diff options
| author | Junio C Hamano <gitster@pobox.com> | 2020-03-17 14:33:34 -0700 |
|---|---|---|
| committer | Junio C Hamano <gitster@pobox.com> | 2020-03-17 14:33:34 -0700 |
| commit | 17a02783d8f7cac1780d8035f3e2e0d25bba077b (patch) | |
| tree | d90361c2acb4dcea4bc68f0725748fe1c49cd97c /Documentation/RelNotes/2.17.4.txt | |
| parent | a7312d1a28ff3ab0a5a5427b35f01d943103cba8 (diff) | |
| parent | 69fab82147e74a51ee1144a336eb47c7297b9b78 (diff) | |
| download | git-2.23.2.tar.xz | |
Git 2.23.2v2.23.2
Signed-off-by: Junio C Hamano <gitster@pobox.com>
Diffstat (limited to 'Documentation/RelNotes/2.17.4.txt')
| -rw-r--r-- | Documentation/RelNotes/2.17.4.txt | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/Documentation/RelNotes/2.17.4.txt b/Documentation/RelNotes/2.17.4.txt new file mode 100644 index 0000000000..7d794ca01a --- /dev/null +++ b/Documentation/RelNotes/2.17.4.txt @@ -0,0 +1,16 @@ +Git v2.17.4 Release Notes +========================= + +This release is to address the security issue: CVE-2020-5260 + +Fixes since v2.17.3 +------------------- + + * With a crafted URL that contains a newline in it, the credential + helper machinery can be fooled to give credential information for + a wrong host. The attack has been made impossible by forbidding + a newline character in any value passed via the credential + protocol. + +Credit for finding the vulnerability goes to Felix Wilhelm of Google +Project Zero. |
