diff options
| author | Junio C Hamano <gitster@pobox.com> | 2023-02-13 17:03:24 -0800 |
|---|---|---|
| committer | Junio C Hamano <gitster@pobox.com> | 2023-02-13 17:03:55 -0800 |
| commit | c867e4fa180bec4750e9b54eb10f459030dbebfd (patch) | |
| tree | d178a68edd12cea19afafb57436e3592d6e6178f /Documentation/RelNotes/2.30.8.txt | |
| parent | 23c56f7bd5f1667f8b793d796bf30e39545920f6 (diff) | |
| parent | cbf04937d5b9fcf0a76c28f69e6294e9e3ecd7e6 (diff) | |
| download | git-c867e4fa180bec4750e9b54eb10f459030dbebfd.tar.xz | |
Sync with Git 2.39.2
Diffstat (limited to 'Documentation/RelNotes/2.30.8.txt')
| -rw-r--r-- | Documentation/RelNotes/2.30.8.txt | 51 |
1 files changed, 51 insertions, 0 deletions
diff --git a/Documentation/RelNotes/2.30.8.txt b/Documentation/RelNotes/2.30.8.txt new file mode 100644 index 0000000000..5ed3efbd6a --- /dev/null +++ b/Documentation/RelNotes/2.30.8.txt @@ -0,0 +1,51 @@ +Git v2.30.8 Release Notes +========================= + +This release addresses the security issues CVE-2023-22490 and +CVE-2023-23946. + + +Fixes since v2.30.7 +------------------- + + * CVE-2023-22490: + + Using a specially-crafted repository, Git can be tricked into using + its local clone optimization even when using a non-local transport. + Though Git will abort local clones whose source $GIT_DIR/objects + directory contains symbolic links (c.f., CVE-2022-39253), the objects + directory itself may still be a symbolic link. + + These two may be combined to include arbitrary files based on known + paths on the victim's filesystem within the malicious repository's + working copy, allowing for data exfiltration in a similar manner as + CVE-2022-39253. + + * CVE-2023-23946: + + By feeding a crafted input to "git apply", a path outside the + working tree can be overwritten as the user who is running "git + apply". + + * A mismatched type in `attr.c::read_attr_from_index()` which could + cause Git to errantly reject attributes on Windows and 32-bit Linux + has been corrected. + +Credit for finding CVE-2023-22490 goes to yvvdwf, and the fix was +developed by Taylor Blau, with additional help from others on the +Git security mailing list. + +Credit for finding CVE-2023-23946 goes to Joern Schneeweisz, and the +fix was developed by Patrick Steinhardt. + + +Johannes Schindelin (1): + attr: adjust a mismatched data type + +Patrick Steinhardt (1): + apply: fix writing behind newly created symbolic links + +Taylor Blau (3): + t5619: demonstrate clone_local() with ambiguous transport + clone: delay picking a transport until after get_repo_path() + dir-iterator: prevent top-level symlinks without FOLLOW_SYMLINKS |
