL         : https://git-scm.com/
Summary     : Fast Version Control System
Description :
Git is a fast, scalable, distributed revision control system with an
unusually rich command set that provides both high-level operations
and full access to internals.

The git rpm installs common set of tools which are usually using with
small amount of dependencies. To install all git packages, including
tools for integrating with other SCMs, install the git-all meta-package.

--------------------------------------------------------------------------------Update Information:

Security fix for CVE-2020-5260 and CVE-2020-11008  CVE-2020-5260 - From the
upstream [release
notes](https://mirrors.edge.kernel.org/pub/software/scm/git/docs/RelNotes/2.17.4.txt):  >
With a crafted URL that contains a newline in it, the credential > helper
machinery can be fooled to give credential information for > a wrong host.  The
attack has been made impossible by forbidding > a newline character in any value
passed via the credential > protocol.  CVE-2020-11008 - From the upstream
[release
notes](https://mirrors.edge.kernel.org/pub/software/scm/git/docs/RelNotes/2.17.5.txt):
> With a crafted URL that contains a newline or empty host, or lacks > a scheme,
the credential helper machinery can be fooled into > providing credential
information that is not appropriate for the > protocol in use and host being
contacted. > > Unlike the vulnerability CVE-2020-5260 fixed in v2.17.4, the >
credentials are not for a host of the attacker's choosing; instead, > they are
for some unspecified host (based on how the configured > credential helper
handles an absent "host" parameter). > > The attack has been made impossible by
refusing to work with > under-specified credential patterns.
--------------------------------------------------------------------------------ChangeLog:

* Mon Apr 20 2020 Todd Zullinger  - 2.21.3-1
- update to 2.21.3 (CVE-2020-11008)
* Tue Apr 14 2020 Todd Zullinger  - 2.21.2-1
- update to 2.21.2 (CVE-2020-5260)
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1822020 - CVE-2020-5260 git: Crafted URL containing new lines can cause credential leak
        https://bugzilla.redhat.com/show_bug.cgi?id=1822020
  [ 2 ] Bug #1826001 - CVE-2020-11008 git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak
        https://bugzilla.redhat.com/show_bug.cgi?id=1826001
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2020-4e093619bb' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

Fedora 30: git FEDORA-2020-4e093619bb

May 1, 2020
Security fix for CVE-2020-5260 and CVE-2020-11008 CVE-2020-5260 - From the upstream [release notes](https://mirrors.edge.kernel.org/pub/software/scm/git/docs/RelNotes/2.17.4.txt): ...

Summary

Git is a fast, scalable, distributed revision control system with an

unusually rich command set that provides both high-level operations

and full access to internals.

The git rpm installs common set of tools which are usually using with

small amount of dependencies. To install all git packages, including

tools for integrating with other SCMs, install the git-all meta-package.

Security fix for CVE-2020-5260 and CVE-2020-11008 CVE-2020-5260 - From the

upstream [release

notes](https://mirrors.edge.kernel.org/pub/software/scm/git/docs/RelNotes/2.17.4.txt): >

With a crafted URL that contains a newline in it, the credential > helper

machinery can be fooled to give credential information for > a wrong host. The

attack has been made impossible by forbidding > a newline character in any value

passed via the credential > protocol. CVE-2020-11008 - From the upstream

[release

notes](https://mirrors.edge.kernel.org/pub/software/scm/git/docs/RelNotes/2.17.5.txt):

> With a crafted URL that contains a newline or empty host, or lacks > a scheme,

the credential helper machinery can be fooled into > providing credential

information that is not appropriate for the > protocol in use and host being

contacted. > > Unlike the vulnerability CVE-2020-5260 fixed in v2.17.4, the >

credentials are not for a host of the attacker's choosing; instead, > they are

for some unspecified host (based on how the configured > credential helper

handles an absent "host" parameter). > > The attack has been made impossible by

refusing to work with > under-specified credential patterns.

* Mon Apr 20 2020 Todd Zullinger - 2.21.3-1

- update to 2.21.3 (CVE-2020-11008)

* Tue Apr 14 2020 Todd Zullinger - 2.21.2-1

- update to 2.21.2 (CVE-2020-5260)

[ 1 ] Bug #1822020 - CVE-2020-5260 git: Crafted URL containing new lines can cause credential leak

https://bugzilla.redhat.com/show_bug.cgi?id=1822020

[ 2 ] Bug #1826001 - CVE-2020-11008 git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak

https://bugzilla.redhat.com/show_bug.cgi?id=1826001

su -c 'dnf upgrade --advisory FEDORA-2020-4e093619bb' at the command

line. For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

FEDORA-2020-4e093619bb 2020-05-01 04:53:46.191444 Product : Fedora 30 Version : 2.21.3 Release : 1.fc30 URL : https://git-scm.com/ Summary : Fast Version Control System Description : Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. The git rpm installs common set of tools which are usually using with small amount of dependencies. To install all git packages, including tools for integrating with other SCMs, install the git-all meta-package. Security fix for CVE-2020-5260 and CVE-2020-11008 CVE-2020-5260 - From the upstream [release notes](https://mirrors.edge.kernel.org/pub/software/scm/git/docs/RelNotes/2.17.4.txt): > With a crafted URL that contains a newline in it, the credential > helper machinery can be fooled to give credential information for > a wrong host. The attack has been made impossible by forbidding > a newline character in any value passed via the credential > protocol. CVE-2020-11008 - From the upstream [release notes](https://mirrors.edge.kernel.org/pub/software/scm/git/docs/RelNotes/2.17.5.txt): > With a crafted URL that contains a newline or empty host, or lacks > a scheme, the credential helper machinery can be fooled into > providing credential information that is not appropriate for the > protocol in use and host being contacted. > > Unlike the vulnerability CVE-2020-5260 fixed in v2.17.4, the > credentials are not for a host of the attacker's choosing; instead, > they are for some unspecified host (based on how the configured > credential helper handles an absent "host" parameter). > > The attack has been made impossible by refusing to work with > under-specified credential patterns. * Mon Apr 20 2020 Todd Zullinger - 2.21.3-1 - update to 2.21.3 (CVE-2020-11008) * Tue Apr 14 2020 Todd Zullinger - 2.21.2-1 - update to 2.21.2 (CVE-2020-5260) [ 1 ] Bug #1822020 - CVE-2020-5260 git: Crafted URL containing new lines can cause credential leak https://bugzilla.redhat.com/show_bug.cgi?id=1822020 [ 2 ] Bug #1826001 - CVE-2020-11008 git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak https://bugzilla.redhat.com/show_bug.cgi?id=1826001 su -c 'dnf upgrade --advisory FEDORA-2020-4e093619bb' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

Change Log

References

Update Instructions

Severity
Product : Fedora 30
Version : 2.21.3
Release : 1.fc30
URL : https://git-scm.com/
Summary : Fast Version Control System

Related News