A security flaw was found in the way git-imap-send command (tool to send a collection of patches from stdin to an IMAP folder) of Git performed IMAP server's SSL x509.v3 certificate validation (server's hostname was previously not verified to match the CN field of the particular certificate). A rogue server could use this flaw to conduct man-in-the-middle (MiTM) attacks, possibly leading to disclosure of sensitive information.
This issue affects the version of the git package, as shipped with Red Hat Enterprise Linux 6.
This issue affects the versions of the git package, as shipped with Fedora release of 17 and 18.
This issue affects the version of the git package, as shipped with Fedora EPEL 5.
The CVE identifier of CVE-2013-0308 has been assigned to this issue.
Created attachment 699610 [details]
First part (1/3) of proposed upstream patch to correct this
Created attachment 699611 [details]
Second part (2/3) of proposed upstream patch to correct this
Created attachment 699612 [details]
Third (final) part (3/3) of proposed upstream patch to correct this
Created attachment 700017 [details]
Improved second piece of the patchset
Public via https://raw.github.com/git/git/master/Documentation/RelNotes/184.108.40.206.txt or http://marc.info/?l=git&m=136134619013145&w=2
Created git tracking bugs for this issue
Affects: fedora-all [bug 913593]
Affects: epel-5 [bug 913595]
This issue has been addressed in following products:
Red Hat Enterprise Linux 6
Via RHSA-2013:0589 https://rhn.redhat.com/errata/RHSA-2013-0589.html
git-220.127.116.11-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.