Bug 1595633 (CVE-2018-10859)

Summary: CVE-2018-10859 git-annex: Malicious server could trick git-annex into decrypting a file encrypted to the user's gpg key
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: fedora, petersen, quantum.analyst
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-10 10:30:47 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1595635, 1595634    
Bug Blocks:    

Description Andrej Nemec 2018-06-27 08:54:24 UTC
A malicious server for a special remote could trick git-annex into decrypting a file that was encrypted to the user's gpg key. This attack could be used to expose encrypted data that was never stored in git-annex. Daniel Dent discovered this attack in collaboration with Joey Hess.

References:

https://git-annex.branchable.com/security/CVE-2018-10857_and_CVE-2018-10859/
http://seclists.org/oss-sec/2018/q2/237

Comment 1 Andrej Nemec 2018-06-27 08:54:57 UTC
Created git-annex tracking bugs for this issue:

Affects: epel-all [bug 1595635]
Affects: fedora-all [bug 1595634]

Comment 2 Product Security DevOps Team 2019-06-10 10:30:47 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.