Arch Linux Security Advisory ASA-202004-21 ========================================== Severity: High Date : 2020-04-22 CVE-ID : CVE-2020-11008 Package : git Type : information disclosure Remote : Yes Link : https://security.archlinux.org/AVG-1138 Summary ======= The package git before version 2.26.2-1 is vulnerable to information disclosure. Resolution ========== Upgrade to 2.26.2-1. # pacman -Syu "git>=2.26.2-1" The problem has been fixed upstream in version 2.26.2. Workaround ========== None. Description =========== A vulnerability has been found in git before 2.26.2. With a crafted URL that contains a newline or empty host, or lacks a scheme, the credential helper machinery can be fooled into providing credential information that is not appropriate for the protocol in use and host being contacted. Unlike the vulnerability CVE-2020-5260 fixed in v2.26.1, the credentials are not for a host of the attacker's choosing; instead, they are for some unspecified host (based on how the configured credential helper handles an absent "host" parameter). The attack has been made impossible by refusing to work with under- specified credential patterns. Impact ====== A remote attacker might be able to retrieve passwords or other credentials by tricking a user into cloning from a crafted URL, either directly or via Git submodules, or package systems built around Git. References ========== https://github.com/git/git/security/advisories/GHSA-hjc9-x69f-jqj7 https://github.com/git/git/compare/v2.17.4...v2.17.5 https://security.archlinux.org/CVE-2020-11008