<feed xmlns='http://www.w3.org/2005/Atom'>
<title>git, branch v2.24.3</title>
<subtitle>Fork of git SCM with my patches.</subtitle>
<id>http://git.kilabit.info/git/atom?h=v2.24.3</id>
<link rel='self' href='http://git.kilabit.info/git/atom?h=v2.24.3'/>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/git/'/>
<updated>2020-04-19T23:30:34Z</updated>
<entry>
<title>Git 2.24.3</title>
<updated>2020-04-19T23:30:34Z</updated>
<author>
<name>Jonathan Nieder</name>
<email>jrnieder@gmail.com</email>
</author>
<published>2020-04-19T23:30:34Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/git/commit/?id=b86a4be245d0ba077c97c6ab6b1cdbeb9dcc1342'/>
<id>urn:sha1:b86a4be245d0ba077c97c6ab6b1cdbeb9dcc1342</id>
<content type='text'>
This merges up the security fix from v2.17.5.

Signed-off-by: Jonathan Nieder &lt;jrnieder@gmail.com&gt;
</content>
</entry>
<entry>
<title>Git 2.23.3</title>
<updated>2020-04-19T23:30:27Z</updated>
<author>
<name>Jonathan Nieder</name>
<email>jrnieder@gmail.com</email>
</author>
<published>2020-04-19T23:30:27Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/git/commit/?id=f2771efd07b51edae023db95fcca39c72a0397fe'/>
<id>urn:sha1:f2771efd07b51edae023db95fcca39c72a0397fe</id>
<content type='text'>
This merges up the security fix from v2.17.5.

Signed-off-by: Jonathan Nieder &lt;jrnieder@gmail.com&gt;
</content>
</entry>
<entry>
<title>Git 2.22.4</title>
<updated>2020-04-19T23:30:19Z</updated>
<author>
<name>Jonathan Nieder</name>
<email>jrnieder@gmail.com</email>
</author>
<published>2020-04-19T23:30:19Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/git/commit/?id=c9808fa014aa88cc306705d308d1d9065d567ddc'/>
<id>urn:sha1:c9808fa014aa88cc306705d308d1d9065d567ddc</id>
<content type='text'>
This merges up the security fix from v2.17.5.

Signed-off-by: Jonathan Nieder &lt;jrnieder@gmail.com&gt;
</content>
</entry>
<entry>
<title>Git 2.21.3</title>
<updated>2020-04-19T23:30:08Z</updated>
<author>
<name>Jonathan Nieder</name>
<email>jrnieder@gmail.com</email>
</author>
<published>2020-04-19T23:30:08Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/git/commit/?id=9206d27eb5e76bbb3a4e59e3c53f92eaa0caa97b'/>
<id>urn:sha1:9206d27eb5e76bbb3a4e59e3c53f92eaa0caa97b</id>
<content type='text'>
This merges up the security fix from v2.17.5.

Signed-off-by: Jonathan Nieder &lt;jrnieder@gmail.com&gt;
</content>
</entry>
<entry>
<title>Git 2.20.4</title>
<updated>2020-04-19T23:28:57Z</updated>
<author>
<name>Jonathan Nieder</name>
<email>jrnieder@gmail.com</email>
</author>
<published>2020-04-19T23:28:57Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/git/commit/?id=041bc65923e13313ca1b77681c3b2950b5e0a163'/>
<id>urn:sha1:041bc65923e13313ca1b77681c3b2950b5e0a163</id>
<content type='text'>
This merges up the security fix from v2.17.5.

Signed-off-by: Jonathan Nieder &lt;jrnieder@gmail.com&gt;
</content>
</entry>
<entry>
<title>Git 2.19.5</title>
<updated>2020-04-19T23:26:41Z</updated>
<author>
<name>Jonathan Nieder</name>
<email>jrnieder@gmail.com</email>
</author>
<published>2020-04-19T23:26:41Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/git/commit/?id=76b54ee9b9944ee70422ac24884f78769cf264f1'/>
<id>urn:sha1:76b54ee9b9944ee70422ac24884f78769cf264f1</id>
<content type='text'>
This merges up the security fix from v2.17.5.

Signed-off-by: Jonathan Nieder &lt;jrnieder@gmail.com&gt;
</content>
</entry>
<entry>
<title>Git 2.18.4</title>
<updated>2020-04-19T23:24:14Z</updated>
<author>
<name>Jonathan Nieder</name>
<email>jrnieder@gmail.com</email>
</author>
<published>2020-04-19T23:24:14Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/git/commit/?id=ba6f0905fdb9e65c1ac5fbc79c9a4ef0b59b3e68'/>
<id>urn:sha1:ba6f0905fdb9e65c1ac5fbc79c9a4ef0b59b3e68</id>
<content type='text'>
This merges up the security fix from v2.17.5.

Signed-off-by: Jonathan Nieder &lt;jrnieder@gmail.com&gt;
</content>
</entry>
<entry>
<title>Git 2.17.5</title>
<updated>2020-04-19T23:10:58Z</updated>
<author>
<name>Jeff King</name>
<email>peff@peff.net</email>
</author>
<published>2020-04-19T06:34:55Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/git/commit/?id=df5be6dc3fd18c294ec93a9af0321334e3f92c9c'/>
<id>urn:sha1:df5be6dc3fd18c294ec93a9af0321334e3f92c9c</id>
<content type='text'>
Signed-off-by: Jeff King &lt;peff@peff.net&gt;
Signed-off-by: Jonathan Nieder &lt;jrnieder@gmail.com&gt;
</content>
</entry>
<entry>
<title>fsck: reject URL with empty host in .gitmodules</title>
<updated>2020-04-19T23:10:58Z</updated>
<author>
<name>Jonathan Nieder</name>
<email>jrnieder@gmail.com</email>
</author>
<published>2020-04-19T03:57:22Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/git/commit/?id=1a3609e402a062ef7b11f197fe96c28cabca132c'/>
<id>urn:sha1:1a3609e402a062ef7b11f197fe96c28cabca132c</id>
<content type='text'>
Git's URL parser interprets

	https:///example.com/repo.git

to have no host and a path of "example.com/repo.git".  Curl, on the
other hand, internally redirects it to https://example.com/repo.git.  As
a result, until "credential: parse URL without host as empty host, not
unset", tricking a user into fetching from such a URL would cause Git to
send credentials for another host to example.com.

Teach fsck to block and detect .gitmodules files using such a URL to
prevent sharing them with Git versions that are not yet protected.

A relative URL in a .gitmodules file could also be used to trigger this.
The relative URL resolver used for .gitmodules does not normalize
sequences of slashes and can follow ".." components out of the path part
and to the host part of a URL, meaning that such a relative URL can be
used to traverse from a https://foo.example.com/innocent superproject to
a https:///attacker.example.com/exploit submodule. Fortunately,
redundant extra slashes in .gitmodules are rare, so we can catch this by
detecting one after a leading sequence of "./" and "../" components.

Helped-by: Jeff King &lt;peff@peff.net&gt;
Signed-off-by: Jonathan Nieder &lt;jrnieder@gmail.com&gt;
Reviewed-by: Jeff King &lt;peff@peff.net&gt;
</content>
</entry>
<entry>
<title>credential: treat URL with empty scheme as invalid</title>
<updated>2020-04-19T23:10:58Z</updated>
<author>
<name>Jonathan Nieder</name>
<email>jrnieder@gmail.com</email>
</author>
<published>2020-04-19T03:54:57Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/git/commit/?id=e7fab62b736cca3416660636e46f0be8386a5030'/>
<id>urn:sha1:e7fab62b736cca3416660636e46f0be8386a5030</id>
<content type='text'>
Until "credential: refuse to operate when missing host or protocol",
Git's credential handling code interpreted URLs with empty scheme to
mean "give me credentials matching this host for any protocol".

Luckily libcurl does not recognize such URLs (it tries to look for a
protocol named "" and fails). Just in case that changes, let's reject
them within Git as well. This way, credential_from_url is guaranteed to
always produce a "struct credential" with protocol and host set.

Signed-off-by: Jonathan Nieder &lt;jrnieder@gmail.com&gt;
</content>
</entry>
</feed>
