Fast Version Control System
From the release announcement¹
A malicious third-party can give a crafted "ssh://..." URL to an
unsuspecting victim, and an attempt to visit the URL can result in
any program that exists on the victim's machine being executed.
Such a URL could be placed in the .gitmodules file of a malicious
project, and an unsuspecting victim could be tricked into running
"git clone --recurse-submodules" to trigger the vulnerability.
Credits to find and fix the issue go to Brian Neel at GitLab, Joern
Schneeweisz of Recurity Labs and Jeff King at GitHub.
¹ https://public-inbox.org/git/xmqqh8xf482j.fsf@gitster.mtv.corp.google.com/
|
||
|---|---|---|
| .gitignore | ||
| git-1.8-gitweb-home-link.patch | ||
| git-cvsimport-Ignore-cvsps-2.2b1-Branches-output.patch | ||
| git-gui.desktop | ||
| git-init.el | ||
| git.conf.httpd | ||
| git.socket | ||
| git.spec | ||
| git.xinetd.in | ||
| git@.service | ||
| gitweb.conf.in | ||
| gpgkey-junio.asc | ||
| sources | ||