diff options
author | Jonathan Nieder <jrnieder@gmail.com> | 2020-04-19 16:26:41 -0700 |
---|---|---|
committer | Jonathan Nieder <jrnieder@gmail.com> | 2020-04-19 16:26:41 -0700 |
commit | 76b54ee9b9944ee70422ac24884f78769cf264f1 (patch) | |
tree | d82790a92ce10a52c1492d58c271099cac389244 /Documentation/RelNotes/2.17.5.txt | |
parent | Git 2.19.4 (diff) | |
parent | Git 2.18.4 (diff) | |
download | tgif-76b54ee9b9944ee70422ac24884f78769cf264f1.tar.xz |
Git 2.19.5
This merges up the security fix from v2.17.5.
Signed-off-by: Jonathan Nieder <jrnieder@gmail.com>
Diffstat (limited to 'Documentation/RelNotes/2.17.5.txt')
-rw-r--r-- | Documentation/RelNotes/2.17.5.txt | 22 |
1 files changed, 22 insertions, 0 deletions
diff --git a/Documentation/RelNotes/2.17.5.txt b/Documentation/RelNotes/2.17.5.txt new file mode 100644 index 0000000000..2abb821a73 --- /dev/null +++ b/Documentation/RelNotes/2.17.5.txt @@ -0,0 +1,22 @@ +Git v2.17.5 Release Notes +========================= + +This release is to address a security issue: CVE-2020-11008 + +Fixes since v2.17.4 +------------------- + + * With a crafted URL that contains a newline or empty host, or lacks + a scheme, the credential helper machinery can be fooled into + providing credential information that is not appropriate for the + protocol in use and host being contacted. + + Unlike the vulnerability CVE-2020-5260 fixed in v2.17.4, the + credentials are not for a host of the attacker's choosing; instead, + they are for some unspecified host (based on how the configured + credential helper handles an absent "host" parameter). + + The attack has been made impossible by refusing to work with + under-specified credential patterns. + +Credit for finding the vulnerability goes to Carlo Arenas. |