Commit Graph

238 Commits

Author SHA1 Message Date
Todd Zullinger
32a31b7090 Update to 2.19.1 (CVE-2018-17456)
From the upstream release announcement:

  These releases fix a security flaw (CVE-2018-17456), which allowed an
  attacker to execute arbitrary code by crafting a malicious .gitmodules
  file in a project cloned with --recurse-submodules.

  When running "git clone --recurse-submodules", Git parses the supplied
  .gitmodules file for a URL field and blindly passes it as an argument
  to a "git clone" subprocess.  If the URL field is set to a string that
  begins with a dash, this "git clone" subprocess interprets the URL as
  an option.  This can lead to executing an arbitrary script shipped in
  the superproject as the user who ran "git clone".

  In addition to fixing the security issue for the user running "clone",
  the 2.17.2, 2.18.1 and 2.19.1 releases have an "fsck" check which can
  be used to detect such malicious repository content when fetching or
  accepting a push. See "transfer.fsckObjects" in git-config(1).

  Credit for finding and fixing this vulnerability goes to joernchen
  and Jeff King, respectively.

References:
https://public-inbox.org/git/xmqqy3bcuy3l.fsf@gitster-ct.c.googlers.com/
2018-10-05 15:18:02 -04:00
Todd Zullinger
93e9ed05e4 Update to 2.19.0
Release notes:
https://www.kernel.org/pub/software/scm/git/docs/RelNotes/2.19.0.txt
2018-09-10 22:26:10 -04:00
Todd Zullinger
2b58811801 Update to 2.19.0.rc2
Release notes:
https://www.kernel.org/pub/software/scm/git/docs/RelNotes/2.19.0.txt
2018-09-05 00:52:20 -04:00
Todd Zullinger
dfcc5ccfe1 Update to 2.19.0.rc1 2018-08-28 16:41:06 -04:00
Todd Zullinger
218c314f1f Update to 2.19.0.rc0 2018-08-23 17:42:20 -04:00
Todd Zullinger
a66569768e Update to 2.18.0
Release notes:
https://www.kernel.org/pub/software/scm/git/docs/RelNotes/2.18.0.txt
2018-06-21 15:38:42 -04:00
Todd Zullinger
5834e5a5ce Update to 2.18.0-rc2 2018-06-13 18:27:26 -04:00
Todd Zullinger
ce668b9d1e Update to 2.18.0-rc1 2018-06-05 13:30:56 -04:00
Todd Zullinger
d3cc8ccead Update to 2.18.0-rc0
The USE_LIBPCRE setting now defaults to pcre2; use it.  It's still
valid to set USE_LIBPCRE2, but using the default should be cleaner in
the long-run.

The (long-unmaintained) emacs support has been dropped upstream in favor
of better alternatives.  From the upstream commit¹:

    The git-blame.el mode has been superseded by Emacs's own
    vc-annotate (invoked by C-x v g). Users of the git.el mode are now
    much better off using either Magit or the Git backend for Emacs's own
    VC mode.

    These modes were added over 10 years ago when Emacs's own Git support
    was much less mature, and there weren't other mature modes in the wild
    or shipped with Emacs itself.

    These days these modes have few if any users, and users of git aren't
    well served by us shipping these (some OS's install them alongside git
    by default, which is confusing and leads users astray).

¹ 6d5ed4836d ("git{,-blame}.el: remove old bitrotting Emacs code", 2018-04-11)
  https://git.kernel.org/pub/scm/git/git.git/commit/?id=6d5ed4836d
2018-06-05 13:30:56 -04:00
Todd Zullinger
9a5cabc9ef Update to 2.17.1 (CVE-2018-11233, CVE-2018-11235)
Fixes two security issues, described in the 2.13.7 release notes¹:

 * Submodule "names" come from the untrusted .gitmodules file, but we
   blindly append them to $GIT_DIR/modules to create our on-disk repo
   paths. This means you can do bad things by putting "../" into the
   name. We now enforce some rules for submodule names which will cause
   Git to ignore these malicious names (CVE-2018-11235).

   Credit for finding this vulnerability and the proof of concept from
   which the test script was adapted goes to Etienne Stalmans.

 * It was possible to trick the code that sanity-checks paths on NTFS
   into reading random piece of memory (CVE-2018-11233).

¹ https://mirrors.edge.kernel.org/pub/software/scm/git/docs/RelNotes/2.13.7.txt
2018-05-29 13:08:24 -04:00
Todd Zullinger
32f8d8d33b Update to 2.17.0
https://www.kernel.org/pub/software/scm/git/docs/RelNotes/2.17.0.txt
2018-04-02 16:26:27 -04:00
Todd Zullinger
336bc7765e Update to 2.17.0-rc2 2018-03-28 16:06:32 -04:00
Todd Zullinger
ee1ed82969 Update to 2.17.0-rc1 2018-03-21 16:01:18 -04:00
Todd Zullinger
f3c13faa20 Update to 2.17.0-rc0
The perl install process was updated to remove the need for
ExtUtils::MakeMaker.  The main change for us is setting perllibdir to
keep the files installed in %{perl_vendorlib}.

Manpages for non-public portions of the Git perl modules are no longer
built.  Anyone who wishes to make use of these modules can read the
source files or use pod2man.

Set NO_PERL_CPAN_FALLBACKS to ensure we don't package the bundled
fallback modules.

Also drop now-unneeded commands to remove *.bs, .packlist, and
perllocal.pod files.  The new install method does not produce these
artifacts.
2018-03-16 21:56:41 -04:00
Todd Zullinger
0164091753 Update to 2.16.2
Release notes: https://www.kernel.org/pub/software/scm/git/docs/RelNotes/2.16.2.txt
2018-02-16 13:50:09 -05:00
Todd Zullinger
8368c37a74 Update to 2.16.1
This release fixes an issue which only affects users on case-insensitive
file systems and repositories which contain paths that differ only in
case.  Such circumstances result in a segmentation fault in various git
commands.
2018-01-22 12:46:37 -05:00
Todd Zullinger
6adaa76501 Update to 2.16.0
Move fsmonitor-watchman sample hook out of git-core to avoid a perl
dependency.
2018-01-18 01:14:41 -05:00
Todd Zullinger
3baa69d782 Update to 2.15.1
https://www.kernel.org/pub/software/scm/git/docs/RelNotes/2.15.1.txt
2017-11-28 21:27:56 -05:00
Todd Zullinger
6e4a41c073 Update to 2.15.0 2017-10-30 11:38:18 -04:00
Todd Zullinger
d157da4208 Update to 2.14.3 2017-10-23 10:12:29 -04:00
Todd Zullinger
5f2c65c7b0 Update to 2.14.2
In addition to bug fixes, this release contains a security fix to harden
"git shell" against an unsafe user input, which "git cvsserver" copes
with poorly.

References:

http://seclists.org/oss-sec/2017/q3/534
https://public-inbox.org/git/xmqqy3p29ekj.fsf@gitster.mtv.corp.google.com/
2017-09-26 10:28:22 -04:00
Todd Zullinger
0588f15273 Update to 2.14.1 (resolves CVE-2017-1000117)
From the release announcement¹

    A malicious third-party can give a crafted "ssh://..." URL to an
    unsuspecting victim, and an attempt to visit the URL can result in
    any program that exists on the victim's machine being executed.
    Such a URL could be placed in the .gitmodules file of a malicious
    project, and an unsuspecting victim could be tricked into running
    "git clone --recurse-submodules" to trigger the vulnerability.

    Credits to find and fix the issue go to Brian Neel at GitLab, Joern
    Schneeweisz of Recurity Labs and Jeff King at GitHub.

¹ https://public-inbox.org/git/xmqqh8xf482j.fsf@gitster.mtv.corp.google.com/
2017-08-10 17:40:10 -04:00
Todd Zullinger
98fb8ee0a8 Update to 2.14.0 2017-08-04 13:07:56 -04:00
Todd Zullinger
a25cd0d022 Update to 2.13.4
Upstream bugfix release.  Release notes:

    https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.13.4.txt
2017-08-01 16:27:12 -04:00
Todd Zullinger
903d8f35ed Remove EL-5 and old Fedora conditionals
EL-5 has been EOL for several months now.  We can drop all the
conditionals needed to build there, as well as some conditionals for
long-expired Fedora releases.

Without EL-5 we also no longer use the prebuilt documentation.  Remove
these sources and simplify the gpg check for the remaining source.
2017-08-01 16:26:48 -04:00
Gwyn Ciesla
568aad0c32 2.13.3 2017-07-13 07:49:01 -05:00
Todd Zullinger
38b835a543 Update to 2.13.2 2017-06-25 00:31:18 -04:00
Todd Zullinger
b9d21c3c0e Update to 2.13.1
Upstream maintenance release.

Release notes: https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.13.1.txt
2017-06-05 00:18:13 -04:00
Todd Zullinger
96b2923f07 Update to 2.13.0 (resolves CVE-2017-8386) 2017-05-09 21:48:34 -04:00
Gwyn Ciesla
c0e7801e58 2.12.2 2017-03-29 10:20:49 -05:00
Gwyn Ciesla
4a094073ee 2.12.1 2017-03-21 09:08:43 -05:00
Jon Ciesla
29bd122462 2.12.0 2017-02-27 09:40:44 -06:00
Jon Ciesla
c6b850b847 2.11.1 2017-02-03 07:49:15 -06:00
Jon Ciesla
1c71dc1833 2.11.0 2016-11-30 12:12:54 -06:00
Jon Ciesla
781d911ea8 2.10.2 2016-10-31 08:59:33 -05:00
Jon Ciesla
2f2b6cc62f 2.10.1 2016-10-04 10:02:17 -05:00
Todd Zullinger
ddd981b2f3 Update to 2.10.0
https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.10.0.txt
2016-09-03 13:35:10 -04:00
Jon Ciesla
24278ab333 2.9.3 2016-08-15 08:51:43 -05:00
Jon Ciesla
31aba69924 2.9.2 2016-07-15 23:23:57 -05:00
Jon Ciesla
0042522977 2.9.1 2016-07-12 08:48:48 -05:00
Jon Ciesla
3119e08ee4 2.9.0 2016-06-14 10:05:22 -05:00
Jon Ciesla
f9560e8034 2.8.4 2016-06-08 12:38:36 -05:00
Todd Zullinger
184b9f323d Update to 2.8.3
https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.8.3.txt
2016-05-19 15:50:40 -04:00
Todd Zullinger
116ecc2e5d Update to 2.8.2 2016-04-29 19:03:35 -04:00
Jon Ciesla
75fe565d2a 2.8.1 2016-04-05 08:44:06 -04:00
1b7f6045f2 Update to 2.8.0
- Use license macro for COPYING
2016-03-29 20:27:54 -04:00
Todd Zullinger
f5bc9a8383 Check upstream GPG signatures in %prep
Many years ago, the GPG signature file was included in the source list¹.
A compromise at kernel.org caused the tarballs to move to googlecode.com
for a number of releases and the signatures were not provided in an
easily downloaded format².  When the source location was moved back to
kernel.org, the signature file had already been removed from the spec
file and was not re-added³.

There is an effort underway to make GPG signature verification a
requirement when upstream provides signatures⁴.  Regardless of whether
this becomes a requirement in the packaging guidelines, verification of
upstream signatures makes good sense.  It also makes the process easier
for git package maintainers, who are (or should be ;) doing this
manually for each upstream git release.

While adding the signatures to the source list, all non-upstream source
files were moved to Source10 and above.  This should make it easier to
add new upstream source files in the future, avoiding the need for
tedious (and error-prone) renumbering of existing sources.

Remove the unused entry for Patch14 also.

¹ ea3f253 Include gpg signature for tarball in SRPM (2011-08-26)
² c57f383 Update to 1.7.9.1 (2012-02-15)
³ b741f45 Change source URLs, as googlecode doesn't have up-to-date
           tarballs (2014-06-10)
⁴ https://fedorahosted.org/fpc/ticket/610
  https://fedoraproject.org/wiki/PackagingDrafts:GPGSignatures
  https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/thread/2TBK4LLNRH73QJQSXWFPCQYHGTSJ3C7P/
2016-03-27 21:31:56 -04:00
Todd Zullinger
a823c54d04 Use https for URL / Source as well as smaller tar.xz files
Using https URL's for source files provides a little more security for
those downloading the code.  Packagers, of course, should be verifying
the GPG signature files before pushing new releases to Fedora's source
cache¹.

While we're changing the source URL's, we might as well use the smaller
tar.xz files which upstream provides.  (This requires minor adjustments
to the unpacking of prebuilt html and man tarballs; tar on el5 does not
know how to automatically filter via xz.)

¹ Replace .xz with .sign for the signatures, which are made against the
uncompressed tarballs.
2016-03-27 17:05:37 -04:00
David Woodhouse
caed48f0ed Update to 2.7.4 (CVE-2016-2315 CVE-2016-2324) 2016-03-18 01:24:52 +00:00
Jon Ciesla
0c34dab4c9 2.7.3 2016-03-14 09:46:46 -04:00