Fast Version Control System
Go to file
Todd Zullinger 0588f15273 Update to 2.14.1 (resolves CVE-2017-1000117)
From the release announcement¹

    A malicious third-party can give a crafted "ssh://..." URL to an
    unsuspecting victim, and an attempt to visit the URL can result in
    any program that exists on the victim's machine being executed.
    Such a URL could be placed in the .gitmodules file of a malicious
    project, and an unsuspecting victim could be tricked into running
    "git clone --recurse-submodules" to trigger the vulnerability.

    Credits to find and fix the issue go to Brian Neel at GitLab, Joern
    Schneeweisz of Recurity Labs and Jeff King at GitHub.

¹ https://public-inbox.org/git/xmqqh8xf482j.fsf@gitster.mtv.corp.google.com/
2017-08-10 17:40:10 -04:00
.gitignore Check upstream GPG signatures in %prep 2016-03-27 21:31:56 -04:00
git-1.8-gitweb-home-link.patch Update to 1.8.4.2 (#1024497) 2013-10-29 17:03:02 -04:00
git-cvsimport-Ignore-cvsps-2.2b1-Branches-output.patch Update to git-1.6.2.2 2009-04-04 20:47:17 +00:00
git-gui.desktop Update to git-1.6.3.2 2009-06-06 01:45:16 +00:00
git-init.el Add git-status and git-blame autoloads for emacs 2007-06-26 11:27:51 +00:00
git.conf.httpd - Install git-* commands in %{_libexecdir}/git-core, the upstream default 2009-01-03 16:36:21 +00:00
git.socket use systemd instead of xinetd (bz 737183) 2013-04-30 14:25:37 -04:00
git.spec Update to 2.14.1 (resolves CVE-2017-1000117) 2017-08-10 17:40:10 -04:00
git.xinetd.in Update to git-1.6.6.1 2010-01-31 21:05:27 +00:00
git@.service Rename git.service into git@.service and bump release 2014-10-24 17:51:58 +02:00
gitweb.conf.in Update to git-1.6.6.1 2010-01-31 21:05:27 +00:00
gpgkey-junio.asc Check upstream GPG signatures in %prep 2016-03-27 21:31:56 -04:00
sources Update to 2.14.1 (resolves CVE-2017-1000117) 2017-08-10 17:40:10 -04:00