mirror of
https://github.com/git/git.git
synced 2026-01-20 23:52:52 +00:00
19
Documentation/RelNotes/2.13.7.txt
Normal file
19
Documentation/RelNotes/2.13.7.txt
Normal file
@@ -0,0 +1,19 @@
|
||||
Git v2.13.7 Release Notes
|
||||
=========================
|
||||
|
||||
Fixes since v2.13.6
|
||||
-------------------
|
||||
|
||||
* Submodule "names" come from the untrusted .gitmodules file, but
|
||||
we blindly append them to $GIT_DIR/modules to create our on-disk
|
||||
repo paths. This means you can do bad things by putting "../"
|
||||
into the name (among other things). As these are initially taken
|
||||
from the path the submodule initially bound to the project and
|
||||
then serve as a constant name across moving it in the directory
|
||||
structure, a submodule with a name that does not pass
|
||||
verify_path() check, which rejects a string with a substring
|
||||
"/../" and ".git/" etc., is now ignored.
|
||||
|
||||
Credit for finding this vulnerability and the proof of concept from
|
||||
which the test script was adapted goes to Etienne Stalmans. Credit
|
||||
for the fix goes to Jeff King, Johannes Schindelin and others.
|
||||
@@ -1,7 +1,7 @@
|
||||
#!/bin/sh
|
||||
|
||||
GVF=GIT-VERSION-FILE
|
||||
DEF_VER=v2.13.6
|
||||
DEF_VER=v2.13.7
|
||||
|
||||
LF='
|
||||
'
|
||||
|
||||
Reference in New Issue
Block a user