forked from git/git
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* maint-2.21: (42 commits) Git 2.21.1 mingw: sh arguments need quoting in more circumstances mingw: fix quoting of empty arguments for `sh` mingw: use MSYS2 quoting even when spawning shell scripts mingw: detect when MSYS2's sh is to be spawned more robustly t7415: drop v2.20.x-specific work-around Git 2.20.2 t7415: adjust test for dubiously-nested submodule gitdirs for v2.20.x Git 2.19.3 Git 2.18.2 Git 2.17.3 Git 2.16.6 test-drop-caches: use `has_dos_drive_prefix()` Git 2.15.4 Git 2.14.6 mingw: handle `subst`-ed "DOS drives" mingw: refuse to access paths with trailing spaces or periods mingw: refuse to access paths with illegal characters unpack-trees: let merged_entry() pass through do_add_entry()'s errors quote-stress-test: offer to test quoting arguments for MSYS2 sh ...
- Loading branch information
Showing
44 changed files
with
967 additions
and
87 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,54 @@ | ||
Git v2.14.6 Release Notes | ||
========================= | ||
|
||
This release addresses the security issues CVE-2019-1348, | ||
CVE-2019-1349, CVE-2019-1350, CVE-2019-1351, CVE-2019-1352, | ||
CVE-2019-1353, CVE-2019-1354, and CVE-2019-1387. | ||
|
||
Fixes since v2.14.5 | ||
------------------- | ||
|
||
* CVE-2019-1348: | ||
The --export-marks option of git fast-import is exposed also via | ||
the in-stream command feature export-marks=... and it allows | ||
overwriting arbitrary paths. | ||
|
||
* CVE-2019-1349: | ||
When submodules are cloned recursively, under certain circumstances | ||
Git could be fooled into using the same Git directory twice. We now | ||
require the directory to be empty. | ||
|
||
* CVE-2019-1350: | ||
Incorrect quoting of command-line arguments allowed remote code | ||
execution during a recursive clone in conjunction with SSH URLs. | ||
|
||
* CVE-2019-1351: | ||
While the only permitted drive letters for physical drives on | ||
Windows are letters of the US-English alphabet, this restriction | ||
does not apply to virtual drives assigned via subst <letter>: | ||
<path>. Git mistook such paths for relative paths, allowing writing | ||
outside of the worktree while cloning. | ||
|
||
* CVE-2019-1352: | ||
Git was unaware of NTFS Alternate Data Streams, allowing files | ||
inside the .git/ directory to be overwritten during a clone. | ||
|
||
* CVE-2019-1353: | ||
When running Git in the Windows Subsystem for Linux (also known as | ||
"WSL") while accessing a working directory on a regular Windows | ||
drive, none of the NTFS protections were active. | ||
|
||
* CVE-2019-1354: | ||
Filenames on Linux/Unix can contain backslashes. On Windows, | ||
backslashes are directory separators. Git did not use to refuse to | ||
write out tracked files with such filenames. | ||
|
||
* CVE-2019-1387: | ||
Recursive clones are currently affected by a vulnerability that is | ||
caused by too-lax validation of submodule names, allowing very | ||
targeted attacks via remote code execution in recursive clones. | ||
|
||
Credit for finding these vulnerabilities goes to Microsoft Security | ||
Response Center, in particular to Nicolas Joly. The `fast-import` | ||
fixes were provided by Jeff King, the other fixes by Johannes | ||
Schindelin with help from Garima Singh. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
Git v2.15.4 Release Notes | ||
========================= | ||
|
||
This release merges up the fixes that appear in v2.14.6 to address | ||
the security issues CVE-2019-1348, CVE-2019-1349, CVE-2019-1350, | ||
CVE-2019-1351, CVE-2019-1352, CVE-2019-1353, CVE-2019-1354, and | ||
CVE-2019-1387; see the release notes for that version for details. | ||
|
||
In conjunction with a vulnerability that was fixed in v2.20.2, | ||
`.gitmodules` is no longer allowed to contain entries of the form | ||
`submodule.<name>.update=!command`. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
Git v2.16.6 Release Notes | ||
========================= | ||
|
||
This release merges up the fixes that appear in v2.14.6 and in | ||
v2.15.4 addressing the security issues CVE-2019-1348, CVE-2019-1349, | ||
CVE-2019-1350, CVE-2019-1351, CVE-2019-1352, CVE-2019-1353, | ||
CVE-2019-1354, and CVE-2019-1387; see the release notes for those | ||
versions for details. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
Git v2.17.3 Release Notes | ||
========================= | ||
|
||
This release merges up the fixes that appear in v2.14.6 and in | ||
v2.15.4 addressing the security issues CVE-2019-1348, CVE-2019-1349, | ||
CVE-2019-1350, CVE-2019-1351, CVE-2019-1352, CVE-2019-1353, | ||
CVE-2019-1354, and CVE-2019-1387; see the release notes for those | ||
versions for details. | ||
|
||
In addition, `git fsck` was taught to identify `.gitmodules` entries | ||
of the form `submodule.<name>.update=!command`, which have been | ||
disallowed in v2.15.4. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
Git v2.18.2 Release Notes | ||
========================= | ||
|
||
This release merges up the fixes that appear in v2.14.6, v2.15.4 | ||
and in v2.17.3, addressing the security issues CVE-2019-1348, | ||
CVE-2019-1349, CVE-2019-1350, CVE-2019-1351, CVE-2019-1352, | ||
CVE-2019-1353, CVE-2019-1354, and CVE-2019-1387; see the release notes | ||
for those versions for details. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
Git v2.19.3 Release Notes | ||
========================= | ||
|
||
This release merges up the fixes that appear in v2.14.6, v2.15.4 | ||
and in v2.17.3, addressing the security issues CVE-2019-1348, | ||
CVE-2019-1349, CVE-2019-1350, CVE-2019-1351, CVE-2019-1352, | ||
CVE-2019-1353, CVE-2019-1354, and CVE-2019-1387; see the release notes | ||
for those versions for details. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
Git v2.20.2 Release Notes | ||
========================= | ||
|
||
This release merges up the fixes that appear in v2.14.6, v2.15.4 | ||
and in v2.17.3, addressing the security issues CVE-2019-1348, | ||
CVE-2019-1349, CVE-2019-1350, CVE-2019-1351, CVE-2019-1352, | ||
CVE-2019-1353, CVE-2019-1354, and CVE-2019-1387; see the release notes | ||
for those versions for details. | ||
|
||
The change to disallow `submodule.<name>.update=!command` entries in | ||
`.gitmodules` which was introduced v2.15.4 (and for which v2.17.3 | ||
added explicit fsck checks) fixes the vulnerability in v2.20.x where a | ||
recursive clone followed by a submodule update could execute code | ||
contained within the repository without the user explicitly having | ||
asked for that (CVE-2019-19604). | ||
|
||
Credit for finding this vulnerability goes to Joern Schneeweisz, | ||
credit for the fixes goes to Jonathan Nieder. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
Git v2.21.1 Release Notes | ||
========================= | ||
|
||
This release merges up the fixes that appear in v2.14.6, v2.15.4, | ||
v2.17.3 and in v2.20.2, addressing the security issues CVE-2019-1348, | ||
CVE-2019-1349, CVE-2019-1350, CVE-2019-1351, CVE-2019-1352, | ||
CVE-2019-1353, CVE-2019-1354, CVE-2019-1387, and CVE-2019-19604; | ||
see the release notes for those versions for details. | ||
|
||
Additionally, this version also includes a couple of fixes for the | ||
Windows-specific quoting of command-line arguments when Git executes | ||
a Unix shell on Windows. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.