summaryrefslogtreecommitdiff
path: root/devel/git
diff options
context:
space:
mode:
authormaya <maya@pkgsrc.org>2018-10-05 17:48:20 +0000
committermaya <maya@pkgsrc.org>2018-10-05 17:48:20 +0000
commitdce7fe7b05cb79aabf1a9e1212bb4df8dd79aa7c (patch)
tree23314595bdd4d91884d80745f8d78f0813de1610 /devel/git
parentc2a20ad527f3d264d7c4cdd21370d4abedf08a1a (diff)
downloadpkgsrc-dce7fe7b05cb79aabf1a9e1212bb4df8dd79aa7c.tar.gz
Git: update to 2.19.1
These releases fix a security flaw (CVE-2018-17456), which allowed an attacker to execute arbitrary code by crafting a malicious .gitmodules file in a project cloned with --recurse-submodules. When running "git clone --recurse-submodules", Git parses the supplied .gitmodules file for a URL field and blindly passes it as an argument to a "git clone" subprocess. If the URL field is set to a string that begins with a dash, this "git clone" subprocess interprets the URL as an option. This can lead to executing an arbitrary script shipped in the superproject as the user who ran "git clone". In addition to fixing the security issue for the user running "clone", the 2.17.2, 2.18.1 and 2.19.1 releases have an "fsck" check which can be used to detect such malicious repository content when fetching or accepting a push. See "transfer.fsckObjects" in git-config(1). Credit for finding and fixing this vulnerability goes to joernchen and Jeff King, respectively.
Diffstat (limited to 'devel/git')
-rw-r--r--devel/git/Makefile.version4
1 files changed, 2 insertions, 2 deletions
diff --git a/devel/git/Makefile.version b/devel/git/Makefile.version
index a295681ceef..5ba8bcfc02c 100644
--- a/devel/git/Makefile.version
+++ b/devel/git/Makefile.version
@@ -1,7 +1,7 @@
-# $NetBSD: Makefile.version,v 1.73 2018/09/13 10:56:42 adam Exp $
+# $NetBSD: Makefile.version,v 1.74 2018/10/05 17:48:20 maya Exp $
#
# used by devel/git/Makefile.common
# used by devel/git-cvs/Makefile
# used by devel/git-svn/Makefile
-GIT_VERSION= 2.19.0
+GIT_VERSION= 2.19.1